[go: up one dir, main page]

WO2014044088A1 - L2tp网络的保护方法、装置及系统 - Google Patents

L2tp网络的保护方法、装置及系统 Download PDF

Info

Publication number
WO2014044088A1
WO2014044088A1 PCT/CN2013/080932 CN2013080932W WO2014044088A1 WO 2014044088 A1 WO2014044088 A1 WO 2014044088A1 CN 2013080932 W CN2013080932 W CN 2013080932W WO 2014044088 A1 WO2014044088 A1 WO 2014044088A1
Authority
WO
WIPO (PCT)
Prior art keywords
lac
lac device
user equipment
l2tp
faulty
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2013/080932
Other languages
English (en)
French (fr)
Inventor
范亮
梁乾灯
朱承旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2014044088A1 publication Critical patent/WO2014044088A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/28Routing or path finding of packets in data switching networks using route fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications

Definitions

  • the present invention relates to the field of communications, and in particular to a method, device, and system for protecting an L2TP network.
  • VPN virtual private network
  • the existing troubleshooting techniques are as follows: First, user backup is performed, and the access point (AN, Access Node) adopts dual uplink access dual service nodes. (SN, Service Node), where one SN is the primary device and the other SN is the standby device.
  • the primary SN access port and the standby SN backup port correspond one-to-one, and the active and standby SNs use virtual router redundancy.
  • the VRRP Virtual Router Redundancy Protocol
  • BFD Bidirectional Forwarding Detection
  • the primary SN synchronizes the accessed user information to the standby SN.
  • the standby SN receives the user information transmitted by the primary SN, the standby SN immediately sends the user information to the interface module in the form of a user table.
  • the standby SN switches to the primary SN, and the user traffic is switched to the standby SN and forwarded through the standby SN.
  • Layer 2 Tunneling Protocol (L2TP) is a widely used virtual private network technology. L2TP users first connect to the L2TP Access Concentrator (LAC) device through the access network, and then pass through the lower layer.
  • LAC L2TP Access Concentrator
  • the network's L2TP tunnel is connected to the remote L2TP network server (LNS, L2TP Network Server) device. Both the LAC and the LNS have user management functions.
  • the LNS centrally manages all L2TP users corresponding to one VPN.
  • the L2TP tunnel is between the LAC and the LNS and passes through the lower layer network device.
  • the L2TP network after the L2TP user sends the uplink user traffic, it is forwarded by the LAC and transmitted to the LNS through the L2TP tunnel through the upper layer network.
  • the user downlink traffic is forwarded through the LNS and transmitted to the LAC through the L2TP tunnel.
  • the LAC then transmits the downlink user traffic to the L2TP. user.
  • the LNS fails or the link of the LNS fails, the current L2TP session is terminated and the L2TP user needs to re-initiate the L2TP session.
  • L2TP users include enterprise network users and important private line users, which have higher priority for operators.
  • the current L2TP network protection solution includes The protection scheme when the LAC and LNS devices fail.
  • 1 is a schematic diagram of a protection scheme of a LAC device according to the related art. As shown in FIG. 1 , a protection scheme for a LAC device includes two LAC devices that are mutually active and standby, and one of the devices has an uplink and a downlink. When the link or the LAC device fails, the active and standby LAC devices are switched.
  • the L2TP tunnel and the session and the PPP (PPPoE, PPP over Ethernet) sessions on the Ethernet between the user and the LAC are switched from the current active device to the current active device. On its spare device.
  • the LNS device, the upper network device, and the lower layer network device of the L2TP network are also included.
  • the LNS device is configured to manage the current online L2TP user.
  • the LNS device sends the downlink traffic to the L2TP user through the upper-layer network device and the LAC device.
  • the lower-layer network device is located between the LAC and the user, and is configured to transmit traffic between the LAC device and the user. .
  • the above method can realize real-time backup of L2TP users, it also has certain defects.
  • users on multiple downlinks on the LAC device use the same L2TP tunnel in the uplink network.
  • the downlink will be caused.
  • the user in the L2TP tunnel and the L2TP tunnel in which it is connected are switched to another LAC device.
  • other downlinks do not fail at this time, users in other downlinks using the same tunnel must be switched and added.
  • the instability of the LAC downlink network, and the switching of L2TP tunnels also bring instability to the uplink network.
  • the L2TP network protection technology in the related art provides a L2TP network in the LAC downlink failure, forcibly switching the L2TP tunnel and other downlinks, causing the LAC to be unstable on the uplink and downlink. Protection methods, devices and systems to at least solve the above problems.
  • a method for protecting a Layer 2 tunneling protocol L2TP network including: determining, by the first access concentrator LAC device and/or the second LAC device, between the first LAC device and the user equipment The link is faulty and the L2TP tunnel is not faulty. The first LAC device forwards the traffic of the user equipment by using the second LAC device.
  • the method further includes: when the link of the user equipment is restored, the first LAC device directly forwards the traffic of the user equipment.
  • the first LAC device forwards the traffic of the user equipment by using the second LAC device, where: the first LAC device passes the message channel or the communication tunnel between the first LAC device and the second LAC device.
  • the second LAC device forwards the traffic of the user equipment, where the message channel or the communication tunnel is established before the fault occurs, or is established when the fault occurs; or the first LAC device is And forwarding, by the second LAC device, the original packet of the user equipment.
  • the method further includes: the first LAC device sending, to the second LAC device, the information of the currently online user equipment, the information of the L2TP tunnel corresponding to the currently online user equipment, and the information of the L2TP session.
  • the first LAC device determines that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, that is, the first LAC device detects the first LAC device and the When the network connectivity between the user equipments is faulty, it is determined that the link of the user equipment is faulty; the first LAC device fails to detect that the network connectivity between the first LAC device and the LNS is faulty.
  • the method further includes: determining, by the first LAC device, that the second LAC device does not fail.
  • the second LAC device determines that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, and the second LAC device obtains the first LAC device and the user.
  • the method further includes: determining, by the second LAC device, that the first LAC device does not fail.
  • the method further includes: the first LAC device detecting network connectivity between the first LAC device and the second LAC device; in the case that the network connectivity is faulty, the The first LAC device and the second LAC device perform the active/standby state switching of the user equipment on the faulty link.
  • a protection device for a Layer 2 tunneling protocol L2TP network is provided.
  • the LAC device is located in the first access concentrator, and includes: a determining module, configured to determine between the first LAC device and the user equipment. The link is faulty and the L2TP tunnel is faulty.
  • the forwarding module is configured to forward the traffic of the user equipment by using the second LAC device. Preferably, the forwarding module is further configured to forward the traffic of the user equipment directly when the link of the user equipment returns to normal.
  • the forwarding module is configured to forward, by using the message channel or the communication tunnel between the first LAC device and the second LAC device, the traffic of the user equipment by using the second LAC device, where The message channel or the communication tunnel is established before the failure occurs, or is established when the fault occurs; or is set to forward the original message of the user equipment with the second LAC device.
  • the foregoing apparatus further includes: a first sending module, configured to send, to the second LAC device, information of a currently online user equipment, information of an L2TP tunnel corresponding to the currently online user equipment, and information of an L2TP session.
  • the determining module includes: a first determining unit, configured to determine that a link of the user equipment occurs when detecting that a network connectivity between the first LAC device and the user equipment is faulty
  • the second determining unit is configured to determine that the L2TP tunnel is not determined when the network connectivity between the first LAC device and the LNS fails to be detected, and the control signaling of the L2TP tunnel does not fail. error occured.
  • the device further includes: a detecting module, configured to detect network connectivity between the first LAC device and the second LAC device; and a switching module configured to fail in the network connectivity In the case of the second LAC device, the active/standby state switching of the user equipment under the faulty link is performed.
  • a protection system for a Layer 2 tunneling protocol L2TP network including: a first access concentrator LAC device, configured to determine that a link between the first LAC device and a user equipment occurs The fault is generated, and the L2TP tunnel is not faulty, and the downlink data of the user equipment is sent to the second LAC device, and the uplink data of the user equipment sent by the second LAC device is received, and the L2TP network server LNS device sends the And the second LAC device is configured to receive the downlink data sent by the first LAC device, and forward the downlink data to the user equipment, and receive the uplink data sent by the user equipment. And forwarding the uplink data to the first LAC device.
  • the first LAC device is further configured to detect network connectivity between the first LAC device and the second LAC device, and in case the network connectivity fails, The LAC device performs the active/standby state switching of the user equipment on the faulty link.
  • the first LAC device is further configured to send, to the second LAC device, the information of the currently online user equipment, the information of the L2TP tunnel corresponding to the currently online user equipment, and the information of the L2TP session.
  • the first LAC device and/or the second LAC device determine that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, and the first LAC device forwards the user by using the second LAC device.
  • the user equipment in the other downlinks sharing the same L2TP tunnel on the first LAC device does not generate the L2TP tunnel. Switching and link switching. At the same time, LNS devices can not detect the occurrence and recovery of faults, and better realize fault protection in L2TP networks.
  • FIG. 1 is a schematic diagram of a protection scheme of a LAC device according to the related art
  • FIG. 2 is a schematic diagram of a handover scheme of an L2TP tunnel according to the related art
  • FIG. 3 is a protection system of an L2TP network according to Embodiment 1 of the present invention
  • 4 is a structural block diagram of a protection apparatus for an L2TP network according to Embodiment 1 of the present invention
  • FIG. 5 is a structural block diagram of a preferred determination module according to an embodiment of the present invention
  • FIG. 6 is a preferred embodiment of the present invention.
  • FIG. 7 is a structural block diagram of a protection apparatus of a preferred L2TP network according to an embodiment of the present invention
  • FIG. 8 is a structural block diagram of a protection apparatus of a preferred L2TP network according to an embodiment of the present invention
  • FIG. 9 is a flowchart of a method for protecting an L2TP network according to Embodiment 1 of the present invention
  • FIG. 10 is a schematic diagram of a protection system for an L2TP network according to Embodiment 2 of the present invention
  • FIG. 11 is an L2TP according to Embodiment 2 of the present invention
  • FIG. 12 is a schematic diagram of a connectivity detection mechanism according to Embodiment 2 of the present invention
  • FIG. 13 is a third embodiment of the present invention.
  • a flowchart of a method for protecting an L2TP network
  • FIG. 14 is a flowchart of a method for protecting an L2TP network according to Embodiment 4 of the present invention.
  • a method, a device, and a system for protecting an L2TP network are provided to at least solve the problem that an existing L2TP network protection technology forcibly switches an L2TP tunnel when a downlink fault of a user on the LAC side is
  • the problem of the downlink is that the user equipment in the other downlinks of the first LAC device 1 sharing the same L2TP tunnel is implemented on the basis of ensuring that the downlink fault of the first LAC device 1 does not affect the normal service of the L2TP user. L2TP tunnel switching and link switching do not occur, which better implements fault protection in L2TP networks.
  • FIG. 3 is a schematic diagram of a protection system of an L2TP network according to the first embodiment of the present invention.
  • the system mainly includes: a first LAC device 1 and a second LAC device 2.
  • the first LAC device 1 is configured to determine that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, and send the downlink data of the user equipment to the second LAC device 2, and receive the second LAC.
  • the uplink data of the user equipment sent by the device 2 is configured to receive the downlink data sent by the first LAC device 1 and forward the downlink data of the user equipment to the user equipment, and receive the uplink data sent by the user equipment. And forwarding the uplink data to the first LAC device 1.
  • the user equipment in the other downlinks of the first LAC device 1 sharing the same L2TP tunnel is implemented on the basis of ensuring that the downlink fault of the first LAC device 1 does not affect the normal service of the L2TP user. L2TP tunnel switching and link switching do not occur.
  • the LNS device does not detect the occurrence and recovery of faults, and better implements fault protection in the L2TP network.
  • the first LAC device 1 is further configured to detect network connectivity between the first LAC device 1 and the second LAC device 2, and in the event that network connectivity fails. The active/standby state switching is performed with the second LAC device 2.
  • the first LAC device 1 is further configured to send, to the second LAC device 2, the information of the currently online user equipment and the L2TP tunnel information and the L2TP session corresponding to the currently online user equipment. Information.
  • the first LAC device 1 may periodically synchronize the foregoing information to the second LAC device 2, or may send the foregoing information to the second LAC device 2 when a certain trigger condition is met, for example, when the user equipment is found to be online.
  • the first LAC device 1 may be configured to send the user equipment corresponding to the second LAC device 2 when it is determined that the link of the user equipment is faulty and the L2TP tunnel is not faulty. Information about the L2TP tunnel and information about the L2TP session.
  • the second LAC device 2 may be configured to determine that the link of the user equipment is faulty when the network connectivity between the first LAC device 1 and the user equipment is faulty, and When the L2TP tunnel fault information sent by the first LAC device 1 is not received, it is determined that the L2TP tunnel has not failed.
  • the second LAC device 2 After determining that the link between the first LAC device 1 and the user equipment is faulty and the L2TP tunnel is not faulty, the second LAC device 2 performs the active/standby state switching of the user equipment on the faulty link, and the user equipment is switched to the user equipment.
  • the second LAC device 2 is on.
  • the first LAC device 1 is the primary LAC device
  • the second LAC device 2 is the standby LAC device
  • the first LAC device 1 is the standby LAC device
  • the second LAC device 2 is the primary LAC device.
  • one or more first LAC devices 1 and one or more second LAC devices 2 may be included.
  • FIG. 4 is a structural block diagram of a protection apparatus for an L2TP network according to Embodiment 1 of the present invention.
  • the apparatus mainly includes: a determining module 10 and a forwarding module 20.
  • the determining module 10 is configured to determine that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty.
  • the forwarding module 20 is coupled to the determining module 10, and is configured to forward the user by using the second LAC device. The traffic of the device.
  • the determining module 10 determines that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, and the forwarding module 20 forwards the traffic of the user equipment by using the second LAC device to ensure the first LAC.
  • the L2TP tunnel switching and link switching are not performed on the user equipments of other downlinks sharing the same L2TP tunnel on the first LAC device. It is not aware of the occurrence and recovery of faults, and better realizes fault protection in L2TP networks.
  • FIG. 5 is a structural block diagram of a preferred determining module according to an embodiment of the present invention. As shown in FIG.
  • the determining module 10 may include: a first determining unit 102, configured to detect between the first LAC device and the user equipment. When the network connectivity fails, the link of the user equipment is determined to be faulty.
  • the second determining unit 104 is coupled to the first determining unit 102, and is configured to detect that network connectivity between the first LAC device and the LNS is not detected. If the fault occurs and the control signaling of the L2TP tunnel does not fail, it is determined that the L2TP tunnel has not failed. With the preferred embodiment, the connectivity between the devices in the L2TP network is detected, and the L2TP network protection is instantly provided, thereby improving the reliability of the L2TP network service.
  • the forwarding module 20 is configured to receive downlink data that is sent by the LNS device to the user equipment, and send the received downlink data to the second LAC device, where the second LAC device sends the user equipment.
  • the line data is forwarded to the user equipment, and is configured to receive the uplink data of the user equipment sent by the second LAC device, and send the received uplink data to the LNS device.
  • the forwarding module 20 is further configured to forward the traffic of the user equipment directly when the link of the user equipment returns to normal.
  • the forwarding module 20 is configured to receive the uplink data sent by the user equipment, transmit the received uplink data to the LNS device through the L2TP tunnel, and set the downlink data sent by the LNS device to the user equipment, and receive the downlink data. Send to user device.
  • the forwarding module 20 may be configured to forward the traffic of the user equipment by using a message channel or a communication tunnel between the first LAC device and the second LAC device, where the message channel or The communication tunnel can be established before a failure occurs or it can be established in the event of a failure.
  • the foregoing message channel may be a TCP connection.
  • FIG. 6 is a block diagram showing the structure of a protection apparatus for a preferred L2TP network according to an embodiment of the present invention.
  • the apparatus may further include: a detection module 30 coupled to the forwarding module 20 and configured to detect the first LAC.
  • the network connectivity between the device and the second LAC device; the switching module 40 is configured to perform the active/standby state switching with the second LAC device in the event that the network connectivity fails.
  • the network connectivity between the first LAC device and the second LAC device is detected by the preferred embodiment.
  • the detecting module 30 may be configured to detect network connectivity between the first LAC device and the LNS device, and detect network connectivity between the first LAC device and the user device.
  • the network connectivity detection mechanism used by the detection module 30 may be a bidirectional forwarding detection mechanism, or an Ethernet operation maintenance management mechanism.
  • the switching module 20 can perform the active/standby state switching with the second LAC device by running the active/standby state negotiation mechanism, for example, a virtual router redundancy protocol or an inter-rack communication protocol.
  • FIG. 7 is a block diagram showing the structure of a protection apparatus of a preferred L2TP network according to an embodiment of the present invention. As shown in FIG. 7, the apparatus may further include: a first sending module 50, configured to send a current online to the second LAC device. The information of the user equipment and the information of the L2TP tunnel and the information of the L2TP session corresponding to the currently online user equipment.
  • the information sent to the second LAC device includes not only the information of the currently online user equipment, but also the information of the L2TP tunnel and the information of the L2TP session corresponding to the currently online user equipment.
  • L2TP tunnel switching and L2TP session switching are not required.
  • FIG. 8 is a structural block diagram 3 of a preferred L2TP network protection apparatus according to an embodiment of the present invention. As shown in FIG.
  • the apparatus may further include: a second sending module 60 coupled to the determining module 10, configured to determine When the link of the user equipment is faulty and the L2TP tunnel is not faulty, the information about the L2TP tunnel and the information of the L2TP session corresponding to the user equipment are sent to the second LAC device.
  • the L2TP tunnel information and the L2TP session information corresponding to the faulty user equipment are sent to the second LAC device, so that the second LAC device knows the L2TP tunnel information and the L2TP session corresponding to the faulty user equipment.
  • the information does not require L2TP tunnel switching and L2TP session switching, which reduces the complexity of L2TP network protection.
  • FIG. 9 is a flowchart of a method for protecting an L2TP network according to the first embodiment of the present invention.
  • the method mainly includes steps S902 to S904: Step S902, the first LAC device and/or the second LAC device determine The link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty.
  • step S904 the first LAC device forwards the traffic of the user equipment by using the second LAC device.
  • the second LAC device when the first LAC device and/or the second LAC device determine that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel does not fail, the second LAC device communicates with the user equipment.
  • the L2TP tunnel switching and chain of the user equipment in the other downlinks sharing the same L2TP tunnel on the first LAC device are implemented. The switchover is performed, and the LNS device does not detect the occurrence and recovery of the fault, and better realizes the fault protection in the L2TP network.
  • the first LAC device when it is determined that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, the first LAC device detects the network connectivity between the first LAC device and the user equipment. When the fault occurs, the link of the user equipment is faulty. The first LAC device determines that the network connectivity between the first LAC device and the LNS is faulty, and the control signaling of the L2TP tunnel does not fail. The L2TP tunnel did not fail. With the preferred embodiment, the connectivity between the devices in the L2TP network is detected, and the L2TP network protection is instantly provided, thereby improving the reliability of the L2TP network service.
  • the first LAC device may further determine that the second LAC device does not fail, for example, by using a message between the first LAC device and the second LAC device.
  • the channel determines that the second LAC device has not failed.
  • the second LAC device determines that the link between the first LAC device and the user equipment is faulty and the L2TP tunnel is not faulty, and the second LAC device obtains the first LAC device and the user. When the network connectivity between the devices is faulty, it is determined that the link of the user equipment is faulty.
  • the second LAC device When the second LAC device does not receive the L2TP tunnel fault information sent by the first LAC device, it determines that the L2TP tunnel has not failed.
  • the method further includes: the second LAC device determining that the first LAC device is not faulty, for example, using the second LAC device and the first LAC device The message channel between the two determines that the second LAC device has not failed.
  • the forwarding, by the first LAC device, the traffic of the user equipment by using the second LAC device may include: receiving, by the first LAC device, downlink data that is sent by the LNS device to the user equipment, and sending the received downlink data to the second LAC.
  • the device forwards the downlink data of the user equipment to the user equipment by the second LAC device, and the first LAC device receives the uplink data of the user equipment sent by the second LAC device, and sends the received uplink data to the LNS device.
  • the method may further include: when the link of the user equipment returns to normal, the first LAC device directly communicates with the user equipment.
  • the first LAC device may receive the uplink data sent by the user equipment, transmit the received uplink data to the LNS device through the L2TP tunnel, and set the downlink data that is sent by the LNS device to the user equipment, and receive the downlink data. Send to user device.
  • the first LAC device may communicate with the user equipment by using the second LAC device by using a message channel or a communication tunnel between the first LAC device and the second LAC device, where A message channel or communication tunnel can be established before a failure occurs or it can be established in the event of a failure.
  • the foregoing message channel may be a Transmission Control Protocol (TCP) connection.
  • TCP Transmission Control Protocol
  • the first LAC device can also detect the network connectivity between the first LAC device and the second LAC device. If the network connectivity is faulty, the first LAC device can perform the active/standby state switchover with the second LAC device.
  • the network connectivity between the first LAC device and the second LAC device is detected by the preferred embodiment.
  • the first LAC device and the second device The LAC switches the active/standby state, and then switches all the user equipments on the first LAC to the second LAC.
  • the 12TP tunnel is switched to the second LAC. This ensures the stability of the L2TP network.
  • the first LAC device may also detect network connectivity between the first LAC device and the LNS device, and detect network connectivity between the first LAC device and the user device.
  • the network connectivity detection mechanism used by the first LAC device may be a bidirectional forwarding detection mechanism or an Ethernet operation maintenance management mechanism.
  • the first LAC device can perform the active/standby state switching with the second LAC device by running the active/standby state negotiation mechanism, for example, a virtual router redundancy protocol or an inter-rack communication protocol.
  • the first LAC device may further send information about the currently online user equipment to the second LAC device, before the first LAC device determines that the link of the user equipment is faulty and the L2TP tunnel does not fail. The information of the L2TP tunnel and the information of the L2TP session corresponding to the currently online user equipment.
  • the information sent to the second LAC device includes not only the information of the currently online user equipment, but also the L2TP tunnel information and the L2TP session information corresponding to the current online user equipment, so that the first LAC device passes the first
  • L2TP tunnel switching and L2TP session switching are not required.
  • the first LAC device may periodically synchronize the foregoing information to the second LAC device, or may send the foregoing information to the second LAC device when a certain trigger condition is met, for example, when the user equipment is found to be online or offline. The above information is sent to the second LAC device.
  • the information about the L2TP tunnel corresponding to the user equipment may also be sent to the second LAC device.
  • Information about the L2TP session The L2TP tunnel information and the L2TP session information corresponding to the faulty user equipment are sent to the second LAC device, so that the second LAC device knows the L2TP tunnel information and the L2TP session corresponding to the faulty user equipment.
  • the information does not require L2TP tunnel switching and L2TP session switching, which reduces the complexity of L2TP network protection.
  • the first LAC device is used as the primary LAC device and the second LAC device is used as the backup device.
  • FIG. 10 is a schematic diagram of a protection system of an L2TP network according to Embodiment 2 of the present invention. As shown in FIG. 10, the system includes: an active LAC device and a standby LAC device. The primary LAC device is configured to perform active/standby switchover with the standby LAC device when the link is faulty.
  • the standby LAC device is configured to back up the information of the current online L2TP user on the primary LAC, the information of the L2TP tunnel corresponding to the L2TP user, and the information of the L2TP session. Specifically, when the standby LAC device determines that the downlink fault of the primary device is faulty and the L2TP tunnel of the user in the link does not fail, the user status is changed to the primary user, and the uplink traffic of the user is sent to the primary LAC. device.
  • the system may include one or more primary LAC devices, and one or more standby LAC devices.
  • the primary LAC device and the standby LAC device may have a one-to-one correspondence, a multiple correspondence, a multiple correspondence, and a plurality of corresponding relationships.
  • the backup LAC device backs up the L2TP user information of the L2TP user and the information of the L2TP session.
  • the uplink and downlink traffic of the user is forwarded between the active LAC device and the standby LAC device without changing the current L2TP tunnel and L2TP session, so that users in other downlinks sharing the same L2TP tunnel on the primary LAC device are not based on ensuring that a downlink failure of the primary LAC device does not affect the normal traffic of the L2TP tunnel.
  • the active/standby switchover and link switchover occur, and the LNS device does not detect the fault occurrence and recovery, which better implements fault protection in the L2TP network.
  • a method for protecting an L2TP network is also provided, which is used to implement protection of an L2TP network in the foregoing system provided by the embodiment of the present invention.
  • the standby LAC when the primary device fails the downlink and the L2TP tunnel fails, the standby LAC sends the uplink traffic of the user to the primary LAC device and sends the L2TP tunnel to the LNS.
  • the device sends the downlink traffic of the user to the standby LAC device and sends the downlink to the user through the standby LAC device.
  • FIG. 11 is a flowchart of a method for protecting an L2TP network according to Embodiment 2 of the present invention. As shown in FIG.
  • Step S1102 The primary LAC device determines the downlink fault and the L2TP tunnel where the user is located in the link does not fail.
  • Step S1104 The standby LAC device sends the uplink traffic of the user to the primary LAC device and passes the primary L2TP tunnel. Sending to the LNS device;
  • Step S1106 The primary LAC device sends the downlink traffic of the user to the standby LAC device, and uses the standby device.
  • the downlink of the LAC device is sent to the user.
  • the standby LAC device determines that the downlink fault of the primary LAC device is faulty and the L2TP tunnel is not faulty
  • the uplink traffic of the user is sent to the primary LAC device
  • the primary LAC device sends the downlink traffic of the user to the standby device.
  • the LAC device is finally sent to the user.
  • the users in the other downlinks sharing the same L2TP tunnel on the primary LAC device are not.
  • the active/standby switchover and link switchover occur, and the LNS device does not detect the fault occurrence and recovery, which better implements fault protection in the L2TP network.
  • the active LAC device can also establish a message channel or a communication tunnel when the downlink fault is determined and the L2TP tunnel where the user is located in the link does not fail, and the user traffic is sent through the established message channel or the communication tunnel.
  • the standby LAC device backs up the information of the current online L2TP user, the information of the L2TP tunnel corresponding to the L2TP user, and the information of the L2TP session.
  • the message channel can be pre-established between the active LAC device and the standby LAC device.
  • the message channel can be a TCP connection.
  • the L2TP user information and the L2TP user are used by the primary LAC device through the pre-established message channel.
  • the corresponding L2TP tunnel information and L2TP session information are sent to the standby LAC device.
  • the connectivity detection mechanism may be run on the primary LAC device and the standby LAC device respectively. As shown in FIG.
  • the network connectivity between the primary LAC device and the standby LAC device is detected.
  • the active/standby state negotiation mechanism completes the active/standby state switchover.
  • the connectivity detection mechanism is specifically a bidirectional forwarding detection mechanism or an Ethernet operation maintenance management mechanism.
  • the active/standby negotiation mechanism includes: Virtual router redundancy protocol or inter-rack communication protocol.
  • the primary LAC device can also adopt the active/standby state negotiation mechanism, the standby LAC device, and the active LAC after detecting the fault recovery of the downlink of the primary LAC device.
  • the master LAC device switches the status of the user in the fault recovery link to the active state.
  • the L2TP network includes: LAC_1, LAC_2, and LNS devices, and an upper layer network and a lower layer network, where LAC_1 and LAC_2 use BFD to perform link state detection, and VRRP to perform LAC device state switching.
  • FIG. 13 is a flowchart of a method for protecting an L2TP network according to Embodiment 3 of the present invention. As shown in FIG. 13, the method includes steps S1302 to S1320. In step S1302, the configuration of the active/standby relationship is performed on LAC_1 and LAC_2 respectively.
  • the VRRP protocol is configured between LAC_1 and LAC_2, and the VRRP addresses are configured on LAC_1 and LAC_2, and the priority information is configured on LAC_1 and LAC_2 respectively.
  • the priority of LAC_1 is greater than the priority of LAC_2.
  • LAC_1 receives the online request of the online L2TP user and authenticates, authorizes, and charges the user request of the L2TP user.
  • the user traffic of the L2TP user is forwarded.
  • the VRRP address of the LAC_1 can be the router ID of the LAC_1 or the virtual address of the L2TP tunnel service board.
  • the VRRP address of the LAC_2 can be the router ID of the LAC_2 or the virtual address of the L2TP tunnel dedicated service board.
  • a direct link or tunnel for transmitting the downlink user traffic may be pre-established between LAC_1 and LAC_2.
  • a Generic Routing Encapsulation (GRE) tunnel is set up between LAC_1 and LAC_2, and the ORE tunnel is set to transmit the downlink user traffic.
  • GRE Generic Routing Encapsulation
  • step S1304 LAC_2 backs up the information of the online L2TP user on the LAC_1, the information of the L2TP tunnel corresponding to the L2TP user, and the information of the L2TP session. Specifically, a TCP connection is established between the LAC_1 and the LAC_2 as a message channel. After the message channel is established, the LAC_1 can send the information of the online L2TP user and the L2TP tunnel information and the L2TP session information of the L2TP user to the LAC_2. And save.
  • Step S1306 Run the BFD protocol on LAC_1 and LAC_2 to detect the network between LAC_1 and LAC_2, between LAC_1 and LNS, between LAC_2 and LNS, between LAC_1 and the underlying network device, and between LAC_2 and the underlying network device. Connectivity. Specifically, configure the BFD address of LAC_1 and LAC_2 on both LAC_1 and LAC_2. Configure the BFD address of LAC_1 as the router ID or the virtual address of the L2TP tunnel service board. Configure the BFD address of LAC_2 as its router ID or L2TP tunnel. The virtual address of the dedicated service board.
  • the LAC_1 and LAC_2 run the BFD session based on the configured BFD session to detect the network connectivity between LAC_1 and LAC_2.
  • the virtual address is then advertised between the LAC_1 and the LNS based on the configured BFD session.
  • the BFD protocol is used to detect the network connectivity between LAC_1 and the LNS.
  • Configure the BFD address of the LAC_1 as the router ID or the virtual address of the L2TP tunnel. Or other reachable IP addresses.
  • the LAC_1 and the lower-layer network device run the BFD protocol based on the configured BFD address to detect the network connectivity between the LAC_1 and the lower-layer network device.
  • Configure the BFD address of the LAC_1 as the router ID or the virtual address of the L2TP tunnel service board.
  • the virtual address is then advertised between the LAC_2 and the LNS based on the configured BFD session.
  • the BFD protocol is used to detect the network connectivity between the LAC_2 and the LNS.
  • Configure the BFD address of the lower-layer network device as the loopback address. Or other reachable IP addresses.
  • the LAC_2 and the underlying network device run the BFD protocol based on the configured BFD address to detect the network connectivity between the LAC_2 and the underlying network device.
  • the VRRP mechanism is adopted between the LAC1 and the LAC2.
  • the L2TP user active/standby status exchange on the faulty downlink is complete. The user is switched to the active state on LAC_2, and LAC_1 switches the user to the standby state.
  • Step S 1310 The LAC_2 device sends a Gratuitous ARP packet to the lower layer network device to notify the state switching user of the downlink handover.
  • LAC_2 sends the uplink traffic of the user sent from the lower layer network device to the LAC_1 device through the pre-configured tunnel, and the downlink traffic sent by the LAC_1 device through the pre-configured tunnel is sent to the user through the downlink.
  • the LAC_1 device sends the traffic from the LAC_2 device to the LNS device through the primary L2TP tunnel, and the downlink traffic sent from the L2TP tunnel to the LAC_2 device through the pre-configured tunnel.
  • step S1316 when the LAC_1 device detects a connectivity fault between the LAC_1 and the LNS device, the LAC_1 device notifies the LAC_2 device to switch between the tunnel and the active/standby state of the user, and switches the tunnel and all L2TP users adopting the tunnel to the primary device on the LAC_2. Status, LAC_1 switches the above tunnel and all L2TP users adopting the tunnel to the standby state.
  • the LAC_2 device sends a Gratuitous ARP packet to the lower layer network device to notify the downlink switchover of all the state switching users, and sends the route refresh message to the upper layer network, and carries the LAC end address information of the L2TP tunnel that is backed up by the LAC_2, that is, LAC_1. Address information.
  • LAC_2 sends the uplink traffic of the user from the lower-layer network device to the LNS device through the L2TP tunnel, and the downlink traffic of the user that is sent from the LNS device through the L2TP tunnel is sent to the user through the downlink.
  • the L2TP network may include: LAC_1, LAC_2, and LNS devices, and an upper layer network and a lower layer network, where LAC_1 and LAC_2 use BFD to perform link state detection, and VRRP to perform LAC device status.
  • FIG. 14 is a flowchart of a method for protecting an L2TP network according to Embodiment 4 of the present invention. As shown in FIG. 14, the method includes steps S1402 to S1420. Steps S1402 to S1414 are similar to steps S1302 to S1314 in the third embodiment, and are not described herein again.
  • Step S1416 After detecting that the link between the LAC_1 and the lower-layer network device is restored, and the LAC_1 and the LNS are not faulty, and the L2TP tunnel is in the normal state, the VRRP mechanism is used to complete the L2TP on the faulty downlink tunnel. The active/standby status of the user is exchanged. The user is switched to the active state on LAC_1, and LAC_2 switches the user to the standby state.
  • Step S1418 The LAC_1 device sends a Gratuitous ARP packet to the lower layer network device to notify the state switching user of the downlink handover.
  • LAC_1 sends the uplink traffic of the user sent from the lower layer network device to the LNS device through the L2TP tunnel, and the downlink traffic of the user sent from the LNS device through the L2TP tunnel is sent to the user through the downlink.
  • the primary LAC device is used to ensure that a downlink fault of the primary LAC device does not affect the normal services of the L2TP user.
  • the users in other downlinks that share the same L2TP tunnel do not have active/standby switchover and link switchover.
  • the LNS device does not detect the occurrence and recovery of faults, and better implements fault protection in the L2TP network.
  • the computing device may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明公开了一种L2TP网络的保护方法、装置及系统,其中,该方法包括:第一LAC设备和/或第二LAC设备确定第一LAC设备与用户设备间的链路出现故障且L2TP隧道未出现故障;第一LAC设备通过第二LAC设备转发上述用户设备的流量。通过本发明,在确保第一LAC设备的下行链路故障不影响L2TP用户的正常业务的基础上,实现了第一LAC设备上共享同一L2TP隧道的其它下行链路中的用户设备不发生L2TP隧道切换和链路切换,同时LNS设备感知不到故障的发生和恢复,更好的实现了L2TP网络中的故障保护。

Description

L2TP网络的保护方法、 装置及系统
技术领域 本发明涉及通信领域, 具体而言, 涉及一种 L2TP网络的保护方法、 装置及系统。 背景技术 在虚拟专用网络 (VPN, Virtual Private Network) 中, 现有使用的故障排除技术, 主要过程如下: 首先进行用户备份, 使接入点 (AN, Access Node) 采用双上行接入 双服务节点 (SN, Service Node), 其中, 一台 SN是主用设备, 另一台 SN是备用设 备, 主用 SN的接入端口和备用 SN的备份端口一一对应, 主备 SN采用虚拟路由器冗 余协议(VRRP, Virtual Router Redundancy Protocol)和双向转发检测(BFD, Bidirectional Forwarding Detection) 技术来切换状态。 主用 SN把接入的用户信息同步到备用 SN, 备用 SN收到主用 SN传递的用户信息时,备用 SN马上将该用户信息以用户表的方式 下发到接口模块。 当主用 SN接入端口下接入用户的链路故障或主用 SN整机故障时, 备用 SN切换成主用 SN, 用户流量切换到备用 SN, 并通过备用 SN转发。 二层隧道协议(L2TP, Layer 2 Tunneling Protocol)技术是一种使用十分广泛的虚 拟专用网络技术, L2TP用户首先通过接入网络连接到 L2TP访问集中器( LAC, L2TP Access Concentrator) 设备, 再通过下层网络的 L2TP隧道连接到远端的 L2TP网络服 务器(LNS, L2TP Network Server)设备上。其中, LAC和 LNS都具有用户管理功能, LNS集中管理一个 VPN对应的所有 L2TP用户, L2TP隧道在 LAC与 LNS之间, 经 过下层网络设备。 在 L2TP网络中, L2TP用户发出上行用户流量后, 经由 LAC转发, 通过 L2TP 隧道经上层网络传送到 LNS; 用户下行流量经由 LNS转发, 通过 L2TP隧道传送到 LAC, LAC再将下行用户流量传送到 L2TP用户。 在 LNS发生故障或 LNS所在链路 发生故障时, 当前的 L2TP会话就会终止, L2TP用户需要重新发起 L2TP会话。
L2TP 用户中包括企业网用户、 重要的专线用户等对运营商来说优先级较高的用 户, 为了保障 L2TP用户的实时在线、 提升 L2TP用户的服务质量, 当前的 L2TP网络 保护方案中包括了对于 LAC、 LNS两种设备出现故障时的保护方案。 图 1是根据相关技术的 LAC设备的保护方案的示意图, 如图 1所示, 对于 LAC 设备的保护方案, 包括两台互为主备的 LAC设备, 当其中一台设备的上行链路、下行 链路或 LAC设备本身发生故障时, 实现主备 LAC设备的切换, L2TP隧道和会话以及 用户与 LAC设备间的所有以太网上的 PPP (PPPoE, PPP over Ethernet)会话都从当前 主用设备切换到其备用设备上。除可以包含上述的主用 LAC设备和备用 LAC设备外, 还包含 L2TP网络的 LNS设备、 上层网络设备和下层网络设备。 其中, LNS设备设置 为管理当前在线的 L2TP用户, LNS设备经过上层网络设备和 LAC设备向 L2TP用户 发送下行流量, 下层网络设备位于 LAC与用户之间, 设置为在 LAC设备与用户之间 传输流量。 上述方法虽然能够实现 L2TP用户的实时备份, 但也存在一定的缺陷。 例如, 现 网中在 LAC设备上往往多个下行链路中的用户在上行网络中采用同一个 L2TP隧道承 载, 如图 2所示, 当一个下行链路发生故障时, 将导致该下行链路中的用户及其所在 的 L2TP隧道切换到另一台 LAC设备上, 而尽管此时其它下行链路并未发生故障, 采 用同一隧道的其它下行链路下的用户也必须随之切换、增加了 LAC下行网络的不稳定 因素, 同时 L2TP隧道的切换也带来了上行网络的不稳定。 发明内容 针对相关技术中的 L2TP网络保护技术在 LAC下行链路故障时, 强制切换 L2TP 隧道及其它下行链路, 导致 LAC上下行链路不稳定的问题,本发明实施例提供了一种 L2TP网络的保护方法、 装置及系统, 以至少解决上述问题。 根据本发明实施例的一个方面, 提供了一种二层隧道协议 L2TP网络的保护方法, 包括: 第一访问集中器 LAC设备和 /或第二 LAC设备确定所述第一 LAC设备与用户 设备间的链路出现故障且 L2TP 隧道未出现故障; 所述第一 LAC设备通过所述第二 LAC设备转发所述用户设备的流量。 优选地, 上述方法还包括: 在所述用户设备的链路恢复正常的情况下, 所述第一 LAC设备直接转发所述用户设备的流量。 优选地,所述第一 LAC设备通过所述第二 LAC设备转发用户设备的流量,包括: 所述第一 LAC设备利用与所述第二 LAC设备之间的消息通道或通信隧道通过所述第 二 LAC设备转发所述用户设备的流量,其中,所述消息通道或所述通信隧道是在出现 所述故障之前建立的, 或者在出现所述故障时建立的; 或者所述第一 LAC设备与所述 第二 LAC设备之间转发所述用户设备的原始报文。 优选地, 所述方法还包括: 所述第一 LAC设备向所述第二 LAC设备发送当前在 线的用户设备的信息以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的 信息。 优选地, 第一 LAC设备确定所述第一 LAC设备与用户设备间的链路出现故障且 L2TP隧道未出现故障,包括:所述第一 LAC设备在检测到所述第一 LAC设备与所述 用户设备之间的网络连通性出现故障时, 确定所述用户设备的链路出现故障; 所述第 一 LAC设备在未检测到所述第一 LAC设备与 LNS之间的网络连通性出现故障,且所 述 L2TP隧道的控制信令未出现故障时, 确定所述 L2TP隧道未出现故障。 优选地, 所述第一 LAC设备通过所述第二 LAC设备转发所述用户设备的流量之 前, 还包括: 所述第一 LAC设备确定所述第二 LAC设备未出现故障。 优选地, 第二 LAC设备确定所述第一 LAC设备与用户设备间的链路出现故障且 L2TP隧道未出现故障,包括:所述第二 LAC设备获取到所述第一 LAC设备与所述用 户设备之间的网络连通性出现故障时, 确定所述用户设备的链路出现故障; 所述第二 LAC设备在未收到第一 LAC设备发送的 L2TP隧道故障信息时, 确定 所述 L2TP隧道未出现故障。 优选地, 所述第一 LAC设备通过所述第二 LAC设备转发所述用户设备的流量之 前, 还包括: 所述第二 LAC设备确定所述第一 LAC设备未出现故障。 优选地, 所述方法还包括: 所述第一 LAC设备检测所述第一 LAC设备与所述第 二 LAC设备之间的网络连通性;在所述网络连通性出现故障的情况下,所述第一 LAC 设备与所述第二 LAC设备进行故障链路下用户设备的主备状态切换。 根据本发明实施例的另一个方面, 提供了一种二层隧道协议 L2TP网络的保护装 置, 位于第一访问集中器 LAC设备, 包括: 确定模块, 设置为确定第一 LAC设备与 用户设备间的链路出现故障且 L2TP隧道未出现故障;转发模块,设置为通过第二 LAC 设备转发所述用户设备的流量。 优选地, 所述转发模块, 还设置为在所述用户设备的链路恢复正常的情况下, 直 接转发所述用户设备的流量。 优选地, 所述转发模块, 设置为利用所述第一 LAC设备与所述第二 LAC设备之 间的消息通道或通信隧道通过所述第二 LAC设备转发所述用户设备的流量,其中,所 述消息通道或所述通信隧道是在出现所述故障之前建立的, 或者在出现所述故障时建 立的; 或者设置为与所述第二 LAC设备之间转发所述用户设备的原始报文。 优选地, 上述装置还包括: 第一发送模块, 设置为向所述第二 LAC设备发送当前 在线的用户设备的信息以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话 的信息。 优选地, 所述确定模块, 包括: 第一确定单元, 设置为在检测到所述第一 LAC设 备与所述用户设备之间的网络连通性出现故障时,确定所述用户设备的链路出现故障; 第二确定单元, 设置为在未检测到所述第一 LAC设备与 LNS之间的网络连通性出现 故障, 且所述 L2TP隧道的控制信令未出现故障时, 确定所述 L2TP隧道未出现故障。 优选地于, 所述装置还包括: 检测模块, 设置为检测所述第一 LAC设备与所述第 二 LAC设备之间的网络连通性; 切换模块, 设置为在所述网络连通性出现故障的情况 下, 与所述第二 LAC设备进行故障链路下所述用户设备的主备状态切换。 根据本发明实施例的有一个方面, 提供了一种二层隧道协议 L2TP网络的保护系 统, 包括: 第一访问集中器 LAC设备, 设置为确定所述第一 LAC设备与用户设备的 链路出现故障且 L2TP隧道未出现故障, 向第二 LAC设备发送所述用户设备的下行数 据, 以及接收所述第二 LAC设备发送的所述用户设备的上行数据, 并向 L2TP网络服 务器 LNS设备发送所述上行数据; 所述第二 LAC设备, 设置为接收所述第一 LAC设 备发送的所述下行数据, 并向所述用户设备转发所述下行数据, 以及接收所述用户设 备发送的所述上行数据, 并向所述第一 LAC设备转发所述上行数据。 优选地,所述第一 LAC设备,还设置为检测所述第一 LAC设备与所第二 LAC设 备之间的网络连通性, 并在所述网络连通性出现故障的情况下, 与所述第二 LAC设备 进行故障链路下所述用户设备的主备状态切换。 优选地, 所述第一 LAC设备, 还设置为向所述第二 LAC设备发送当前在线的用 户设备的信息以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。 通过本发明实施例, 第一 LAC设备和 /或第二 LAC设备确定第一 LAC设备与用 户设备间的链路出现故障且 L2TP隧道未出现故障, 第一 LAC设备通过第二 LAC设 备转发该用户设备的流量, 在确保第一 LAC设备的下行链路故障不影响 L2TP用户的 正常业务的基础上, 实现了第一 LAC设备上共享同一 L2TP隧道的其它下行链路中的 用户设备不发生 L2TP隧道切换和链路切换, 同时 LNS设备感知不到故障的发生和恢 复, 更好的实现了 L2TP网络中的故障保护。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中- 图 1是根据相关技术的 LAC设备的保护方案的示意图; 图 2是根据相关技术的 L2TP隧道的切换方案的示意图; 图 3是根据本发明实施例一的 L2TP网络的保护系统的示意图; 图 4是根据本发明实施例一的 L2TP网络的保护装置的结构框图; 图 5是根据本发明实施例一优选的确定模块的结构框图; 图 6是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图一; 图 7是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图二; 图 8是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图三; 图 9是根据本发明实施例一的 L2TP网络的保护方法的流程图; 图 10是根据本发明实施例二的 L2TP网络的保护系统的示意图; 图 11是根据本发明实施例二的 L2TP网络的保护方法的流程图; 图 12是根据本发明实施例二的连通性检测机制的示意图; 图 13是根据本发明实施例三的 L2TP网络的保护方法的流程图; 图 14是根据本发明实施例四的 L2TP网络的保护方法的流程图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 根据本发明实施例, 提供了一种 L2TP网络的保护方法、 装置及系统, 以至少解 决现有的 L2TP网络保护技术在 LAC侧用户下行链路故障时强制切换 L2TP隧道及其 它下行链路的问题, 在确保第一 LAC设备 1的下行链路故障不影响 L2TP用户的正常 业务的基础上, 实现第一 LAC设备 1上共享同一 L2TP隧道的其它下行链路中的用户 设备不发生 L2TP隧道切换和链路切换, 更好的实现 L2TP网络中的故障保护。 实施例一 根据本发明实施例, 提供了一种 L2TP网络的保护系统, 以至少解决现有的 L2TP 网络保护技术的上述问题。 图 3是根据本发明实施例一的 L2TP网络的保护系统的示意图, 如图 3所示, 该 系统主要包括: 第一 LAC设备 1和第二 LAC设备 2。 其中, 第一 LAC设备 1, 设置 为确定第一 LAC设备与用户设备的链路出现故障且 L2TP隧道未出现故障, 并向第二 LAC设备 2发送该用户设备的下行数据, 以及接收第二 LAC设备 2发送的上述用户 设备的上行数据; 第二 LAC设备 2, 设置为接收第一 LAC设备 1发送的下行数据, 并向用户设备转发用户设备的下行数据, 以及接收用户设备发送的上行数据, 并向第 一 LAC设备 1转发该上行数据。 通过本发明实施例, 在确保第一 LAC设备 1的下行链路故障不影响 L2TP用户的 正常业务的基础上, 实现了第一 LAC设备 1上共享同一 L2TP隧道的其它下行链路中 的用户设备不发生 L2TP隧道切换和链路切换, 同时 LNS设备感知不到故障的发生和 恢复, 更好的实现了 L2TP网络中的故障保护。 在本发明实施例的一个实施方式中, 第一 LAC设备 1, 还设置为检测第一 LAC 设备 1与第二 LAC设备 2之间的网络连通性, 并在网络连通性出现故障的情况下, 与 第二 LAC设备 2进行主备状态切换。 在本发明实施例的另一个实施方式中, 第一 LAC设备 1, 还设置为向第二 LAC 设备 2发送当前在线的用户设备的信息以及当前在线的用户设备对应的 L2TP隧道的 信息和 L2TP会话的信息。在实际应用中,第一 LAC设备 1可以周期性的向第二 LAC 设备 2同步上述信息,也可以在满足一定的触发条件时向第二 LAC设备 2发送上述信 息, 例如, 在发现用户设备上线或下线时, 向第二 LAC设备 2发送上述信息。 在本发明实施例的又一个实施方式中, 第一 LAC设备 1, 还可以设置为在确定用 户设备的链路出现故障且 L2TP隧道未出现故障时, 向第二 LAC设备 2发送该用户设 备对应的 L2TP隧道的信息和 L2TP会话的信息。 在本发明实施例中, 第二 LAC设备 2, 还可以设置为在获取到第一 LAC设备 1 与用户设备之间的网络连通性出现故障时, 确定该用户设备的链路出现故障, 以及在 未收到第一 LAC设备 1发送的 L2TP隧道故障信息时, 确定 L2TP隧道未出现故障。 第二 LAC设备 2可以在确定第一 LAC设备 1与用户设备间的链路出现故障且 L2TP 隧道未出现故障后, 进行故障链路下该用户设备的主备状态切换, 将该用户设备切换 到第二 LAC设备 2上。 在本发明实施例中,第一 LAC设备 1是主用 LAC设备,第二 LAC设备 2是备用 LAC设备; 或者, 第一 LAC设备 1是备用 LAC设备, 第二 LAC设备 2是主用 LAC 设备。优选地, 在本发明实施例中, 可以包括一个或多个第一 LAC设备 1以及一个或 多个第二 LAC设备 2。 根据本发明实施例, 还提供了一种优选的 L2TP网络的保护装置, 位于第一 LAC 设备或第二 LAC设备, 用以至少解决现有的 L2TP网络保护技术的上述问题。 图 4是根据本发明实施例一的 L2TP网络的保护装置的结构框图, 如图 4所示, 该装置主要包括: 确定模块 10和转发模块 20。 其中, 确定模块 10, 设置为确定第一 LAC设备与用户设备间的链路出现故障且 L2TP隧道未出现故障; 转发模块 20, 与确 定模块 10相耦合, 设置为通过第二 LAC设备转发上述用户设备的流量。 通过本发明实施例, 确定模块 10确定第一 LAC设备与用户设备间的链路出现故 障且 L2TP隧道未出现故障, 转发模块 20通过第二 LAC设备转发上述用户设备的流 量, 在确保第一 LAC设备的下行链路故障不影响 L2TP用户的正常业务的基础上, 实 现了第一 LAC设备上共享同一 L2TP隧道的其它下行链路中的用户设备不发生 L2TP 隧道切换和链路切换,同时 LNS设备感知不到故障的发生和恢复,更好的实现了 L2TP 网络中的故障保护。 图 5是根据本发明实施例一优选的确定模块的结构框图, 如图 5所示, 确定模块 10可以包括: 第一确定单元 102, 设置为在检测到第一 LAC设备与用户设备之间的网 络连通性出现故障时, 确定用户设备的链路出现故障; 第二确定单元 104, 与第一确 定单元 102相耦合, 设置为在未检测到第一 LAC设备与 LNS之间的网络连通性出现 故障, 且 L2TP隧道的控制信令未出现故障时, 确定 L2TP隧道未出现故障。通过本优 选实施方式,实现了检测 L2TP网络中各个设备之间的连通性,即时对 L2TP网络保护, 提高了 L2TP网络业务的可靠性。 在本发明实施例中, 转发模块 20, 设置为接收 LNS设备发送给用户设备的下行 数据, 并接收到的下行数据发送至第二 LAC设备, 由第二 LAC设备将用户设备的下 行数据转发至用户设备, 以及设置为接收第二 LAC设备发送的用户设备的上行数据, 将接收到的上行数据发送至 LNS设备。 在本发明实施例的一个优选实施方式中, 转发模块 20, 还设置为在用户设备的链 路恢复正常的情况下, 直接转发该用户设备的流量。具体地, 转发模块 20设置为接收 用户设备发送的上行数据, 将接收到的上行数据通过 L2TP隧道传输至 LNS设备, 以 及设置为接收 LNS设备发送给用户设备的下行数据,将接收到的下行数据发送至用户 设备。 通过本优选实施方式, 实现了在用户设备的链路恢复正常时, 将用户设备重新 切换到第一 LAC设备。 在本发明实施例中, 转发模块 20, 可以设置为利用第一 LAC设备与第二 LAC设 备之间的消息通道或通信隧道通过第二 LAC设备转发上述用户设备的流量,其中, 该 消息通道或通信隧道可以是在出现故障之前建立的, 也可以是在出现故障时建立的。 具体的, 上述消息通道可以是 TCP连接。 或者, 转发模块 20, 还设置为与第二 LAC 设备之间转发用户设备的原始报文, 而不通过隧道封装。 图 6是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图一, 如图 6 所示,该装置还可以包括:检测模块 30,与转发模块 20相耦合,设置为检测第一 LAC 设备与第二 LAC设备之间的网络连通性; 切换模块 40, 设置为在网络连通性出现故 障的情况下, 与第二 LAC 设备进行主备状态切换。 通过本优选实施方式, 检测第一 LAC设备与第二 LAC设备之间的网络连通性, 在第一 LAC设备与第二 LAC设备的 网络连通性出现故障时, 第一 LAC设备与第二 LAC设备进行主备状态切换, 将第一 LAC设备上的全部用户设备切换到第二 LAC设备上,并将 12TP隧道切换到第二 LAC 设备上, 从而保证了 L2TP网络的稳定性。 在本发明实施例中, 检测模块 30, 还可以设置为检测第一 LAC设备与 LNS设备 的网络连通性, 以及检测第一 LAC设备与用户设备的网络连通性。 在实际应用中,检测模块 30所使用的网络连通性检测机制可以是双向转发检测机 制, 或以太网操作维护管理机制等。切换模块 20可以通过运行主备状态协商机制与第 二 LAC设备进行主备状态切换, 例如, 虚拟路由器冗余协议或机架间通讯协议等。 图 7是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图二, 如图 7 所示, 该装置还可以包括: 第一发送模块 50, 设置为向第二 LAC设备发送当前在线 的用户设备的信息以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信 息。通过本优选实施方式, 向第二 LAC设备发送的信息不仅包括当前在线的用户设备 的信息,还包括当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息,使 得第一 LAC设备通过第二 LAC设备与用户设备进行通信时, 无需进行 L2TP隧道切 换和 L2TP会话切换。 图 8是根据本发明实施例一优选的 L2TP网络的保护装置的结构框图三, 如图 8 所示, 该装置还可以包括: 第二发送模块 60, 与确定模块 10相耦合, 设置为在确定 用户设备的链路出现故障且 L2TP隧道未出现故障时, 向第二 LAC设备发送用户设备 对应的 L2TP隧道的信息和 L2TP会话的信息。通过本优选实施方式,将出现故障的用 户设备对应的 L2TP隧道的信息和 L2TP会话的信息发送至第二 LAC设备, 使得第二 LAC设备知晓出现故障的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息, 无 需进行 L2TP隧道切换和 L2TP会话切换, 降低了 L2TP网络保护的复杂性。 根据本发明实施例, 还提供了一种 L2TP网络的保护方法, 用以在本发明实施例 提供的上述系统或装置中实现 L2TP网络的保护。 图 9是根据本发明实施例一的 L2TP网络的保护方法的流程图, 如图 9所示, 该 方法主要包括步骤 S902至步骤 S904: 步骤 S902, 第一 LAC设备和 /或第二 LAC设备确定第一 LAC设备与用户设备间 的链路出现故障且 L2TP隧道未出现故障; 步骤 S904, 第一 LAC设备通过第二 LAC设备转发上述用户设备的流量。 通过本发明实施例, 第一 LAC设备和 /或第二 LAC设备确定第一 LAC设备与用 户设备间的链路出现故障且 L2TP隧道未出现故障时, 通过第二 LAC设备与上述用户 设备进行通信, 在确保第一 LAC设备的下行链路故障不影响 L2TP用户的正常业务的 基础上, 实现了第一 LAC设备上共享同一 L2TP隧道的其它下行链路中的用户设备不 发生 L2TP隧道切换和链路切换, 同时 LNS设备感知不到故障的发生和恢复, 更好的 实现了 L2TP网络中的故障保护。 在本发明实施例中, 确定第一 LAC设备与用户设备间的链路出现故障且 L2TP隧 道未出现故障时, 可以是第一 LAC设备在检测到第一 LAC设备与用户设备之间的网 络连通性出现故障时,确定用户设备的链路出现故障; 第一 LAC设备在未检测到第一 LAC设备与 LNS之间的网络连通性出现故障,且 L2TP隧道的控制信令未出现故障时, 确定 L2TP隧道未出现故障。通过本优选实施方式,实现了检测 L2TP网络中各个设备 之间的连通性, 即时对 L2TP网络保护, 提高了 L2TP网络业务的可靠性。 优选地, 第一 LAC设备通过第二 LAC设备转发用户设备的流量之前, 第一 LAC 设备还可以确定第二 LAC设备未出现故障,例如,通过第一 LAC设备与第二 LAC设 备之间的消息通道确定第二 LAC设备未出现故障。 在本发明实施例的一个实施方式中, 第二 LAC设备确定第一 LAC设备与用户设 备间的链路出现故障且 L2TP隧道未出现故障,可以是第二 LAC设备获取到第一 LAC 设备与用户设备之间的网络连通性出现故障时, 确定用户设备的链路出现故障; 第二 LAC设备在未收到第一 LAC设备发送的 L2TP隧道故障信息时,确定 L2TP隧道未出 现故障。 优选地, 第一 LAC设备通过第二 LAC设备转发所述用户设备的流量之前, 还包 括: 第二 LAC设备确定第一 LAC设备未出现故障, 例如, 通过第二 LAC设备与第一 LAC设备之间的消息通道确定第二 LAC设备未出现故障。 在本发明实施例中, 第一 LAC设备通过第二 LAC设备转发用户设备的流量可以 包括: 第一 LAC设备接收 LNS设备发送给用户设备的下行数据, 并接收到的下行数 据发送至第二 LAC设备, 由第二 LAC设备将用户设备的下行数据转发至用户设备, 同时, 第一 LAC设备接收第二 LAC设备发送的用户设备的上行数据, 将接收到的上 行数据发送至 LNS设备。 在本发明实施例的一个优选实施方式中, 上述方法还可以包括: 在用户设备的链 路恢复正常的情况下, 第一 LAC设备直接与用户设备进行通信。 具体地, 第一 LAC 设备可以接收用户设备发送的上行数据, 将接收到的上行数据通过 L2TP隧道传输至 LNS设备, 以及设置为接收 LNS设备发送给用户设备的下行数据,将接收到的下行数 据发送至用户设备。 通过本优选实施方式, 实现了在用户设备的链路恢复正常时, 将 用户设备重新切换到第一 LAC设备。 在本发明实施例的另一个优选实施方式中, 第一 LAC设备可以利用第一 LAC设 备与第二 LAC设备之间的消息通道或通信隧道通过第二 LAC设备与用户设备进行通 信, 其中, 该消息通道或通信隧道可以是在出现故障之前建立的, 也可以是在出现故 障时建立的。 具体的, 上述消息通道可以是传输控制协议(TCP, Transmission Control Protocol) 连接。 第一 LAC设备还可以检测第一 LAC设备与第二 LAC设备之间的网络连通性;在 网络连通性出现故障的情况下, 第一 LAC设备可以与第二 LAC设备进行主备状态切 换。 通过本优选实施方式, 检测第一 LAC设备与第二 LAC设备之间的网络连通性, 在第一 LAC设备与第二 LAC设备的网络连通性出现故障时, 第一 LAC设备与第二 LAC设备进行主备状态切换, 将第一 LAC设备上的全部用户设备切换到第二 LAC设 备上, 并将 12TP隧道切换到第二 LAC设备上, 从而保证了 L2TP网络的稳定性。 在本发明实施例中,第一 LAC设备还可以检测第一 LAC设备与 LNS设备的网络 连通性, 以及检测第一 LAC设备与用户设备的网络连通性。 在实际应用中,第一 LAC设备所使用的网络连通性检测机制可以是双向转发检测 机制, 或以太网操作维护管理机制等。第一 LAC设备可以通过运行主备状态协商机制 与第二 LAC设备进行主备状态切换,例如,虚拟路由器冗余协议或机架间通讯协议等。 优选地,在本发明实施例的一个优选实施方式中,第一 LAC设备确定用户设备的 链路出现故障且 L2TP隧道未出现故障之前, 还可以向二 LAC设备发送当前在线的用 户设备的信息以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。 通过本优选实施方式,向第二 LAC设备发送的信息不仅包括当前在线的用户设备的信 息,还包括当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息,使得第 一 LAC设备通过第二 LAC设备与用户设备进行通信时, 无需进行 L2TP隧道切换和 L2TP会话切换。 在实际应用中, 第一 LAC设备可以周期性的向第二 LAC设备同步上述信息, 也 可以在满足一定的触发条件时向第二 LAC设备发送上述信息,例如,在发现用户设备 上线或下线时, 向第二 LAC设备发送上述信息。 在本发明实施例的另一个优选实施方式中,第一 LAC设备确定用户设备的链路出 现故障且 L2TP 隧道未出现故障时, 还可以向第二 LAC设备发送该用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。通过本优选实施方式, 将出现故障的用户设备 对应的 L2TP隧道的信息和 L2TP会话的信息发送至第二 LAC设备, 使得第二 LAC 设备知晓出现故障的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息,无需进行 L2TP隧道切换和 L2TP会话切换, 降低了 L2TP网络保护的复杂性。 实施例二 在本发明实施例中, 以第一 LAC设备为主用 LAC设备、 第二 LAC设备为备用
LAC设备为例, 对本发明实施例的 L2TP网络的保护方法和系统进行描述。 根据本发明实施例, 提供了一种 L2TP网络的保护系统, 以至少克服相关技术中 L2TP网络保护的缺陷。 图 10是根据本发明实施例二的 L2TP网络的保护系统的示意图, 如图 10所示, 该系统包括: 主用 LAC设备和备用 LAC设备。 主用 LAC设备, 设置为在自身或自身所在链路故障时, 与备用 LAC设备进行主 备状态切换。 特别的, 当主用 LAC 设备某一下行链路故障而该链路中的用户所在的 L2TP隧道未发生故障时,保持隧道状态不变,将发生故障的链路中的用户状态变为备 用、 并将用户的下行流量发往备用 LAC设备。 备用 LAC设备, 设置为备份主用 LAC上当前在线 L2TP用户的信息、 以及 L2TP 用户对应的 L2TP隧道的信息和 L2TP会话的信息。 特别的, 当该备用 LAC设备判断 主用设备下行链路故障且该链路中用户所在的 L2TP隧道未发生故障时, 将用户状态 变为主用、 并将用户的上行流量发往主用 LAC设备。 在本发明实施例中, 上述系统可以包括一台或多台主用 LAC设备, 以及一台或多 台备用 LAC设备。主用 LAC设备与备用 LAC设备可以是一一对应、 一多对应、 多一 对应、 以及多多对应的关系。 备用 LAC设备备份主用 LAC设备上在线 L2TP用户信 息的同时, 还备份对应 L2TP用户的 L2TP隧道的信息和 L2TP会话的信息。 在主用 LAC设备某一下行链路故障且该链路中的用户所在的 L2TP隧道未发生故 障时, 在主用 LAC设备和备用 LAC设备间进行用户上下行流量的转发, 而不需要变 更当前的 L2TP隧道和 L2TP会话, 从而在确保主用 LAC设备某一下行链路故障不影 响 L2TP用户的正常业务的基础上, 在主用 LAC设备上共享同一 L2TP隧道的其它下 行链路中的用户不发生主备切换和链路切换,同时 LNS设备感知不到故障的发生和恢 复, 更好的实现了 L2TP网络中的故障保护。 根据本发明实施例, 还提供了一种 L2TP网络的保护方法, 用以在本发明实施例 提供的上述系统中实现 L2TP网络的保护。 在本发明实施例中,主用设备下行链路故障且 L2TP隧道未发生故障时,备用 LAC 设备将用户的上行流量发往主用 LAC设备并通过主用 L2TP隧道发往 LNS设备, 主 用 LAC设备将用户的下行流量发往备用 LAC设备并通过备用 LAC设备下行链路发往 用户。 图 11是根据本发明实施例二的 L2TP网络的保护方法的流程图, 如图 11所示, 该方法主要包括步骤 S1102至步骤 S1106: 步骤 S1102, 主用 LAC设备确定下行链路故障且该链路中用户所在的 L2TP隧道 未发生故障; 步骤 S1104, 备用 LAC设备将用户的上行流量发往主用 LAC设备, 并通过主用 L2TP隧道发往 LNS设备; 步骤 S1106, 主用 LAC设备将用户的下行流量发往备用 LAC设备, 并通过备用
LAC设备下行链路发往用户。 通过本发明实施例, 备用 LAC设备判断主用 LAC设备下行链路故障且 L2TP隧 道未发生故障时, 将用户的上行流量发往主用 LAC设备, 主用 LAC设备将用户的下 行流量发往备用 LAC设备并最终发往用户, 在确保主用 LAC设备某一下行链路故障 不影响 L2TP用户的正常业务的基础上, 使主用 LAC设备上共享同一 L2TP隧道的其 它下行链路中的用户不发生主备切换和链路切换,同时 LNS设备感知不到故障的发生 和恢复, 更好的实现了 L2TP网络中的故障保护。 主用 LAC设备和备用 LAC设备间发送用户流量时,可以通过预配置的隧道进行, 也可以不进行隧道封装只发送 IP报文。 同时, 主用 LAC设备还可以在确定下行链路 故障且该链路中用户所在的 L2TP隧道未发生故障时, 建立消息通道或通信隧道, 通 过建立的消息通道或通信隧道发送用户流量。 在本发明实施例中, 备用 LAC设备备份当前在线 L2TP用户的信息、 以及 L2TP 用户对应的 L2TP隧道的信息和 L2TP会话的信息的过程。 优选地, 可以在主用 LAC 设备与备用 LAC设备之间预先建立消息通道, 例如, 上述消息通道可以是一个 TCP 连接, 通过预先建立的消息通道, 主用 LAC设备将 L2TP用户信息、 以及 L2TP用户 对应的 L2TP隧道信息和 L2TP会话信息发送到备用 LAC设备。 在本发明实施例中, 可以分别在主用 LAC设备与备用 LAC设备上运行连通性检 测机制,如图 12所示,检测主用 LAC设备与备用 LAC设备的网络连通性,主用 LAC 设备、 备用 LAC设备和下层网络设备的网络连通性, 以及主用 L2TP隧道的连通性, 在主用 LAC设备自身或主用 LAC设备的网络连通性故障时, 备用 LAC设备与主用 LAC设备之间运行主备状态协商机制, 完成主备状态切换。 优选地, 连通性检测机制 具体是双向转发检测机制或以太网操作维护管理机制。 主备状态协商机制包括: 虚拟 路由器冗余协议或机架间通讯协议。 在本发明实施例的一个优选实施方式中,主用 LAC设备还可以在检测到主用 LAC 设备下行链路的故障恢复后, 通过主备状态协商机制, 备用 LAC设备与主用 LAC设 备进行用户主备状态切换, 主用 LAC设备将故障恢复链路中用户的状态变为主用, 备 用 LAC设备将用户状态变为备用。 实施例三 在本发明实施例中, L2TP 网络包括: LAC_1、 LAC_2、 LNS设备及上层网络和 下层网络, 其中, LAC_1与 LAC_2之间以 BFD协议进行链路状态检测, 以 VRRP进 行 LAC设备状态切换。 图 13是根据本发明实施例三的 L2TP网络的保护方法的流程图, 如图 13所示, 该方法包括步骤 S1302至步骤 S1320。 步骤 S1302, 在 LAC_1与 LAC_2上分别进行主备关系配置。 具体地, 在 LAC_1与 LAC_2之间运行 VRRP协议, 在 LAC_1和 LAC_2均配置 各自的 VRRP地址, 并配置分别在 LAC_1和 LAC_2上配置优先级信息, 其中, 配置 LAC_1的优先级大于 LAC_2的优先级, 从而配置 LAC_1为主用状态, LAC_2为备用 状态, 并指定 LAC_2为 LAC_1的备用设备, LAC_1接收当前在线 L2TP用户的上线 请求并对所述 L2TP用户的用户请求进行认证、授权和计费,并对所述 L2TP用户的用 户流量进行转发。 其中, LAC_1的 VRRP地址可以是 LAC_1的路由器标识或 L2TP隧道专用业务 板的虚拟地址, LAC_2的 VRRP地址可以是 LAC_2的路由器标识或 L2TP隧道专用 业务板的虚拟地址。 在配置 VRRP地址时, 可以配置 LAC_1 的 L2TP隧道专用业务板的虚拟地址与 LAC_2的 L2TP隧道专用业务板的虚拟地址相同。 还可以在 LAC_1上配置 LAC_2为 L2TP用户下行用户流量的备份下一跳; 具体地,可以在 LAC_1与 LAC_2之间预先建 立用于传输所述下行用户流量的直连链路或隧道, 例如, 可以在 LAC_1与 LAC_2之 间预先建立一个通用路由封装协议 (GRE, Generic Routing Encapsulation) 隧道, 该 ORE隧道设置为传输所述下行用户流量。 步骤 S1304, LAC_2备份 LAC_1上在线 L2TP用户的信息、 以及对应 L2TP用户 的 L2TP隧道的信息和 L2TP会话的信息。 具体地, 在 LAC_1与 LAC_2之间建立一个 TCP连接作为消息通道, 建立消息通 道后, LAC_1可以将自身当前保存的在线 L2TP用户的信息、 以及对应 L2TP用户的 L2TP隧道信息和 L2TP会话信息发送到 LAC_2并保存。 步骤 S1306, 分别在 LAC_1与 LAC_2上运行 BFD协议, 检测 LAC_1与 LAC_2 之间、 LAC_1与 LNS之间、 LAC_2与 LNS之间、 LAC_1与下层网络设备之间、 以及 LAC_2与下层网络设备之间的网络连通性。 具体地, 在 LAC_1和 LAC_2上均配置 LAC_1和 LAC_2的 BFD地址, 其中, 配 置 LAC_1 的 BFD地址为其路由器标识或 L2TP 隧道专用业务板的虚拟地址, 配置 LAC_2的 BFD地址为其路由器标识或 L2TP隧道专用业务板的虚拟地址,然后, LAC_1 和 LAC_2之间基于已配置的 BFD地址运行 BFD协议,交互检测报文, 以检测 LAC_1 与 LAC_2之间的网络连通性。 在 LAC_1和 LNS上均配置 LAC_1和 LNS的 BFD地址, 其中, 配置 LAC_1的 BFD地址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 配置 LNS的 BFD地 址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 然后, LAC_1和 LNS之间基 于已配置的 BFD地址运行 BFD协议, 交互检测报文, 以检测 LAC_1与 LNS之间的 网络连通性。 在 LAC_1和下层网络设备上均配置 LAC_1和下层网络设备的 BFD地址, 其中, 配置 LAC_1的 BFD地址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 配置 下层网络设备的 BFD地址为环回地址或其它可达 IP地址, 然后, LAC_1和下层网络 设备之间基于已配置的 BFD地址运行 BFD协议, 交互检测报文, 以检测 LAC_1与下 层网络设备之间的网络连通性。 在 LAC_2和 LNS上均配置 LAC_2和 LNS的 BFD地址, 其中, 配置 LAC_1的 BFD地址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 配置 LNS的 BFD地 址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 然后, LAC_2和 LNS之间基 于已配置的 BFD地址运行 BFD协议, 交互检测报文, 以检测 LAC_2与 LNS之间的 网络连通性。 在 LAC_2和下层网络设备上均配置 LAC_2和下层网络设备的 BFD地址, 其中, 配置 LAC_2的 BFD地址为其路由器标识或 L2TP隧道专用业务板的虚拟地址, 配置 下层网络设备的 BFD地址为环回地址或其它可达 IP地址, 然后, LAC_2和下层网络 设备之间基于已配置的 BFD地址运行 BFD协议, 交互检测报文, 以检测 LAC_2与下 层网络设备之间的网络连通性。 步骤 S1308,在检测到 LAC_1与下层网络设备之间的链路故障、且 LAC_1与 LNS 设备间没有发生故障、 L2TP隧道状态正常时, LAC 1与 LAC 2之间通过 VRRP机制 完成故障下行链路上的 L2TP用户主备状态互换,在 LAC_2上将用户切换为主用状态, LAC_1将用户切换为备用状态。 步骤 S 1310, LAC_2设备向下层网络设备发送 Gratuitous ARP报文通告状态切换 用户所在下行链路切换。 步骤 S1312, LAC_2通过预配置的隧道将从下层网络设备上发送来的用户上行流 量发送给 LAC_1设备, 同时, 将从 LAC_1设备通过预配置的隧道发送来的用户下行 流量通过下行链路发往用户。 步骤 S1314, LAC_1设备将从 LAC_2设备发来的用户上流流量通过主用 L2TP隧 道发往 LNS设备, 同时, 将从 L2TP隧道发送来的用户下行流量通过预配置的隧道送 给 LAC_2设备。 步骤 S1316,在 LAC_1设备检测到 LAC_1与 LNS设备间的连通性故障时, LAC_1 设备通知 LAC_2设备进行隧道和用户主备状态切换, 在 LAC_2上将隧道及采用该隧 道的所有 L2TP用户切换为主用状态, LAC_1将上述隧道及采用该隧道的所有 L2TP 用户切换为备用状态。 步骤 S1318, LAC_2设备向下层网络设备发送 Gratuitous ARP报文通告所有状态 切换用户所在下行链路切换, 同时, 向上层网络发送路由刷新消息、携带 LAC_2已备 份的 L2TP隧道的 LAC端地址信息, 即 LAC_1的地址信息。 步骤 S1320, LAC_2通过 L2TP隧道将从下层网络设备从发送来的用户上行流量 发送给 LNS设备,同时将从 LNS设备通过 L2TP隧道发送来的用户下行流量通过下行 链路发往用户。 实施例四 在本发明实施例中, L2TP 网络可以包括: LAC_1、 LAC_2、 LNS 设备及上层网 络和下层网络,其中, LAC_1与 LAC_2之间以 BFD协议进行链路状态检测,以 VRRP 进行 LAC设备状态切换。 图 14是根据本发明实施例四的 L2TP网络的保护方法的流程图, 如图 14所示, 该方法包括步骤 S1402至步骤 S1420。 步骤 S1402至步骤 S1414与实施例三中的步骤 S1302至步骤 S1314相似, 在此不 再赘述。 步骤 S1416, 在检测到 LAC_1 与下层网络设备之间的链路故障恢复、 且 LAC_1 与 LNS设备间没有发生故障、 L2TP隧道状态正常时, LAC_1与 LAC_2之间通过 VRRP 机制完成故障下行隧道上的 L2TP用户主备状态互换, 在 LAC_1上将用户切换为主用 状态, LAC_2将用户切换为备用状态。 步骤 S1418, LAC_1设备向下层网络设备发送 Gratuitous ARP报文通告状态切换 用户所在下行链路切换。 步骤 S1420, LAC_1通过 L2TP隧道将从下层网络设备发送来的用户上行流量发 送给 LNS设备, 同时,将从 LNS设备通过 L2TP隧道发送来的用户下行流量通过下行 链路发往用户。 从以上的描述中, 可以看出, 本发明实施例实现了如下技术效果: 备用 LAC设备判断主用 LAC设备下行链路故障且 L2TP隧道未发生故障时, 将 用户的上行流量发往主用 LAC设备, 主用 LAC设备将用户的下行流量发往备用 LAC 设备并最终发往用户, 在确保主用 LAC设备某一下行链路故障不影响 L2TP用户的正 常业务的基础上, 使主用 LAC设备上共享同一 L2TP隧道的其它下行链路中的用户不 发生主备切换和链路切换, 同时 LNS设备感知不到故障的发生和恢复, 更好的实现了 L2TP网络中的故障保护。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权 利 要 求 书
1. 一种二层隧道协议 L2TP网络的保护方法, 包括:
第一访问集中器 LAC设备和 /或第二 LAC设备确定所述第一 LAC设备与 用户设备间的链路出现故障且 L2TP隧道未出现故障;
所述第一 LAC设备通过所述第二 LAC设备转发所述用户设备的流量。
2. 根据权利要求 1所述的方法, 其中, 还包括:
在所述用户设备的链路恢复正常的情况下,所述第一 LAC设备直接转发所 述用户设备的流量。
3. 根据权利要求 1所述的方法, 其中, 所述第一 LAC设备通过所述第二 LAC设 备转发用户设备的流量, 包括- 所述第一 LAC设备利用与所述第二 LAC设备之间的消息通道或通信隧道 通过所述第二 LAC设备转发所述用户设备的流量,其中,所述消息通道或所述 通信隧道是在出现所述故障之前建立的, 或者在出现所述故障时建立的; 或者 所述第一 LAC设备与所述第二 LAC设备之间转发所述用户设备的原始报 文。
4. 根据权利要求 1至 3中任一项所述的方法, 其中, 还包括:
所述第一 LAC设备向所述第二 LAC设备发送当前在线的用户设备的信息 以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。
5. 根据权利要求 1至 4中任一项所述的方法,其中,第一 LAC设备确定所述第一 LAC设备与用户设备间的链路出现故障且 L2TP隧道未出现故障, 包括: 所述第一 LAC设备在检测到所述第一 LAC设备与所述用户设备之间的网 络连通性出现故障时, 确定所述用户设备的链路出现故障;
所述第一 LAC设备在未检测到所述第一 LAC设备与 LNS之间的网络连通 性出现故障, 且所述 L2TP隧道的控制信令未出现故障时, 确定所述 L2TP隧 道未出现故障。
6. 根据权利要求 5所述的方法, 其中, 所述第一 LAC设备通过所述第二 LAC设 备转发所述用户设备的流量之前, 还包括: 所述第一 LAC设备确定所述第二 LAC设备未出现故障。
7. 根据权利要求 1至 4中任一项所述的方法,其中,第二 LAC设备确定所述第一 LAC设备与用户设备间的链路出现故障且 L2TP隧道未出现故障, 包括:
所述第二 LAC设备获取到所述第一 LAC设备与所述用户设备之间的网络 连通性出现故障时, 确定所述用户设备的链路出现故障;
所述第二 LAC设备在未收到第一 LAC设备发送的 L2TP隧道故障信息时, 确定所述 L2TP隧道未出现故障。
8. 根据权利要求 7所述的方法, 其中, 所述第一 LAC设备通过所述第二 LAC设 备转发所述用户设备的流量之前, 还包括:
所述第二 LAC设备确定所述第一 LAC设备未出现故障。
9. 根据权利要求 1至 3中任一项所述的方法, 其中, 还包括:
所述第一 LAC设备检测所述第一 LAC设备与所述第二 LAC设备之间的网 络连通性;
在所述网络连通性出现故障的情况下,所述第一 LAC设备与所述第二 LAC 设备进行故障链路下用户设备的主备状态切换。
10. 一种二层隧道协议 L2TP网络的保护装置, 位于第一访问集中器 LAC设备, 包 括- 确定模块, 用于确定第一 LAC设备与用户设备间的链路出现故障且 L2TP 隧道未出现故障;
转发模块, 用于通过第二 LAC设备转发所述用户设备的流量。
11. 根据权利要求 10所述的装置, 其中, 所述转发模块, 还用于在所述用户设备的 链路恢复正常的情况下, 直接转发所述用户设备的流量。
12. 根据权利要求 10所述的装置, 其中, 所述转发模块,
用于利用所述第一 LAC设备与所述第二 LAC设备之间的消息通道或通信 隧道通过所述第二 LAC设备转发所述用户设备的流量,其中,所述消息通道或 所述通信隧道是在出现所述故障之前建立的, 或者在出现所述故障时建立的; 或者
用于与所述第二 LAC设备之间转发所述用户设备的原始报文。
13. 根据权利要求 10至 12中任一项所述的装置, 其中, 还包括: 第一发送模块,用于向所述第二 LAC设备发送当前在线的用户设备的信息 以及当前在线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。
14. 根据权利要求 10至 13中任一项所述的装置, 其中, 所述确定模块, 包括: 第一确定单元,用于在检测到所述第一 LAC设备与所述用户设备之间的网 络连通性出现故障时, 确定所述用户设备的链路出现故障;
第二确定单元, 用于在未检测到所述第一 LAC设备与 LNS之间的网络连 通性出现故障, 且所述 L2TP 隧道的控制信令未出现故障时, 确定所述 L2TP 隧道未出现故障。
15. 根据权利要求 10至 12中任一项所述的装置, 其中, 还包括:
检测模块, 用于检测所述第一 LAC设备与所述第二 LAC设备之间的网络 连通性;
切换模块, 用于在所述网络连通性出现故障的情况下, 与所述第二 LAC 设备进行故障链路下所述用户设备的主备状态切换。
16. 一种二层隧道协议 L2TP网络的保护系统, 包括:
第一访问集中器 LAC设备, 用于确定所述第一 LAC设备与用户设备的链 路出现故障且 L2TP隧道未出现故障, 向第二 LAC设备发送所述用户设备的下 行数据, 以及接收所述第二 LAC 设备发送的所述用户设备的上行数据, 并向 L2TP网络服务器 LNS设备发送所述上行数据;
所述第二 LAC设备, 用于接收所述第一 LAC设备发送的所述下行数据, 并向所述用户设备转发所述下行数据, 以及接收所述用户设备发送的所述上行 数据, 并向所述第一 LAC设备转发所述上行数据。
17. 根据权利要求 16所述的系统, 其中, 所述第一 LAC设备,
还用于检测所述第一 LAC设备与所第二 LAC设备之间的网络连通性, 并 在所述网络连通性出现故障的情况下,与所述第二 LAC设备进行故障链路下所 述用户设备的主备状态切换。
18. 根据权利要求 16或 17所述的系统, 其中, 所述第一 LAC设备,
还用于向所述第二 LAC 设备发送当前在线的用户设备的信息以及当前在 线的用户设备对应的 L2TP隧道的信息和 L2TP会话的信息。
PCT/CN2013/080932 2012-09-19 2013-08-06 L2tp网络的保护方法、装置及系统 Ceased WO2014044088A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210349216.X 2012-09-19
CN201210349216.XA CN103684831B (zh) 2012-09-19 2012-09-19 L2tp网络的保护方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2014044088A1 true WO2014044088A1 (zh) 2014-03-27

Family

ID=50321216

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080932 Ceased WO2014044088A1 (zh) 2012-09-19 2013-08-06 L2tp网络的保护方法、装置及系统

Country Status (2)

Country Link
CN (1) CN103684831B (zh)
WO (1) WO2014044088A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110891009A (zh) * 2019-11-22 2020-03-17 深圳前海微众银行股份有限公司 Vpn通道组网方法、装置、设备及介质
CN115277545A (zh) * 2022-06-21 2022-11-01 浪潮通信技术有限公司 主备网络切换方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207874A (zh) * 2015-09-02 2015-12-30 中国联合网络通信集团有限公司 一种l2tp网络保护的方法及网络系统
CN113872815B (zh) * 2021-09-30 2023-11-24 新华三信息安全技术有限公司 一种故障切换方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045245A (zh) * 2009-10-20 2011-05-04 中兴通讯股份有限公司 用户接入备份时下行流量切换保护方法及备份转发系统
CN102098201A (zh) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 一种实现l2tp用户接入备份的方法及网络系统
CN102480423A (zh) * 2010-11-30 2012-05-30 中兴通讯股份有限公司 一种l2tp网络的保护方法及系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877665B (zh) * 2009-04-29 2013-12-18 华为技术有限公司 环网保护方法、网络节点及环网络

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045245A (zh) * 2009-10-20 2011-05-04 中兴通讯股份有限公司 用户接入备份时下行流量切换保护方法及备份转发系统
CN102098201A (zh) * 2009-12-14 2011-06-15 中兴通讯股份有限公司 一种实现l2tp用户接入备份的方法及网络系统
CN102480423A (zh) * 2010-11-30 2012-05-30 中兴通讯股份有限公司 一种l2tp网络的保护方法及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110891009A (zh) * 2019-11-22 2020-03-17 深圳前海微众银行股份有限公司 Vpn通道组网方法、装置、设备及介质
CN115277545A (zh) * 2022-06-21 2022-11-01 浪潮通信技术有限公司 主备网络切换方法及装置

Also Published As

Publication number Publication date
CN103684831A (zh) 2014-03-26
CN103684831B (zh) 2019-01-18

Similar Documents

Publication Publication Date Title
CN102098201B (zh) 一种实现l2tp用户接入备份的方法及网络系统
CN102480423B (zh) 一种l2tp网络的保护方法及系统
US9059902B2 (en) Procedures, apparatuses, systems, and computer-readable media for operating primary and backup network elements
US9036466B2 (en) Methods and apparatus for improving network communication using ethernet switching protection
EP2242325B1 (en) Method, system and equipment for access of a network device to a packet exchange network
CN102439903B (zh) 实现容灾备份的方法、设备及系统
JP4729119B2 (ja) ラベルスイッチングネットワークにおける通信装置
US8817601B2 (en) HVPLS hub connectivity failure recovery with dynamic spoke pseudowires
CN100512292C (zh) 一种实时恢复业务的装置及方法
US9288140B2 (en) Multichassis failover and recovery for MLPPP wireless backhaul
CN102833167B (zh) 局域网间数据传输方法和系统
CN102780635B (zh) 基于trill网络实现保护倒换的方法、tor交换机及系统
CN102546430A (zh) 网络设备冗余备份的方法、路由设备及系统
CN102142948A (zh) 一种数据转发方法、装置及系统
EP3217608B1 (en) Switchback delay methods and devices
US8879383B1 (en) Methods and apparatus for improving reliability of point-of-point network connection
WO2012024952A1 (zh) 一种基于点到多点业务的路径切换方法及系统
CN102142978B (zh) 数据备份传输处理方法、装置及系统
CN102088400A (zh) 虚拟专用网络中运营商边界设备及切换方法
WO2014044088A1 (zh) L2tp网络的保护方法、装置及系统
CN101321077A (zh) 可靠组播的方法、运营商边缘上层设备及系统
CN101242254A (zh) 虚拟冗余路由器系统及传输虚拟冗余路由协议报文的方法
CN102239670A (zh) 一种负载分担方法和装置
WO2012094884A1 (zh) 提高虚拟专用网中业务可靠性的方法及系统、接入装置
CN104917689A (zh) 一种实现按需智能拨号的方法、系统和接入路由器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13840083

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13840083

Country of ref document: EP

Kind code of ref document: A1