[go: up one dir, main page]

CN116405344A - Method and equipment for detecting link - Google Patents

Method and equipment for detecting link Download PDF

Info

Publication number
CN116405344A
CN116405344A CN202310377335.4A CN202310377335A CN116405344A CN 116405344 A CN116405344 A CN 116405344A CN 202310377335 A CN202310377335 A CN 202310377335A CN 116405344 A CN116405344 A CN 116405344A
Authority
CN
China
Prior art keywords
stp
port
loop detection
edge
identifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310377335.4A
Other languages
Chinese (zh)
Inventor
赵海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
New H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd filed Critical New H3C Technologies Co Ltd
Priority to CN202310377335.4A priority Critical patent/CN116405344A/en
Publication of CN116405344A publication Critical patent/CN116405344A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/60Software-defined switches
    • H04L49/602Multilayer or multiprotocol switching, e.g. IP switching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供了一种检测链路的方法及设备。该方法包括识别一个以上的支持STP协议的STP非边缘端口以及一个以上不支持STP协议的STP边缘端口;记录识别的每个STP边缘端口;阻塞通过每个STP边缘端口的接收或发送数据报文。

Figure 202310377335

The present application provides a method and device for detecting a link. The method includes identifying more than one STP non-edge port supporting the STP protocol and more than one STP edge port not supporting the STP protocol; recording each STP edge port identified; blocking the receiving or sending data message through each STP edge port .

Figure 202310377335

Description

一种检测链路的方法及设备Method and device for detecting link

技术领域technical field

本申请涉及通信技术,特别涉及一种检测链路的方法及设备。The present application relates to communication technology, in particular to a method and device for detecting a link.

背景技术Background technique

随着IT基础架构、移动互联网等技术的发展和变化,园区网络的安全防护手段和思路面临着诸多挑战。园区网络中移动终端种类和数量越来越多,任何一个终端设备都有可能成为入侵整个园区网络的跳板。With the development and changes of technologies such as IT infrastructure and mobile Internet, the security protection methods and ideas of the campus network are facing many challenges. There are more and more types and quantities of mobile terminals in the campus network, and any terminal device may become a springboard for invading the entire campus network.

园区网络要以“流量路径”为核心构筑层层递进的纵深安全防御体系,通过合理划分安全区域确定安全防御边界,包括互联网接入区、广域网接入区、用户接入区、服务器接入区等安全区域。因而在园区网内,对区域间特定骨干(spine)设备进行连接,不同区域间的叶(leaf)交换设备或叶交换设备的下游设备不做连接。但是在园区网络规划的实施过程,一旦不允许互联的网络设备因为错误布线导致网络内发生环路,通过人工排除错误布线不仅工作量大,而且为了防止环路导致的转发风暴,leaf交换设备接入的接入交换机发送STP协议报文,阻塞二层网络环路,但是当网络中接入了非法设备不支持STP协议,无法依靠STP协议识别阻塞环路,导致环路风暴。The campus network should build a layer-by-layer in-depth security defense system with the "traffic path" as the core, and determine the security defense boundary by rationally dividing security areas, including Internet access areas, WAN access areas, user access areas, and server access areas. area and other safe areas. Therefore, in the campus network, specific backbone (spine) devices between areas are connected, and leaf (leaf) switching devices or downstream devices of leaf switching devices between different areas are not connected. However, in the implementation process of the campus network planning, once the interconnected network devices are not allowed to cause loops in the network due to incorrect wiring, manual troubleshooting of incorrect wiring is not only a heavy workload, but also to prevent forwarding storms caused by loops, leaf switching devices connect The incoming access switch sends STP protocol packets to block Layer 2 network loops. However, when an illegal device is connected to the network that does not support the STP protocol, it cannot rely on the STP protocol to identify the blocked loop, resulting in a loop storm.

发明内容Contents of the invention

本申请的目的在于提供一种检测链路的方法及设备,阻塞连接不支持STP协议设备的数据转发。The purpose of this application is to provide a method and device for detecting a link, which blocks the data forwarding of the device that does not support the STP protocol.

为实现上述目的,本申请提供了一种检测链路的方法,该方法包括识别一个以上的支持STP协议的STP非边缘端口以及一个以上不支持STP协议的STP边缘端口;记录识别的每个STP边缘端口;阻塞通过每个STP边缘端口的接收或发送数据报文。In order to achieve the above object, the present application provides a method for detecting a link, which method includes identifying more than one STP non-edge port supporting the STP protocol and more than one STP edge port not supporting the STP protocol; recording each identified STP Edge port; block receiving or sending data packets through each STP edge port.

为实现上述目的,本申请还提供了一种检测链路的设备,该设备包括处理器以及存储器;存储器用于存储处理器可执行指令;其中,处理器通过运行存储器中的处理器可执行指令用以执行以下操作:一个以上的支持STP协议的STP非边缘端口以及一个以上不支持STP协议的STP边缘端口;记录识别的每个STP边缘端口;阻塞通过每个STP边缘端口的接收或发送数据报文。In order to achieve the above object, the present application also provides a device for detecting links, the device includes a processor and a memory; the memory is used to store processor-executable instructions; wherein, the processor runs the processor-executable instructions in the memory Used to perform the following operations: one or more STP non-edge ports that support the STP protocol and more than one STP edge port that does not support the STP protocol; record each STP edge port identified; block receiving or sending data through each STP edge port message.

本申请的有益效果在于,阻塞不支持STP协议报文的端口,避免二层网络内的设备无法通过STP协议识别环路,避免二环网络内的环路风暴。The beneficial effect of the present application is that the ports that do not support the STP protocol message are blocked, the equipment in the two-layer network cannot identify the loop through the STP protocol, and the loop storm in the two-ring network is avoided.

附图说明Description of drawings

图1所示为本申请提供的一种检测链路的方法实施例的流程图;FIG. 1 is a flowchart of a method embodiment of a link detection method provided by the present application;

图2A-2B为本申请实施例提供的在二层网络内检测链路的示意图;2A-2B are schematic diagrams of link detection in a Layer 2 network provided by an embodiment of the present application;

图3为本申请提供的环路检测设备实施例的示意图。FIG. 3 is a schematic diagram of an embodiment of a loop detection device provided in the present application.

具体实施方式Detailed ways

将以多个附图所示的多个例子进行详细说明。在以下详细描述中,多个具体细节用于提供对本申请的全面理解。实例中没有详细地描述已知的方法、步骤、组件以及电路,以免使这些例子的难于理解。A detailed description will be given with a plurality of examples shown in a plurality of drawings. In the following detailed description, numerous specific details are used to provide a thorough understanding of the application. Well-known methods, procedures, components and circuits have not been described in detail in order not to obscure the examples.

使用的术语中,术语“包括”表示包括但不限于;术语“含有”表示包括但不限于;术语“以上”、“以内”以及“以下”包含本数;术语“大于”、“小于”表示不包含本数。术语“基于”表示至少基于其中一部分。Among the terms used, the term "comprising" means including but not limited to; the term "comprising" means including but not limited to; the terms "above", "within" and "below" include the number; the terms "greater than" and "less than" mean not Include this number. The term "based on" means based on at least a portion thereof.

图1所示为本申请提供的一种检测链路的方法实施例的流程图,该方法包括:Figure 1 is a flowchart of a method embodiment of a link detection method provided by the present application, the method comprising:

步骤101,识别一个以上的支持STP协议的STP非边缘端口以及一个以上不支持STP协议的STP边缘端口;Step 101, identifying more than one STP non-edge port supporting the STP protocol and more than one STP edge port not supporting the STP protocol;

步骤102,记录识别的每个STP边缘端口;Step 102, record each STP edge port identified;

步骤103,阻塞通过每个STP边缘端口的接收或发送数据报文。Step 103, blocking the data packets received or sent through each STP edge port.

图1实施例的有益效果在于,阻塞不支持STP协议报文的端口,避免二层网络内的设备无法通过STP协议识别环路,避免二环网络内的环路风暴。The beneficial effect of the embodiment in FIG. 1 is that it blocks ports that do not support STP protocol messages, avoids devices in the two-layer network from being unable to identify loops through the STP protocol, and avoids loop storms in the two-ring network.

图2A所示为本申请实施例提供的在二层网络内检测链路的示意图;在该大二层网络中,二层交换机按角色划分为骨干(spine)层交换机、叶子(leaf)层交换机和接入(access)交换机;骨干层的交换机spine1、spine2通过等价路径(Equal cost MultiplePath,ECMP)连接三层交换机。Fig. 2A shows the schematic diagram of detecting links in the two-layer network provided by the embodiment of the present application; in this large two-layer network, the two-layer switches are divided into backbone (spine) layer switches and leaf (leaf) layer switches according to their roles and an access (access) switch; backbone layer switches spine1 and spine2 are connected to the three-layer switch through an equal cost path (Equal cost MultiplePath, ECMP).

大二层可以是普通的二层网络,也可以是通过二层VPN隧道互联的二层网络、leaf层交换机之间通过二层VPN隧道,譬如VXLAN隧道互联。接入层交换机用于接入终端(图2中未示)。The large layer 2 can be an ordinary layer 2 network, or a layer 2 network interconnected through a layer 2 VPN tunnel, and leaf layer switches are interconnected through a layer 2 VPN tunnel, such as a VXLAN tunnel. Access layer switches are used to access terminals (not shown in Figure 2).

为便于说明,本申请以部分交换机,access14、15、16,leaf21、22为例说明。交换机access14、15、16,leaf21、22确定启动环路检测功能;通过各端口发送带有本设备标识的STP环路检测报文。For ease of description, this application uses some switches, access14, 15, 16, leaf21, 22 as examples. Switches access14, 15, 16, leaf21, 22 determine to start the loop detection function; send the STP loop detection message with the device identification through each port.

交换机access14、15、16,leaf21、22通过各端口发送STP环路检测报文并检测其是否返回本设备(不要求收、发端口为同一端口)以确认是否存在环路。若某端口收到了由本设备发出的环路检测报文,就认定该端口所在链路存在环路。Switches access14, 15, 16, leaf21, 22 send STP loop detection messages through each port and detect whether they return to the device (the receiving and sending ports are not required to be the same port) to confirm whether there is a loop. If a port receives a loop detection message sent by the device, it is determined that there is a loop on the link where the port is located.

图2A中,交换机access16连接交换机access15的端口故障,无法发送带有交换机access16设备标识的STP环路检测报文。In FIG. 2A , the port of the switch access16 connected to the switch access15 is faulty, and the STP loop detection message with the device identifier of the switch access16 cannot be sent.

交换机access14、15、16,leaf21、22在初始环路检测周期到达时,检测各端口是否收到STP邻居的设备标识的STP环路检测报文。Switches access14, 15, 16, leaf21, 22 check whether each port receives the STP loop detection message of the device identification of the STP neighbor when the initial loop detection period arrives.

交换机access15将初始环路检测周期内收到带有其他设备标识的STP环路检测报文的每个端口(即连接leaf21、22)的端口识别为STP非边缘端口;将初始环路检测周期内未收到带有其他设备标识的STP环路检测报文的端口,即连接交换机access16的端口识别为STP边缘端口。The switch access15 will receive the STP loop detection message with other equipment identifications in the initial loop detection period. Ports that have not received STP loop detection packets with other device identifiers, that is, ports connected to the switch access16 are identified as STP edge ports.

交换机access14将初始环路检测周期内收到带有其他设备标识的STP环路检测报文的每个端口(即连接交换机access16、leaf21、22)的端口识别为STP非边缘端口;将初始环路检测周期内未收到带有其他设备标识的STP环路检测报文的端口,即连接非法设备17的端口识别为STP边缘端口。The switch access14 recognizes each port (that is, the port connected to the switch access16, leaf21, 22) that receives the STP loop detection message with other device identifiers in the initial loop detection cycle as an STP non-edge port; Ports that do not receive STP loop detection messages with other device identifiers within the detection period, that is, ports connected to illegal devices 17 are identified as STP edge ports.

交换机access15记录将连接交换机access16的端口为STP边缘端口,阻塞该端口接收或发送数据报文。The switch access15 records the port that will be connected to the switch access16 as an STP edge port, and blocks the port from receiving or sending data packets.

交换机access14记录将连接非法设备17的端口为STP边缘端口,阻塞该端口接收或发送数据报文。The switch access14 records the port that will be connected to the illegal device 17 as an STP edge port, and blocks the port from receiving or sending data packets.

图2B中,交换机access15通过连接交换机access16的端口发送带有本设备标识的STP黑洞检测报文;In Fig. 2B, the switch access15 sends the STP black hole detection message with the device identification through the port connected to the switch access16;

交换机access14通过连接非法设备17的端口发送带有本设备标识的STP黑洞检测报文。The switch access14 sends the STP black hole detection message with the device identification through the port connected to the illegal device 17.

交换机access16连接交换机access15的端口故障,恢复发送STP环路检测报文。The port connecting switch access16 to switch access15 is faulty, and resumes sending STP loop detection packets.

交换机access15通过连接交换机access16的端口指定黑洞检测时间内收到STP环路检测报文,将其记录为STP非边缘端口并允许接收或发送数据报文。The switch access15 receives the STP loop detection message within the specified black hole detection time through the port connected to the switch access16, records it as an STP non-edge port and allows receiving or sending data messages.

交换机access15在新的环路检测周期到达时,通过记录的STP非边缘端口(即连接leaf21、22、access16的端口),连接发送带有本设备标识的STP环路检测报文;并将该环路检测周期内从这些端口收到带有其他设备标识的STP环路检测报文,将这些识别为STP非边缘端口。When the new loop detection cycle arrives, the switch access15 connects and sends the STP loop detection message with the device identification through the recorded STP non-edge port (that is, the port connected to leaf21, 22, and access16); Receive STP loop detection packets with other device identifiers from these ports during the loop detection cycle, and identify these ports as STP non-edge ports.

交换机access14在新的环路检测周期到达时,通过记录的STP非边缘端口(即连接leaf21、22的端口),连接发送带有本设备标识的STP环路检测报文;并将该环路检测周期内从这些端口收到带有其他设备标识的STP环路检测报文,将这些识别为STP非边缘端口。When the new loop detection cycle arrives, the switch access14 connects and sends the STP loop detection message with the device identification through the recorded STP non-edge port (that is, the port connected to leaf21, 22); and the loop detection Receive STP loop detection packets with other device identifiers from these ports within a period, and identify these ports as STP non-edge ports.

交换机access14在指定黑洞检测时间内,未通过连接非法设备17的端口收到STP环路检测报文,关闭该端口,删除记录STP边缘端口,即连接非法设备17的端口,不再浪费资源从该端口发送黑洞检测报文。If the switch access14 does not receive an STP loop detection message through the port connected to the illegal device 17 within the specified black hole detection time, close the port, delete the record of the STP edge port, that is, the port connected to the illegal device 17, and no longer waste resources from this port. The port sends black hole detection packets.

图2A和2B中的其他叶子(leaf)层交换机和接入(access)交换机可按相同方式检测链路,具体内容不再赘述。Other leaf (leaf) layer switches and access (access) switches in Figures 2A and 2B can detect links in the same manner, and the specific content will not be repeated here.

图3为本申请提供的环路检测设备实施例的示意图。该设备30包括处理器以及存储器;存储器用于存储处理器可执行指令;其中,处理器通过运行存储器中的处理器可执行指令用以执行以下操作:识别一个以上的STP非边缘端口以及一个以上STP边缘端口;记录识别的每个STP边缘端口;阻塞通过每个STP边缘端口的接收或发送数据报文。FIG. 3 is a schematic diagram of an embodiment of a loop detection device provided in the present application. The device 30 includes a processor and a memory; the memory is used to store processor-executable instructions; wherein, the processor executes the processor-executable instructions in the memory to perform the following operations: identify more than one STP non-edge port and more than one STP edge port; record each STP edge port identified; block receiving or sending data packets through each STP edge port.

处理器通过运行存储器中的处理器可执行指令用以执行以下操作:通过每个STP边缘端口发送带有本设备标识的STP黑洞检测报文;当任一STP边缘端口在指定黑洞检测时间内收到带有其他设备标识的STP环路检测报文,将其记录为STP非边缘端口并允许接收或发送数据报文。The processor runs the processor-executable instructions in the memory to perform the following operations: send an STP black hole detection message with the device identification through each STP edge port; when any STP edge port receives a black hole detection message within the specified black hole detection time When receiving an STP loop detection packet with other device identifiers, record it as an STP non-edge port and allow receiving or sending data packets.

处理器通过运行存储器中的处理器可执行指令用以执行以下操作:关闭在指定黑洞检测时间内未收到带有其他设备标识的STP环路检测报文的STP边缘端口;从记录的所有STP边缘端口中删除被关闭的STP边缘端口。The processor executes the following operations by running the processor-executable instructions in the memory: close the STP edge port that has not received the STP loop detection message with other equipment identification within the specified black hole detection time; Delete the closed STP edge port from the edge port.

处理器通过运行所述存储器中的处理器可执行指令用以执行所述识别一个以上的STP非边缘端口以及一个以上STP边缘端口包括以下操作:确定启动环路检测功能;通过各端口发送带有本设备标识的STP环路检测报文;将初始环路检测周期内收到带有其他设备标识的STP环路检测报文的每个端口识别为STP非边缘端口;将初始环路检测周期内未收到带有其他设备标识的STP环路检测报文的每个端口识别为STP边缘端口。The processor executes the processor-executable instructions in the memory to perform the identifying more than one STP non-edge port and more than one STP edge port, including the following operations: determine to start the loop detection function; The STP loop detection message identified by the device; identify each port that receives the STP loop detection message with other device identification in the initial loop detection period as an STP non-edge port; Each port that has not received an STP loop detection packet with other device identifiers is identified as an STP edge port.

处理器通过运行所述存储器中的处理器可执行指令用以执行所述识别一个以上的STP非边缘端口以及一个以上STP边缘端口包括以下操作:确定新的环路检测周期到达;通过记录的STP非边缘端口发送带有本设备标识的STP环路检测报文;将新的环路检测周期内收到带有其他设备标识的STP环路检测报文的每个端口识别为STP非边缘端口;将新的环路检测周期内未收到带有其他设备标识的STP环路检测报文的每个端口识别为STP边缘端口。The processor executes the processor-executable instructions in the memory to perform the identifying more than one STP non-edge port and more than one STP edge port, including the following operations: determining that a new loop detection cycle arrives; The non-edge port sends the STP loop detection message with the device identification; each port that receives the STP loop detection message with other device identification in the new loop detection period is identified as the STP non-edge port; Identify each port that has not received an STP loop detection packet with the identifier of another device within the new loop detection period as an STP edge port.

以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。The above is only a preferred embodiment of the application, and is not intended to limit the application. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the application should be included in the application. within the scope of protection.

Claims (10)

1. A method of detecting a link, the method comprising:
identifying one or more STP non-edge ports and one or more STP edge ports;
recording each of said STP edge ports identified;
blocking the reception or transmission of data messages through each of said STP edge ports.
2. The method according to claim 1, wherein the method further comprises:
transmitting STP black hole detection messages with the equipment identifier through each STP edge port;
and when any STP edge port receives the STP loop detection message with other equipment identifiers in the appointed black hole detection time, recording the STP loop detection message as an STP non-edge port and allowing the receiving or sending of the data message.
3. The method according to claim 1, wherein the method further comprises:
closing the STP edge port which does not receive the STP loop detection message with other equipment marks in the appointed black hole detection time;
and deleting the closed STP edge port from all the STP edge ports.
4. The method of claim 1, wherein the identifying one or more STP non-edge ports and one or more STP edge ports comprises
Determining to start a loop detection function;
transmitting STP loop detection messages with the equipment identifier through each port;
identifying each port of the STP loop detection message with other equipment identifiers received in the initial loop detection period as the STP non-edge port;
and identifying each port which does not receive the STP loop detection message with other equipment identifiers in the initial loop detection period as the STP edge port.
5. The method of claim 1, wherein the identifying one or more STP non-edge ports and one or more STP edge ports comprises
Determining that a new loop detection period arrives;
sending an STP loop detection message with the equipment identifier through the recorded STP non-edge port;
identifying each port of the STP loop detection message with other equipment identifiers received in the new loop detection period as the STP non-edge port;
and identifying each port which does not receive the STP loop detection message with other equipment identifiers in the new loop detection period as the STP edge port.
6. An apparatus for detecting a link, the apparatus comprising a processor and a memory; the memory is used for storing processor executable instructions; wherein the processor is configured to, by executing processor-executable instructions in the memory, perform the following:
identifying one or more STP non-edge ports and one or more STP edge ports;
recording each of said STP edge ports identified;
blocking the reception or transmission of data messages through each of said STP edge ports.
7. The apparatus of claim 6, wherein the processor is configured to, by executing processor-executable instructions in the memory, perform operations comprising:
transmitting STP black hole detection messages with the equipment identifier through each STP edge port;
and when any STP edge port receives the STP loop detection message with other equipment identifiers in the appointed black hole detection time, recording the STP loop detection message as the STP non-edge port and allowing the receiving or sending of the data message.
8. The apparatus of claim 6, wherein the processor is configured to, by executing processor-executable instructions in the memory, perform operations comprising:
closing the STP edge port which does not receive the STP loop detection message with other equipment marks in the appointed black hole detection time;
and deleting the closed STP edge port from all the STP edge ports.
9. The apparatus of claim 6, wherein the processor is configured to perform the identifying one or more STP non-edge ports and one or more STP edge ports by executing processor-executable instructions in the memory comprising:
determining to start a loop detection function;
transmitting STP loop detection messages with the equipment identifier through each port;
identifying each port of the STP loop detection message with other equipment identifiers received in the initial loop detection period as the STP non-edge port;
and identifying each port which does not receive the STP loop detection message with other equipment identifiers in the initial loop detection period as the STP edge port.
10. The apparatus of claim 6, wherein processor is configured to perform the identifying one or more STP non-edge ports and one or more STP edge ports by executing processor-executable instructions in the memory comprising:
determining that a new loop detection period arrives;
sending an STP loop detection message with the equipment identifier through the recorded STP non-edge port;
identifying each port of the STP loop detection message with other equipment identifiers received in the new loop detection period as the STP non-edge port;
and identifying each port which does not receive the STP loop detection message with other equipment identifiers in the new loop detection period as the STP edge port.
CN202310377335.4A 2023-03-31 2023-03-31 Method and equipment for detecting link Pending CN116405344A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310377335.4A CN116405344A (en) 2023-03-31 2023-03-31 Method and equipment for detecting link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310377335.4A CN116405344A (en) 2023-03-31 2023-03-31 Method and equipment for detecting link

Publications (1)

Publication Number Publication Date
CN116405344A true CN116405344A (en) 2023-07-07

Family

ID=87013827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310377335.4A Pending CN116405344A (en) 2023-03-31 2023-03-31 Method and equipment for detecting link

Country Status (1)

Country Link
CN (1) CN116405344A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075935A (en) * 2007-06-27 2007-11-21 华为技术有限公司 Method, system and apparatus for realizing loop protection
US20100039961A1 (en) * 2008-08-15 2010-02-18 Francois Edouard Tallet Optimized flush operation in response to topology changes for spanning tree protocols
CN101699799A (en) * 2009-11-13 2010-04-28 福建星网锐捷网络有限公司 Method and network equipment for preventing network loop and spanning tree protocol network system
CN102355364A (en) * 2011-08-15 2012-02-15 杭州华三通信技术有限公司 Method and device for detecting one-way fault
US20140247754A1 (en) * 2013-03-01 2014-09-04 Brocade Communications Systems, Inc. Spanning tree in fabric switches
CN105162733A (en) * 2015-09-25 2015-12-16 上海斐讯数据通信技术有限公司 Method and device for determining edge interface

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075935A (en) * 2007-06-27 2007-11-21 华为技术有限公司 Method, system and apparatus for realizing loop protection
US20100039961A1 (en) * 2008-08-15 2010-02-18 Francois Edouard Tallet Optimized flush operation in response to topology changes for spanning tree protocols
CN101699799A (en) * 2009-11-13 2010-04-28 福建星网锐捷网络有限公司 Method and network equipment for preventing network loop and spanning tree protocol network system
CN102355364A (en) * 2011-08-15 2012-02-15 杭州华三通信技术有限公司 Method and device for detecting one-way fault
US20140247754A1 (en) * 2013-03-01 2014-09-04 Brocade Communications Systems, Inc. Spanning tree in fabric switches
CN105162733A (en) * 2015-09-25 2015-12-16 上海斐讯数据通信技术有限公司 Method and device for determining edge interface

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周佳;: "网络环路的分析及对策", 电力信息化, no. 04, 15 April 2012 (2012-04-15) *

Similar Documents

Publication Publication Date Title
US10084825B1 (en) Reducing redundant operations performed by members of a cooperative security fabric
CN107547383B (en) Path detection method and device
KR101460391B1 (en) Ethernet ring network system, transmission node of ethernet ring network and intialization method thereof
US7836360B2 (en) System and method for intrusion prevention high availability fail over
CN101171809A (en) Method and system for transmitting a multicast stream over a data switching network
US20200067851A1 (en) Smart software-defined network (sdn) switch
KR102102835B1 (en) Wips sensor
CN102136960A (en) Method and device for controlling switch ports
US9843495B2 (en) Seamless migration from rapid spanning tree protocol to ethernet ring protection switching protocol
CN110121866B (en) Method, apparatus and computer-readable storage medium for loop detection and suppression
CN118741527A (en) A method and system for 5G private network core network security monitoring
CN104539348B (en) PON system link loopback detection method and device
CN112491688A (en) Loop detection method, loop detection device and readable storage medium
US11509565B2 (en) Network link verification
CN116405344A (en) Method and equipment for detecting link
CN112202756A (en) Method and system for realizing network boundary access control based on SDN technology
CN101127692B (en) A method and device for identifying and limiting network traffic
CN112020057B (en) Method and system for identifying message
CN103618630A (en) Data safe transmission method and device based on double up links
CN107545194A (en) Detection and the defence method of hardware Trojan horse are tackled in network-on-chip
CN115333994A (en) Method and device for realizing VPN route rapid convergence and electronic equipment
CN104735688A (en) Micro base station system
CN108270670A (en) A kind of loop detecting method and relevant apparatus
CN110708305B (en) Network isolation equipment and method
CN104184639A (en) Processing method and device for multi-point fault of EPRS loop circuit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination