Abstract:
A first network device is provided, comprising a memory storing instructions and a routing table comprising a plurality of routing entries. Each routing entry comprises a site prefix and a corresponding site identifier. The first network device further comprises at least one processor in communication with the memory. The at least one processor is configured, upon execution of the instructions, to perform the steps of: receive a first data packet, the first data packet carrying a destination address, the first network device being deployed in a first site; determine a target routing entry from the routing table based on the destination address, the destination address matching a site prefix comprised in the target routing entry, a site identifier comprised in the target routing entry identifying a second site; and send the first data packet to a second site network device deployed in the second site.
Abstract:
A first network device of a plurality of network devices is provided. The first network device is configured to receive a first data packet from a second site; search a flow table stored in the first network device for a target flow entry whose flow identifier is of a first data flow, each entry comprises a flow identifier and a corresponding outbound interface identifier, the target flow entry is created when the first site sends a second data flow to the second site, a source address of the second data flow is a destination address of the first data flow, and a destination address of the second data flow is a source address of the first data flow; and if the target flow entry is found, send the first data packet through an interface corresponding to an outbound interface identifier in the target flow entry.
Abstract:
Embodiments of the present invention relate to the communications field and disclose a method, a local gateway, and a system for local voice survivability, to implement local voice survivability without configuring a DNS proxy function on a local gateway or configuring a server on a user terminal. A specific solution is: detecting, according to a preset detection period, an activity state of a server recorded in a server monitoring list, where the server monitoring list records a voice server on an Internet protocol IP multimedia subsystem IMS network in advance; intercepting, when it is detected that all servers in the server monitoring list are in an unavailable state, a service data stream sent by a user terminal to the server; and providing a corresponding service response for the user terminal according to content of the intercepted service data stream. The present invention applies to a process of voice survivability.
Abstract:
The method includes: receiving, by a first device, a first packet from a second device, where the first packet includes a primary scheduling identifier, and the primary scheduling identifier is used to identify that the second device has permission to select a path; determining, by the first device, a first path used to transmit the first packet; sending, by the first device, a second packet to the second device by using the first path, where the second packet includes a following identifier, and the following identifier is used to identify that the first device sends the packet by using a transmission path selected by a device other than the first device. This can ensure that a same path is used for bidirectional packet transmission between two communication parties while ensuring service quality, in a complex SD-WAN path selection scenario.
Abstract:
An access control method and system and an access point. When a fault occurs in an access controller (AC), an access point (AP) configures a network-layer interface of the AP according to an Internet Protocol (IP) address and a media access control (MAC) address of the AC that are obtained by means of pre-learning, and then the AP routes a received packet to a Web server on a wireless local area network (WLAN) using the configured network-layer interface, where the packet is used by a first station (STA) to request to access an external server. Therefore, interconnection and interworking among wireless local area networks are implemented, and a breakdown of a wireless local area network caused in a centralized network architecture due to occurrence of a fault in an AC is avoided.
Abstract:
A data transmission method includes: receiving, by an access gateway, data packets; transmitting, by the access gateway, the data packets to an operator network using a digital subscriber line DSL channel; detecting, by the access gateway, a status of a bandwidth occupied when the data packets are transmitted on the DSL channel; determining, by the access gateway, that the DSL channel cannot satisfy a user requirement and some data packets need to be overflowed; and overflowing, by the access gateway to an LTE channel, the data packets needing to be overflowed, and transmitting the data packets to the operator network using the DSL channel in combination with the LTE channel.
Abstract:
The method includes: receiving, by a first device, a first packet from a second device, where the first packet includes a primary scheduling identifier, and the primary scheduling identifier is used to identify that the second device has permission to select a path; determining, by the first device, a first path used to transmit the first packet; sending, by the first device, a second packet to the second device by using the first path, where the second packet includes a following identifier, and the following identifier is used to identify that the first device sends the packet by using a transmission path selected by a device other than the first device. This can ensure that a same path is used for bidirectional packet transmission between two communication parties while ensuring service quality, in a complex SD-WAN path selection scenario.
Abstract:
Embodiments of this application disclose a method for secure communication and a device. A local device sends indication information to a peer device, to indicate the peer device to establish a key negotiation template. After establishing a same key negotiation template, the two devices respectively generate corresponding IPSec keys in IPSec aging periods based on the key negotiation template. According to the method provided in this application, each time an IPSec key needs to be negotiated, the IPSec key may be obtained based on the key negotiation template by exchanging a latest public key and indication information of a current IPSec aging period. Even in large-scale networking scenarios such as IoT, IPSec keys corresponding to IPSec aging periods can still be quickly and efficiently obtained, to implement secure communication between devices.
Abstract:
A method includes receiving, by a first network device, a first packet and a second packet, where the first packet and the second packet belong to first traffic, and all packets included in the first traffic match a first traffic differentiation rule; based on a mapping relationship between the first traffic and a first encryption policy group, encrypting, by the first network device, the first packet using a first encryption policy to obtain a third packet, and encrypting, by the first network device, the second packet using a second encryption policy to obtain a fourth packet, where the first encryption policy group includes the second encryption policy and the first encryption policy, and the first encryption policy and the second encryption policy are different encryption policies; and sending, by the first network device, the third packet and the fourth packet to a second network device.
Abstract:
An access control method and system and an access point. When a fault occurs in an access controller (AC), an access point (AP) configures a network-layer interface of the AP according to an Internet Protocol (IP) address and a media access control (MAC) address of the AC that are obtained by means of pre-learning, and then the AP routes a received packet to a Web server on a wireless local area network (WLAN) using the configured network-layer interface, where the packet is used by a first station (STA) to request to access an external server. Therefore, interconnection and interworking among wireless local area networks are implemented, and a breakdown of a wireless local area network caused in a centralized network architecture due to occurrence of a fault in an AC is avoided.