Generation method and device for security entries
A security table, table entry technology, applied in the field of communication, can solve the problem of legal upstream discarding, and achieve the effect of avoiding discarding
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.
[0020] An embodiment of the present application provides a method for generating a security entry, which is applied to a switching device running a DHCP snooping function. When the switching device receives an unknown unicast packet through the uplink port, it learns a DHCP snooping entry for the destination IP address of the unknown unicast packet, and generates a security entry according to the learned DHCP snooping entry. The embodiment provided by the present application can generate the security entry of the downlink host as soon as possible according to the downlink flow, so as to avoid discarding of the legitimate uplink flow.
[0021] see figure 1 , figure 1 This is a schematic diagram of a DHCP network. figure 1 Switching d...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com