Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encapsulation method and equipment thereof

A technology of data encapsulation and equipment, applied in the field of communication, can solve the problems of increasing equipment load, increasing the network bandwidth of IPsec tunnel transmission path, and limiting the scope of IPsec encapsulation, so as to reduce the encapsulation process.

Active Publication Date: 2009-11-04
NEW H3C TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, IPsec also has its own shortcomings. (1) IPsec can only process IP data streams, which limits the scope of IPsec encapsulation
(2) IPsec cannot handle multicast or broadcast IP data streams, which brings limitations to the application of IPsec, that is, IP multicast data streams cannot pass through IPsec tunnels, and various routing protocols, such as EIGRP (Enhanced Interior Gateway Routing Protocol, Enhanced Interior Gateway Routing Protocol), OSPF (Open Shortest Path First, Open Shortest Path First) and RIPv2 (Routing Information Protocol, Routing Information Protocol), when using a multicast or broadcast address, cannot be used in IPsec peers use these routing protocols to configure dynamic routing
[0006] Before the original packet is encapsulated by the GRE tunnel and passed to IPsec for encapsulation, the length of the packet is increased by 32 bytes. For example, figure 2 As shown, the IP header takes up 20 bytes, and the Tunnel Header takes up 12 bytes (the Tunnel Header takes up 12 bytes when the GRE tunnel is set as Key). The load on the device is increased; after tunnel encapsulation, the length of the message increases by 32 bytes, which reduces the efficiency of IPsec encapsulation; the increase in the length of the message increases the network bandwidth occupied by the IPsec tunnel transmission path

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encapsulation method and equipment thereof
  • Data encapsulation method and equipment thereof
  • Data encapsulation method and equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The core idea of ​​the present invention is under the situation that configuration tunnel (for example, GRE tunnel) and IPsec tunnel exist between IPsec peers using IPsec protocol, by judging whether configuration tunnel end point and IPsec tunnel end point are identical, and according to the judgment result Negotiate between IPsec peers. When the judgment result of the IPsec peers is that the configured tunnel endpoint is the same as the IPsec tunnel endpoint, only the IPsec tunnel encapsulation process is performed on the data packet, and the configuration tunnel encapsulation process is not required. process, thereby omitting the encapsulation process of configuring the tunnel, reducing the load on the device, and improving the efficiency of IPsec encryption. After the encapsulated packet reaches the peer end of the IPsec tunnel, IPsec decapsulates it and directly processes the original packet, omitting the process of configuring tunnel decapsulation and also reducing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encapsulation method. The method comprises the following steps: first equipment judges whether an endpoint of a configured tunnel is the same as that of an IPsec tunnel; the first equipment negotiates with second equipment according to a judgment result, and determines whether encapsulation of the configured tunnel is required according to a negotiation result; and the first equipment performs IPsec tunnel encapsulation on the received data message and sends an encapsulated message to the second equipment when encapsulation of the configured tunnel is not required. In the invention, IPsec tunnel encapsulation is required only once, thus decreasing the encapsulation process of the configured tunnel. The invention also provides equipment corresponding to the data encapsulation method.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a data encapsulation method and device. Background technique [0002] IPsec (IP security, Internet Protocol Security) is a three-layer tunnel encryption protocol that provides high-quality, interoperable, and cryptography-based security guarantees for data transmitted on the Internet, that is, between specific communication parties The layer provides security services for data through encryption and data source authentication. The security service includes data confidentiality (that is, the IPsec sender encrypts the data packet before transmitting it through the network); data integrity (that is, the IPsec receiver authenticates the data packet from the sender to ensure that the data packet is in No tampering during transmission); data source authentication (that is, IPsec authenticates whether the sender of the IPsec data packet is legal at the receiving end); anti-repla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L12/56H04L29/06H04L47/43
Inventor 李永波吴频
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products