Abstract:
A Virtual eXtensible Local Area Network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI; receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID; adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI; and sending, by the network device, the VXLAN packet.
Abstract:
A virtual eXtensible local area network (VXLAN) method comprises obtaining, by a network device, a mapping from a virtual local area network identifier VLAN ID to a VXLAN network identifier VNI, receiving, by the network device through a port, an Ethernet frame forwarded by an access device, where a VLAN tag field in the Ethernet frame includes the VLAN ID, adding, by the network device, a VXLAN header to the Ethernet frame based on the VLAN ID and the mapping to obtain a VXLAN packet, where a VNI field in the VXLAN header includes the VNI, and sending, by the network device, the VXLAN packet.
Abstract:
A method for implementing an IP Multimedia Subsystem (IMS) registration, includes: a Home Subscriber Server (HSS) recording a current registration state of a User Equipment (UE) in response to receiving a Multimedia Authentication Request (MAR) initiated by a Service Call Session Control Function (S-CSCF) selected for the UE when a first Register request is sent by the UE; in response to receiving a second Register request initiated by an Interrogating Call Session Control Function (I-CSCF), the HSS sends the S-CSCF Name to the I-CSCF when the current registration state of the UE is an assigned S-CSCF state. By the scheme, a same S-CSCF is ensured to be used in the two User Authentication Request/User Authentication Answer (UAR/UAA) procedures of the initial IMS registration procedure, and the initial IMS registration of the UE is implemented successfully.
Abstract:
Embodiments of the present invention disclose a method and apparatus for processing a cluster in a cluster system, and a cluster system, relate to the field of communications technologies, and are invented for effectively simplifying a cluster system. The method includes: sending, by switched fabric board of a member device, a request answer signal for requesting a main control board that receives the request answer signal to answer the request answer signal; and if the switched fabric board do not receive an answer signal of the request answer signal, sending, by the switched fabric board, an address of a main monitoring module to a main control board of a main device. The present invention may be applied to a clustering technology.
Abstract:
An access control device and an authentication control method, where the method includes detecting whether a packet that arrives at an access control device is an authentication start packet, where the authentication start packet is used to start an authentication process of a terminal that sends the authentication start packet, and restricting a rate at which the access control device receives an authentication start packet. It is detected whether the packet that arrives at the access control device is an authentication start packet, and the rate at which the access control device receives the authentication start packet is restricted. The rate at which the authentication start packet is received is restricted to control a quantity of terminals that enter subsequent authentication, which avoids an avalanche effect of wireless authentication caused when an excessively large quantity of terminals enter subsequent authentication simultaneously.
Abstract:
A method includes: obtaining a service intent, where the service intent is used to indicate to perform a first network operation on the target network; obtaining a mirror simulation network corresponding to the target network; determining verification content, where the verification content is used to perform simulation verification on a running state of the mirror simulation network; performing the first network operation on the mirror simulation network based on the service intent; and performing, after the first network operation is performed on the mirror simulation network, simulation verification on the mirror simulation network based on the verification content, to obtain a first verification result, where the first verification result is used to evaluate impact of the first network operation on the target network.
Abstract:
A network configuration method, an apparatus, and a computer-readable storage medium are provided, and belong to the field of communication technologies. The method includes: A first execution device sends a device discovery message to a management device. The device discovery message is a layer 2 packet and includes a first port identifier, where a port identified by the first port identifier is a port, in an up state, of the first execution device (301). The first execution device receives a first configuration message from the management device. The first configuration message is a layer 2 packet and includes a configuration parameter for a second execution device. The configuration parameter includes an internet protocol address of the second execution device, and the second execution device is connected to the port identified by the first port identifier (303). The first execution device sends the first configuration message through the port identified by the first port identifier (302). The execution device and the management device may discover a new device by themselves, deliver a configuration parameter, and complete network configuration on the discovered device, to save a large amount of manpower and improve network configuration efficiency.
Abstract:
In a virtual extensible local area network (VXLAN) packet encapsulation and policy execution method, a communications device determines an application identifier for identifying an application type of an Ethernet frame, and places the application identifier in a VXLAN header. Another device may directly execute a corresponding policy based on the application identifier in the VXLAN header and without analyzing a packet.
Abstract:
In a virtual extensible local area network (VXLAN) packet encapsulation and policy execution method, a communications device determines an application identifier for identifying an application type of an Ethernet frame, and places the application identifier in a VXLAN header. Another device may directly execute a corresponding policy based on the application identifier in the VXLAN header and without analyzing a packet.
Abstract:
A method, an apparatus, a device, and a system for generating a Dynamic Host Configuration Protocol snooping (DHCP) Snooping binding table. The method includes: constructing a request packet for obtaining information about a DHCP client, and sending the request packet to a DHCP server; receiving a response packet corresponding to the request packet, and extracting the information about the client from the response packet, where the information about the client includes the client's Internet Protocol (IP) address and Media Access Control (MAC) address; and obtaining the client's virtual local area network (VLAN) number and ingress port number through the MAC address, and generating the DHCP Snooping binding table. The technical solutions solve the problem that traffic of some clients is lost due to a lack of a DHCP Snooping binding table of these clients in a process of enabling DHCP Snooping.