Method and device for preventing network attack

A network attack and network node technology, applied in the computer field, can solve problems such as EVPN paralysis, network errors, EVPNMAC address confusion, etc., and achieve the effect of reducing risks, avoiding refreshing, and reducing the risk of paralysis

Active Publication Date: 2020-08-11
HUAWEI TECH CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the PE subsequently receives a packet carrying the masqueraded MAC address, it will send the packet to the attacker through the outbound por

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing network attack
  • Method and device for preventing network attack
  • Method and device for preventing network attack

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] The technical solution in this application will be described below in conjunction with the drawings.

[0029] First combine figure 1 An introduction to the network architecture applicable to this application. figure 1 It shows an EVPN established by multiple network nodes (for example, PE). For example, multiple PEs can establish the EVPN based on BGP, and each PE is connected to multiple devices through its own port, and the multiple devices may include user equipment. And service equipment.

[0030] Such as figure 1 As shown, user equipment 1 accesses EVPN through PE1, user equipment 2 accesses EVPN through PE2, service equipment accesses EVPN through PE3, and information transmission between user equipment and service equipment can be performed through PE.

[0031] For example, the service device may send data packets to user equipment 1 through PE2 and PE1, and the service device may send data packets to user equipment 2 through PE2 and PE3.

[0032] In the embodiment of the p

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for preventing a network attack, which comprises the following steps: a first network node in an Ethernet virtual private network (EVPN) receives a first message, the first message carries a first media access control (MAC) address, and the first MAC address is a source MAC address of the first message; and first MAC table entry information is determined, the firstMAC table entry information comprising a first MAC address and a corresponding relationship between an identifier of the first MAC address and egress port information of the first MAC address, and theidentifier of the first MAC address being used for indicating that an egress port corresponding to the first MAC address is a trusted port. According to the method, the risk that the EVPN is in a paralyzed state due to the fact that an attacker attacks the EVPN can be reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products