[go: up one dir, main page]

CN105812352B - Remote Visit and Control list generation and data package processing method for CM - Google Patents

Remote Visit and Control list generation and data package processing method for CM Download PDF

Info

Publication number
CN105812352B
CN105812352B CN201610098930.4A CN201610098930A CN105812352B CN 105812352 B CN105812352 B CN 105812352B CN 201610098930 A CN201610098930 A CN 201610098930A CN 105812352 B CN105812352 B CN 105812352B
Authority
CN
China
Prior art keywords
acl
wildcard
data packet
order
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610098930.4A
Other languages
Chinese (zh)
Other versions
CN105812352A (en
Inventor
李勇
饶拥军
袁立洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201610098930.4A priority Critical patent/CN105812352B/en
Publication of CN105812352A publication Critical patent/CN105812352A/en
Application granted granted Critical
Publication of CN105812352B publication Critical patent/CN105812352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to communication and network technique fields, a kind of Remote Visit and Control list generation for CM and data package processing method are provided, to be configured in interface level to CM, this method comprises: writing ACL order and ACL order being added in the TLV43 field of CM configuration file;CM downloads CM configuration file and is parsed from tftp server, and the ACL order for then obtaining parsing is stored in queue buffer;When CM interface or transmission data packet, the ACL order in queue buffer is obtained, ACL order is matched with the head information of data packet, data packet is handled according to matching result.Technical solution proposed by the present invention can guarantee network security, and promote cm device and promote network performance to the treatment effeciency of data packet, and be able to achieve the distal end flexible configuration of cm device, reduce the on-site maintenance cost of cm device.

Description

Remote Visit and Control list generation and data package processing method for CM
Technical field
It is the invention belongs to communicate and network technique field, in particular to a kind of for CM (Cable Modem, cable modulation Demodulator) Remote Visit and Control list generation and data package processing method.
Background technique
Currently, CM (Cable Modem, cable modem) largely develops from single data service to multi-service, CM On interface type it is also more and more abundant, common interface type has LAN, WLAN, WAN.
It is not directed to the method or strategy that performance, the network security of CM interface are handled, Wu Fa in the prior art Interface level realizes network flow, performance, the flexible configuration of security strategy.
Summary of the invention
[technical problems to be solved]
The object of the present invention is to provide a kind of Remote Visit and Control list generation for CM and data package processing method, with The configuration of interface level is carried out to CM.
[technical solution]
The present invention is achieved by the following technical solutions.
The present invention relates to a kind of Remote Visit and Control list generation for CM and data package processing methods, comprising steps of
A, ACL order is write according to default ACL (Access Control List, accesses control list) command format, it will ACL order is encoded by TLV and is converted into the TLV43 field that CM configuration file is added after binary coding, the CM configuration It is corresponding that file is stored in CMTS (Cable Modem Terminal Systems, Cable Modem Terminal System) On tftp server;
B, after CM is powered on and initialized, line frequency up and down is locked, CM configuration file is downloaded from tftp server and is parsed, Then ACL order parsing obtained is stored in queue buffer;
C, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order and number It is matched according to the head information of packet, data packet is handled according to matching result.
As a preferred embodiment, the step B downloads the method packet of CM configuration file from tftp server Include step:
B1, CM power-up initializing: the initialization of CM completion hardware, system interface, network protocol stack;
B2, CM scan down going channel, synchronous with CMTS foundation;
B3, ranging is carried out;
B4, establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
B5, CM obtain the address of tftp server and path, the file of configuration file in 43 field of DHCP Option Name information;
B6, CM are according to the address of the tftp server got in step B5 and path, the file name information of configuration file From the configuration file of tftp server downloading CM.
As another preferred embodiment, the ACL order in the step A includes wildcard masking, the ACL life Order further includes source address or destination address;
The step C is according to the wildcard masking in ACL order by source address or the head information of destination address and data packet It is matched.
As another preferred embodiment, the step C is by the head of wildcard masking and data packet in ACL order Information carries out matched method are as follows: if the wildcard masking in ACL order is 1, with ignoring the IP of the head information of data packet Corresponding position in location;If the wildcard masking in ACL order is 0, will be corresponding in the IP address of the head information of data packet Position in ACL order source address or destination address accurately matched.
As another preferred embodiment, default sets the permission of the data packet of non-successful match in the step C It is set to that no thoroughfare.
As another preferred embodiment, the preset ACL command format be standard ACL or extended acl,
The ACL Serial Number Range of the standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] | Any }, wherein { ip | ipv6 } indicates the IP type of ACL;{ ACL number } indicates standard ACL number, is whole between 1~99 Number;Deny | and permit } indicate the operation that acl entry executes;Source [source-wildcard] | and any } indicate source address And wildcard masking;
The ACL Serial Number Range of the extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source- wildcard[operator operand][port port-name or name]destination destination- Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are Refusal or permission or remarks;" protocol " represents communication protocol;" source source-wildcard " indicate source address with And wildcard masking;" destination destination-wildcard " indicates destination address and wildcard masking; [port port-name or name] " presentation protocol port numbers or title.
[beneficial effect]
Technical solution proposed by the present invention has the advantages that
The technical solution proposed through the invention can guarantee network security, and promote cm device and imitate to the processing of data packet Rate promotes network performance, and is able to achieve the distal end flexible configuration of cm device, reduces the on-site maintenance cost of cm device.
Detailed description of the invention
Fig. 1 is the Remote Visit and Control list generation for CM and data packet processing side that the embodiment of the present invention one provides The flow chart of method.
Specific embodiment
It to make the object, technical solutions and advantages of the present invention clearer, below will be to a specific embodiment of the invention Carry out clear, complete description.
Embodiment one
Fig. 1 is the Remote Visit and Control list generation for CM and data package processing method that the embodiment of the present invention one provides Flow chart.As shown in Figure 1, the method comprising the steps of S1 to step S3, is separately below described in detail each step.
Step S1: writing ACL order and ACL order is added in the TLV43 field of CM configuration file.
In step S1, one or several ACL orders are write according to default ACL command format, ACL order is passed through into TLV It is added after coding and binary coding in the TLV43 field of CM configuration file, wherein it is opposite to be stored in CMTS for CM configuration file On the tftp server answered.
In step S1, the ACL Serial Number Range of standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] | Any }, wherein content is essential in braces, and content is optional in square brackets, and { ip | ipv6 } indicates the IP type of ACL, and instruction is IPv4ACL (ip) or IPv6ACL (ipv6);{ ACL number } indicates standard ACL number, is the integer between 1~99; Deny | and permit } indicate the operation that acl entry executes, that is, the data for matching this rule are to allow (permit) or refuse (deny);Source [source-wildcard] | and any } indicate source address and wildcard masking, specifically, specify one IP address range, such as " 192.168.1.0 0.0.0.255 ", " host 192.168.1.1 " or " any ".
The ACL Serial Number Range of extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source- wildcard[operator operand][port port-name or name]destination destination- Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are Refusal or permission or remarks;" protocol " represents communication protocol, can be replaced with specific protocol name, such as TCP, UDP, ICMP, IP etc.;" source source-wildcard " indicates source address and wildcard masking;"destination Destination-wildcard " indicates destination address and wildcard masking;[port port-name or name] " is indicated Protocol port number or title, the effect for inputting telnet and 23 are identical.
After writing ACL order according to above-mentioned format, ACL order is added in the TLV43 field of CM configuration file.Specifically Ground, CMTS is according to 3.0 specification of DOCSIS (DOCSIS@3.0MAC and Upper Layer Protocols Interface Specification CM-SP-MULPIv3.0-I27-150528 appendix C .1.1.18.2), in Euro- Increase correlation ACL configuration item under DOCSIS vendor specific Extension Field (43) data segment.TLV 43 is DOCSIS Extension Field is to keep for the customized TLV of manufacturer (Vendor Specification), and coding is former Reason is as shown in table 1.
1 TLV 43 of table coding
Type (T) Length (L) It is worth (V) The type of value
43.8 3 0x982f3c Hexadecimal value
43.180 n Ip access-list 6permit host 192.168.5.10 Character string
43.181 n Ip access-group 6eth/0in Character string
TLV 43 needs Vendor ID, refers to first three byte of the device mac address of device manufacturer's setting, in table 1, 43.8 be Vendor ID, and 43.180 be acl rule item, and 43.181 be that ACL executes item.I.e. 43.180 be rule, and 43.181 be tool Body runs up above-mentioned rule in which interface, which side.It is to be appreciated that here 180 or 181 be all the customized number of manufacturer Value.
In the present embodiment, TLV43 coding specifically uses binary coding (simple to describe, to describe using 16 systems), on The coding for stating configuration is as follows:
0x2b4c0803982f3cb4296970206163636573732d6c6973742036207065726d697420 686f7374203139322e3136382e352e3130b51a6970206163636573732d67726f757020362065 74682f3020696e。
This coding is generated by configuration file edit tool and is saved in configuration file.
According to above-mentioned coding it is found that a total of 4 TLV fields:
First TLV field: T (0x2b=43) L (0x4c=76) V (080398...20696e).
Second field: T (0x08=43.8) L (0x03=3) V (982f3c).
Third TLV field: T (0xb4=43.180) L (0x29=41) V (697020 ... 2e3130).
4th TLV field: T (0xb5=43.181) L (0x1a=26) V (697020 ... 20696e).
After step S1 has been executed, step S2 is executed.
Step S2:CM downloads CM configuration file and is parsed from tftp server, then deposits the ACL order that parsing obtains Enqueue buffer area.
In step S2, after CM power-up initializing, line frequency up and down is locked, CM configuration file is downloaded from tftp server And parse, the ACL order for then obtaining parsing is stored in queue buffer.
Specifically, for the step by carrying out classification parsing to ACL, the order generated under the corresponding classification of ACL order is regular, The matching principle that control data bag passes through or forbids is defined in its rule, the general rule of ACL follows 3P principle, and as CM is every Kind agreement (Per-Protocol), each direction (Per-Direction), each interface (Per-Interface) configure one ACL。
Specifically, from tftp server download CM configuration file method the following steps are included:
(1), CM is powered on and initialized: the initialization of CM completion hardware, system interface, network protocol stack;
(2), CM scans down going channel, synchronous with CMTS foundation;
(3), ranging is carried out;
(4), establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
(5), CM obtains the address of tftp server and path, the file of configuration file in 43 field of DHCP Option Name information;
(6), CM believes according to the address and the path of configuration file, filename of the tftp server got in previous step Cease the configuration file from tftp server downloading CM.
Step S3: when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order It is matched with the head information of data packet, data packet is handled according to matching result.
In step S3, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, ACL is ordered Order is matched with the head information of data packet, handles data packet according to matching result.Need to extract the order in ACL before matching Configuration item extracts the TLV43 field corresponding to this CM (meeting this CM vendor id), it is also necessary to carry out packet header to data packet Data field parsing, extracts the information such as agreement, direction, source/destination address, the port of data frame.In addition, the step according to Wildcard masking in ACL order matches source address or destination address with the head information of data packet.Method particularly includes: such as Wildcard masking in fruit ACL order is 1, then ignores corresponding position in the IP address of the head information of data packet;If ACL order In wildcard masking be 0, then by the source address or mesh in corresponding position in the IP address of the head information of data packet and ACL order Mark address is accurately matched.
For example, 192.168.1.0 0.0.0.255: all IP in matching 192.168.1.0~192.168.1.255;
192.168.0.0 0.0.255.255: matching 192.168.0.0~192.168.255.255;
192.168.16.0 0.0.7.255: due to 16 binary coding be 00,010 000,7 binary coding be 00000 111, therefore its matched IP address is 192.168.16.0~192.168.23.255;
192.168.1.0 0.0.0.254: all even number IP in matching 192.168.1.0;
192.168.1.1 0.0.0.254: all odd number IP in matching 192.168.1.0.
According to matching result, permission is set, specifically, the permission of the data packet of successful match can be set to permission or forbid, Allow to pass through if being set as allowing permission, no thoroughfare if being set as forbidding permission;The data packet of non-successful match is defaulted It is set as that no thoroughfare.
As can be seen from the above embodiments, CM is configured through the embodiment of the present invention, can guarantees network security, mentions It rises cm device and network performance is promoted to the treatment effeciency of data packet, and be able to achieve the distal end flexible configuration of cm device, reduce CM The on-site maintenance cost of equipment.
It is to be appreciated that the embodiment of foregoing description is a part of the embodiments of the present invention, rather than whole embodiments, also not It is limitation of the present invention.Based on the embodiment of the present invention, those of ordinary skill in the art are not making the creative labor premise Under every other embodiment obtained, belong to protection scope of the present invention.

Claims (4)

1. a kind of Remote Visit and Control list generation and data package processing method for CM, it is characterised in that comprising steps of
A, ACL order is write according to default ACL command format, after encoding by TLV by ACL order and be converted into binary coding It is added in the TLV43 field of cable modem CM configuration file, it is corresponding that the CM configuration file is stored in CMTS On tftp server, the ACL order includes wildcard masking, and the ACL order further includes source address or destination address;
B, after cable modem CM is powered on and initialized, line frequency up and down is locked, CM configuration is downloaded from tftp server File simultaneously parses, and the ACL order for then obtaining parsing is stored in queue buffer;
The step B method of CM configuration file is downloaded from tftp server comprising steps of
B1, CM power-up initializing: the initialization of CM completion hardware, system interface, network protocol stack;
B2, CM scan down going channel, synchronous with CMTS foundation;
B3, ranging is carried out;
B4, establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
B5, CM obtain the address of tftp server and the path of configuration file, filename letter in DHCP Option43 field Breath;
B6, CM according to the address of the tftp server got in step B5 and the path of configuration file, file name information from The configuration file of tftp server downloading CM;
C, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order and data packet Head information matched, according to matching result handle data packet, the step C according in ACL order wildcard masking will Source address or destination address are matched with the head information of data packet.
2. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature It is that the head information of the wildcard masking in ACL order and data packet is carried out matched method by the step C are as follows: if ACL Wildcard masking in order is 1, then ignores corresponding position in the IP address of the head information of data packet;If in ACL order Wildcard masking is 0, then by the source address or target in corresponding position in the IP address of the head information of data packet and ACL order Location is accurately matched.
3. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature Being to default in the step C by the priority assignation of the data packet of non-successful match is that no thoroughfare.
4. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature Be the preset ACL command format be standard ACL or extended acl,
The ACL Serial Number Range of the standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] | Any }, wherein { ip | ipv6 } indicates the IP type of ACL;{ ACL number } indicates standard ACL number, is whole between 1~99 Number;Deny | and permit } indicate the operation that acl entry executes;Source [source-wildcard] | and any } indicate source address And wildcard masking;
The ACL Serial Number Range of the extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source- wildcard[operator operand][port port-name or name]destination destination- Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are Refusal or permission or remarks;" protocol " represents communication protocol;" source source-wildcard " indicate source address with And wildcard masking;" destination destination-wildcard " indicates destination address and wildcard masking; [port port-name or name] " presentation protocol port numbers or title.
CN201610098930.4A 2016-02-23 2016-02-23 Remote Visit and Control list generation and data package processing method for CM Active CN105812352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610098930.4A CN105812352B (en) 2016-02-23 2016-02-23 Remote Visit and Control list generation and data package processing method for CM

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610098930.4A CN105812352B (en) 2016-02-23 2016-02-23 Remote Visit and Control list generation and data package processing method for CM

Publications (2)

Publication Number Publication Date
CN105812352A CN105812352A (en) 2016-07-27
CN105812352B true CN105812352B (en) 2019-07-19

Family

ID=56466381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610098930.4A Active CN105812352B (en) 2016-02-23 2016-02-23 Remote Visit and Control list generation and data package processing method for CM

Country Status (1)

Country Link
CN (1) CN105812352B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189542B (en) * 2018-09-28 2021-10-15 成都安恒信息技术有限公司 Remote desktop access method for operation and maintenance auditing system
CN109450914A (en) * 2018-11-27 2019-03-08 东莞摩米创新工场电子科技有限公司 A kind of control system based on communication technology design

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7092397B1 (en) * 2001-08-31 2006-08-15 Cisco Technology, Inc. Method and apparatus for mapping an MPLS tag to a data packet in a headend
CN102739514A (en) * 2011-04-05 2012-10-17 美国博通公司 Traffic switching in hybrid fiber coaxial (hfc) network
CN102868543A (en) * 2011-07-05 2013-01-09 彭俊 Method of emergence online of cable modem under fault of TFTP (trivial file transfer protocol) server
US8630540B1 (en) * 2007-03-20 2014-01-14 Arris Enterprises, Inc. Method and system for transporting DOCSIS communication signals over a passive optical network
WO2015077913A1 (en) * 2013-11-26 2015-06-04 华为技术有限公司 Method and device for forwarding packet in data-over-cable service interface specification system
CN105025029A (en) * 2015-07-27 2015-11-04 潍坊学院 OLT device dynamic access control list generation method and data packet processing method
WO2015196441A1 (en) * 2014-06-27 2015-12-30 华为技术有限公司 Configuration file acquisition method, apparatus and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7894445B2 (en) * 2004-10-13 2011-02-22 Csc Holdings, Inc. Method and system for redirecting networked traffic
US9460107B2 (en) * 2013-07-16 2016-10-04 International Business Machines Corporation Filename-based inference of repository actions

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7092397B1 (en) * 2001-08-31 2006-08-15 Cisco Technology, Inc. Method and apparatus for mapping an MPLS tag to a data packet in a headend
US8630540B1 (en) * 2007-03-20 2014-01-14 Arris Enterprises, Inc. Method and system for transporting DOCSIS communication signals over a passive optical network
CN102739514A (en) * 2011-04-05 2012-10-17 美国博通公司 Traffic switching in hybrid fiber coaxial (hfc) network
CN102868543A (en) * 2011-07-05 2013-01-09 彭俊 Method of emergence online of cable modem under fault of TFTP (trivial file transfer protocol) server
WO2015077913A1 (en) * 2013-11-26 2015-06-04 华为技术有限公司 Method and device for forwarding packet in data-over-cable service interface specification system
WO2015196441A1 (en) * 2014-06-27 2015-12-30 华为技术有限公司 Configuration file acquisition method, apparatus and system
CN105025029A (en) * 2015-07-27 2015-11-04 潍坊学院 OLT device dynamic access control list generation method and data packet processing method

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Acl的培训心得;Renyuchen286061;《http://www.51testing.com/html/17/181917-108680.html》;20090225;全文
Cable Modem-CMTS交互过程;李蒙;《信息工程大学学报》;20010630;全文
Cable Modem工作原理;Andyhuabing;《http://blog.csdn.net/andyhuabing/article/details/7757803》;20120718;3-5页
CMTS和CM按业务分等级部署方案的探讨;吴东喜;《有线电视技术》;20130213;全文
CMTS接入网系统方案;成都康特电子高科技公司;《百度文库》;20101005;12-14页
CMTS接入网系统方案建议书-时间截图;成都康特电子高科技公司;《百度文库》;20101005;全文
DOCSIS3_0_第三代电缆数据传输系统17;高宗敏;《有线电视技术》;20120826;全文

Also Published As

Publication number Publication date
CN105812352A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
KR100910818B1 (en) Method and system for tunneling macsec packets through non-macsec nodes
CN101288272B (en) Tunneled security groups
US7411915B1 (en) Automatically configuring switch ports with appropriate features
US7620055B1 (en) Method and apparatus for mapping an MPLS tag to a data packet in a headend
CN101674303B (en) Embedded network product programming equipment and method thereof
EP1458164A2 (en) Method, apparatus and computer readable storage medium for authentication of optical network units in an Ethernet Passive Optical Network EPON
CN107786613A (en) Broadband Remote Access Server BRAS forwards implementation method and device
CN1679263A (en) Application Level Gateway and Firewall Ruleset Download Validation
WO2005091826A3 (en) Encoding a tcp offload engine within fcp
CN101352018A (en) Distributed Network Protection
CN105812352B (en) Remote Visit and Control list generation and data package processing method for CM
US7386699B1 (en) Aligning IP payloads on memory boundaries for improved performance at a switch
CN107070765A (en) Virtual client end equipment
CN103701628A (en) Home gateway configuration management method, virtual home gateway and optical network terminal
WO2016034029A1 (en) Method and device for processing service traffic
EP3113425B1 (en) Encapsulation method for service routing packet, service forwarding entity and control plane
CN102946347A (en) Method and device for accelerating to process local data packet by using Linux system
EP2782300A1 (en) Two-layer access method, device and system in hfc network
EP3701683B1 (en) Cable modem interface mask based virtual local area network mapping
CN102055642A (en) Data message conversion method
CN101360090A (en) Application Layer Protocol Identification Method
US12021753B2 (en) Preserving quality of service (QoS) markings for downstream flows
EP2068494A1 (en) An access terminal and a method for the terminal binding to the operator
CN100579004C (en) Method and network equipment for preventing invalid message attack
WO2019042225A1 (en) User broadband access processing method, apparatus and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20160727

Assignee: Sichuan Changhong Xinwang Technology Co.,Ltd.

Assignor: SICHUAN CHANGHONG ELECTRIC Co.,Ltd.

Contract record no.: X2023980043949

Denomination of invention: Remote Access Control List Generation and Packet Processing Method for CM

Granted publication date: 20190719

License type: Common License

Record date: 20231030

EE01 Entry into force of recordation of patent licensing contract