Abstract:
Embodiments of the present disclosure provide a failure protection method based on a ring protection link, a device, and a system, and nodes in the ring protection link include a forwarding device in an SDN. The method includes: receiving, by a network controller, a high-priority failure message sent by a first node, where the failure message includes information used to indicate a failure; obtaining, according to the failure message, data information about port state changes that are of the nodes and that are caused by the failure; and sending a high-priority switching message to each of the nodes, so that each of the nodes updates a local MAC address table according to the switching message, where the switching message includes the data information about port state changes that are of the nodes and that are caused by the failure.
Abstract:
A security authentication method includes: receiving, by a control plane of a BFD device, a first BFD packet that is sent by a control plane of a peer BFD device; generating, by the control plane, a first token value according to the random nonce; sending the first token value to a data plane; receiving, by the data plane, a second BFD packet that is sent by a data plane of the peer BFD device, where the second BFD packet carries authentication information, and the authentication information includes a random nonce; and generating, by the data plane, a second token value according to the random nonce included in the authentication information and by using a calculation method the same as that of the control plane, and successfully authenticating, by the data plane, the second BFD packet if the first token value and the second token value are the same.
Abstract:
A packet transmission method includes: A first network device receives a first data packet; and the first network device updates the first data packet to obtain a second data packet, where the second data packet includes a global identifier; the first network device sends the second data packet to a second network device, where the global identifier is used by the second network device to verify the second data packet based on a correspondence, and the correspondence is a correspondence between the global identifier and an egress port through which the second network device transmits the second data packet.
Abstract:
A control method includes sending, by a controller, a created context-aware model to a context-aware engine. The context-aware model is used to define a preset control performed when target data meets a trigger condition and to instruct the context-aware engine to send indication information to the controller when the context-aware engine determines that the target data meets the trigger condition. The preset control is used to implement a context-aware function. The indication information is used to indicate that the target data meets the trigger condition. The method also includes receiving, by the controller, the indication information. The method further includes performing, by the controller, the preset control based on the indication information.
Abstract:
A security authentication method includes: receiving, by a control plane of a BFD device, a first BFD packet that is sent by a control plane of a peer BFD device; generating, by the control plane, a first token value according to the random nonce; sending the first token value to a data plane; receiving, by the data plane, a second BFD packet that is sent by a data plane of the peer BFD device, where the second BFD packet carries authentication information, and the authentication information includes a random nonce; and generating, by the data plane, a second token value according to the random nonce included in the authentication information and by using a calculation method the same as that of the control plane, and successfully authenticating, by the data plane, the second BFD packet if the first token value and the second token value are the same.
Abstract:
A link protection method in a software-defined networking (SDN), a corresponding switching device and network controller, where the method includes receiving, by a first switching device in the SDN, first information from a network controller in the SDN and link protection information, where the first information establishes a communication link between the first switching device and a destination device, and the link protection information instructs the first switching device to proactively perform primary-to-secondary link switching when a link is faulty, establishing, by the first switching device, the communication link with the destination device according to the first information, and determining, by the first switching device according to the link protection information, that the first switching device proactively performs the primary-to-secondary link switching.
Abstract:
A data transmission method, implemented by a network device, includes sending a probe packet to a log server, determining whether the log server can receive a packet responsive to whether the network device receives a probe response packet from the log server, and sending a log packet to the log server when the log server can receive a packet. The log packet includes a correspondence between a public Internet Protocol (IP) address and a private IP address.
Abstract:
A packet processing method, and a device and a system includes receiving, by a provider edge (PE) device, a first virtual extensible local area network (VxLAN) encapsulated packet sent by a network virtualization edge (NVE) device, where the PE device and the NVE device are located in a same data center (DC), and the first VxLAN encapsulated packet includes a first VxLAN network identifier (VNI); parsing, by the PE device, the first VxLAN encapsulated packet to obtain the first VNI; obtaining, according to a correspondence between a VNI and a virtual routing and forwarding (VRF) table, a first VRF table that corresponds to the first VNI; searching, by the PE device, the first VRF table for a route according to a destination Internet Protocol (IP) address of the first VxLAN encapsulated packet; and forwarding the first VxLAN encapsulated packet.
Abstract:
A method for distributing encryption information includes receiving, by a network device, a route advertisement packet. The network device generates a key based on the encryption extended information in the route advertisement packet, and generates a routing entry with an encryption attribute. The routing entry can indicate to the network device to encrypt data by using the key and then send encrypted data to a network indicated by the routing prefix.
Abstract:
A network management method. The method includes: obtaining a network type of a target network; obtaining a logical network model of the target network based on the network type and a logical network recommendation model; determining a physical network model of the target network based on the logical network model and a physical network recommendation model; and performing network configuration based on the physical network model of the target network. An advantage of the embodiments lies in that, when a user inputs the network type of the target network instead of a large quantity of detailed network configurations, a network management system can automatically establish the required target network for the user, thereby greatly improving efficiency of establishing the target network.