Switch port security protection method and apparatus based on TCP/IP

A technology of IP protocol and port security, which is applied in the field of communication, can solve problems such as excessively increasing manpower input costs, and achieve the effect of saving manpower costs

Inactive Publication Date: 2017-12-15
HANGZHOU DPTECH TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the connection between the access device and the switch is far away or the switch is placed in a location that is not easy to operate manually, the cost of manpower will be increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Switch port security protection method and apparatus based on TCP/IP
  • Switch port security protection method and apparatus based on TCP/IP
  • Switch port security protection method and apparatus based on TCP/IP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] A switch is an important data-carrying tool in network applications. Users usually do not want strange devices to access the switch. The access of strange devices may affect the normal data transmission and reception, and even affect information security. For example, the user hopes that the access device of a certain switch is limited to traffic cameras in this area, so as to provide network data transmission services for traffic images in real time. If other devices are randomly connected to this switch, it will affect the normal transmission of video data and affect the security of traffic information.

[0026] One of the ways to protect the security of the switch is to identify and process the access device on the physical port of the switch. The existing technology sets an access control list for the port, which can also be called a white list. Add the MAC addresses of the devices that are allowed to connect to the switch to the white list. Normal data transfer. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a switch port security protection method and apparatus based on TCP / IP. A detection request message is sent to an access device via a switch physical port based on TCP / IP, the device information of the access device is identified by whether a reply message is received and the contents of the reply message, so that a switch issues blockage, release, white list and a series of strategies. Compared with the prior art, the device of the access device does not need to be manually determined, a switch port white list does not need to be manually set neither, thereby reducing the labor cost.

Description

technical field [0001] The present application relates to the communication field, in particular to a TCP / IP protocol-based switch port security protection method and device. Background technique [0002] The switch is an important data bearing tool in network applications, and the switch often needs to be oriented to various types of access devices. To ensure the port security of the switch, the reliability of the access devices must be guaranteed. Therefore, how to better manage the access devices Identification and prevention have become problems that need to be solved in network security. [0003] The existing technology usually uses a whitelist mechanism to control access devices and prevent access devices from attacking switches. The specific solution is: disable the MAC address learning function of ports, and add the MAC addresses of access devices that are allowed to port whitelist. [0004] The white list mechanism in the prior art needs to bind the MAC address of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/935H04L49/111
CPCH04L63/0227H04L63/101H04L49/30
Inventor 尹纪飞
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products