Endogenous security implementation device and method for forwarding flow table
An implementation method and forwarding flow technology, applied in the field of data communication, can solve problems such as algorithm vulnerability and untrustworthiness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] In order to solve the technical problem that a single algorithm is vulnerable and untrustworthy, and realize the endogenous security of network equipment in a better heterogeneous manner, the embodiment of the present invention provides an endogenous security implementation device for forwarding flow tables, such as figure 1 As shown, it mainly includes a control unit, a security processing unit and a data plane.
[0061] The control unit calculates the forwarding flow table of the current network device based on different algorithms through different executive bodies, and allocates a unified flow identification ID for each forwarding flow table according to the business flow attribute, and sends each forwarding flow table to the The security processing unit; wherein, the forwarding flow table includes one or more entries including the flow identification ID, and each service corresponds to an entry in the forwarding flow table.
[0062] The security processing unit det...
Embodiment 2
[0098] In order to solve the technical problem that a single algorithm is vulnerable and untrustworthy, and realize the endogenous security of the network device in a more optimal heterogeneous manner, the embodiment of the present invention further provides a method for implementing the endogenous security of the forwarding flow table, which can be achieved by The device described in Example 1 was carried out.
[0099] Such as image 3 As shown, the endogenous security implementation method of the forwarding flow table provided by the embodiment of the present invention mainly includes the following steps:
[0100] Step S1: The configuration management module of the control unit selects at least three heterogeneous executives, and configures the flow table generation algorithm, flow table generation method and related QoS constraint parameters for each executive body, and different execution bodies configure different flow table generation algorithm.
[0101] This step is m...
Embodiment 3
[0113] On the basis of the above-mentioned embodiment 1, the embodiment of the present invention further introduces the process of "each executive generates a forwarding flow table" corresponding to step S2. combine Figure 4 , the process of generating the forwarding flow table by each executive is as follows:
[0114] Step S201: Each executive body receives the flow table generation algorithm, flow table generation method and related QoS constraint parameters configured by the configuration management module, such as delay and jitter requirements. From the introduction in Embodiment 2, it can be known that the configuration management module will pre-configure the flow table generation algorithm, flow table generation method and related QoS constraint parameters that need to be satisfied for each executive, such as pre-configuring a service with a priority of 5 Reserve 10M bandwidth, etc.; each executive can directly receive the parameters configured by the configuration ma...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com