Abstract:
A troubleshooting method and apparatus for an edge routing bridge (RB) in a Transparent Interconnection of Lots of Links (TRILL) campus, which belong to the field of communications technologies, where the method includes detecting, by a first edge RB in a multi-homing access group, whether an access link of the first edge RB is faulty, and sending, by the first edge RB, a fault notification message to one or more other edge RBs except the first edge RB in the multi-homing access group using the TRILL campus, when the access link of the first edge RB is faulty, where the fault notification message is used to notify the one or more other edge RBs that the access link of the first edge RB is faulty, and hence effectively increase a network convergence speed and network reliability.
Abstract:
A packet forwarding method, apparatus, and system in which a host receives a first packet sent by a gateway, and parses the first packet to obtain a source IP address and a source MAC address from the first packet; queries a host cache table, when a mapping relationship between the source IP address and the source MAC address does not exist in the host cache table, saves the mapping relationship between the source IP address and the source MAC address in the host cache table; the host generates a response packet according to the first packet, and queries the host cache table to acquire a first destination MAC address corresponding to a first destination IP address that is in the response packet; and forwards, according to the first destination MAC address, the response packet to an external network by using the gateway.
Abstract:
The present invention provides a method for processing a packet on a TRILL network, relates to the field of communications, and can effectively defend against a network packet attack. The method includes: receiving a packet sent by a device on a network; if it is determined that the device is a trusted RB, giving up performing a security check on the packet coming from the device; and if it is determined that the device is not a trusted RB, performing a security check on the packet coming from the device. The present invention further provides a corresponding apparatus.
Abstract:
A method for implementing operation, administration and maintenance (OAM), a routing bridge (RB) and a Transparent Interconnection of Lots of Links (TRILL) network are described. A designated virtual local area network identifier (DVLAN ID) of a TRILL network is designated to be used for TRILL OAM, so that an inner virtual local area network identifier (VLAN ID) and an outer VLAN ID of a TRILL OAM packet are both a DVLAN ID, thereby ensuring availability of a TRILL OAM function.
Abstract:
A switch receives a first packet, where the first packet includes a source media access control MAC address. The switch obtains a first flapping count corresponding to the source MAC address. The switch determines, based on the first flapping count, whether a loop failure occurs in a network in which the switch is located. When the loop failure occurs in the network in which the switch is located, the switch obtains a flapping port set corresponding to the source MAC address. The switch determines a primary port in the plurality of ports, where the primary port is a port that must be suppressed. The switch enables a flooding suppression function on the primary port, where the flooding suppression function is used to suppress forwarding of a received flooding packet by the primary port.
Abstract:
A switch receives a first packet, where the first packet includes a source media access control MAC address. The switch obtains a first flapping count corresponding to the source MAC address. The switch determines, based on the first flapping count, whether a loop failure occurs in a network in which the switch is located. When the loop failure occurs in the network in which the switch is located, the switch obtains a flapping port set corresponding to the source MAC address. The switch determines a primary port in the plurality of ports, where the primary port is a port that must be suppressed. The switch enables a flooding suppression function on the primary port, where the flooding suppression function is used to suppress forwarding of a received flooding packet by the primary port.