Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for acquiring access path

An access path and routing technology, applied in the field of network communication and network security, which can solve the problems of redundancy, not considering the different characteristics of device routing and forwarding, and forwarding errors.

Inactive Publication Date: 2018-11-23
ZTE CORP
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] As information security rises to the national strategy, the government, enterprises, and the market pay more and more attention to network security, which makes network deployment more complicated and leads to heavy network operation, maintenance and management.
[0003] At present, new business requests are submitted to the operation and maintenance personnel almost every day, and the operation and maintenance personnel will open these business requests on firewalls and other security devices, which has extremely high professional requirements for the operation and maintenance personnel; Frequently modifying the configuration on the device may lead to network security vulnerabilities or configuration redundancy; the existing network device management tools are developed by each device manufacturer, and can only perform simple change management operations on the same type of devices from the manufacturer, and There is no unified change audit management tool across manufacturers. In addition, the existing path finding technology only considers the standard routing process in the path finding process, and does not consider the different characteristics of device routing and forwarding, nor does it take into account the routing and forwarding characteristics of different devices themselves. , resulting in the possibility of forwarding errors in the simulated message service requests on the device, and the inaccurate access path obtained at last, thus losing the basis for application expansion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for acquiring access path
  • Method and device for acquiring access path
  • Method and device for acquiring access path

Examples

Experimental program
Comparison scheme
Effect test

no. 4 example

[0091] refer to Figure 6 , the present invention also proposes a fourth embodiment correspondingly, and step S30 includes:

[0092] Step S31, if there is a next-hop device, perform path query according to different query modes according to the type of the next-hop device;

[0093] According to the determined device type and service request, the background business system will query the path of the next-hop device type according to different query modes, and there are general algorithms in the routing selection process; however, there are differences in the routing selection process of each type of device For example, some devices support policy routing and destination routing, some devices support policy routing, source interface routing, source address routing, and destination routing, and some devices support blocking policies and destination routing. different device types for different routing options.

[0094] Step S32, when the path query is detected, analyze and matc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for acquiring an access path. A background service system of the method for acquiring the access path stores different types of equipment information. The method comprises the following steps: when an input service request is detected, acquiring a service request and network topology information, determining the starting point and end point of the access path according to the service request and the network topology information; judging whether next hop equipment exists or not according to the starting point and different types of equipment information; if so,selecting a corresponding routing algorithm according to the information of next hop equipment routing and policy to query the path; performing loop checkup based on the information of next hop equipment routing and policy until the end point of the determined access path is queried to generate an access path which meets the service request; and constructing a network topology corresponding to theaccess path according to the routing and policy information and the equipment information. The invention also discloses a corresponding device to effectively improve the efficiency of enterprise security service management, lower the labor cost and improve the efficiency of network management and maintenance.

Description

technical field [0001] The invention relates to the fields of network communication and network security, in particular to a method and device for obtaining an access path. Background technique [0002] As information security rises to the national strategy, the government, enterprises, and the market pay more and more attention to network security, which makes network deployment more complicated and leads to heavy network operation, maintenance and management. [0003] At present, new business requests are submitted to the operation and maintenance personnel almost every day, and the operation and maintenance personnel will open these business requests on firewalls and other security devices, which has extremely high professional requirements for the operation and maintenance personnel; Frequently modifying the configuration on the device may lead to network security vulnerabilities or configuration redundancy; the existing network device management tools are developed by e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/12H04L45/02H04L45/20H04L45/24H04L63/123
Inventor 蒋璐峥严为芮通
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products