CN105812352B - Remote Visit and Control list generation and data package processing method for CM - Google Patents
Remote Visit and Control list generation and data package processing method for CM Download PDFInfo
- Publication number
- CN105812352B CN105812352B CN201610098930.4A CN201610098930A CN105812352B CN 105812352 B CN105812352 B CN 105812352B CN 201610098930 A CN201610098930 A CN 201610098930A CN 105812352 B CN105812352 B CN 105812352B
- Authority
- CN
- China
- Prior art keywords
- acl
- wildcard
- data packet
- order
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to communication and network technique fields, a kind of Remote Visit and Control list generation for CM and data package processing method are provided, to be configured in interface level to CM, this method comprises: writing ACL order and ACL order being added in the TLV43 field of CM configuration file;CM downloads CM configuration file and is parsed from tftp server, and the ACL order for then obtaining parsing is stored in queue buffer;When CM interface or transmission data packet, the ACL order in queue buffer is obtained, ACL order is matched with the head information of data packet, data packet is handled according to matching result.Technical solution proposed by the present invention can guarantee network security, and promote cm device and promote network performance to the treatment effeciency of data packet, and be able to achieve the distal end flexible configuration of cm device, reduce the on-site maintenance cost of cm device.
Description
Technical field
It is the invention belongs to communicate and network technique field, in particular to a kind of for CM (Cable Modem, cable modulation
Demodulator) Remote Visit and Control list generation and data package processing method.
Background technique
Currently, CM (Cable Modem, cable modem) largely develops from single data service to multi-service, CM
On interface type it is also more and more abundant, common interface type has LAN, WLAN, WAN.
It is not directed to the method or strategy that performance, the network security of CM interface are handled, Wu Fa in the prior art
Interface level realizes network flow, performance, the flexible configuration of security strategy.
Summary of the invention
[technical problems to be solved]
The object of the present invention is to provide a kind of Remote Visit and Control list generation for CM and data package processing method, with
The configuration of interface level is carried out to CM.
[technical solution]
The present invention is achieved by the following technical solutions.
The present invention relates to a kind of Remote Visit and Control list generation for CM and data package processing methods, comprising steps of
A, ACL order is write according to default ACL (Access Control List, accesses control list) command format, it will
ACL order is encoded by TLV and is converted into the TLV43 field that CM configuration file is added after binary coding, the CM configuration
It is corresponding that file is stored in CMTS (Cable Modem Terminal Systems, Cable Modem Terminal System)
On tftp server;
B, after CM is powered on and initialized, line frequency up and down is locked, CM configuration file is downloaded from tftp server and is parsed,
Then ACL order parsing obtained is stored in queue buffer;
C, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order and number
It is matched according to the head information of packet, data packet is handled according to matching result.
As a preferred embodiment, the step B downloads the method packet of CM configuration file from tftp server
Include step:
B1, CM power-up initializing: the initialization of CM completion hardware, system interface, network protocol stack;
B2, CM scan down going channel, synchronous with CMTS foundation;
B3, ranging is carried out;
B4, establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
B5, CM obtain the address of tftp server and path, the file of configuration file in 43 field of DHCP Option
Name information;
B6, CM are according to the address of the tftp server got in step B5 and path, the file name information of configuration file
From the configuration file of tftp server downloading CM.
As another preferred embodiment, the ACL order in the step A includes wildcard masking, the ACL life
Order further includes source address or destination address;
The step C is according to the wildcard masking in ACL order by source address or the head information of destination address and data packet
It is matched.
As another preferred embodiment, the step C is by the head of wildcard masking and data packet in ACL order
Information carries out matched method are as follows: if the wildcard masking in ACL order is 1, with ignoring the IP of the head information of data packet
Corresponding position in location;If the wildcard masking in ACL order is 0, will be corresponding in the IP address of the head information of data packet
Position in ACL order source address or destination address accurately matched.
As another preferred embodiment, default sets the permission of the data packet of non-successful match in the step C
It is set to that no thoroughfare.
As another preferred embodiment, the preset ACL command format be standard ACL or extended acl,
The ACL Serial Number Range of the standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] |
Any }, wherein { ip | ipv6 } indicates the IP type of ACL;{ ACL number } indicates standard ACL number, is whole between 1~99
Number;Deny | and permit } indicate the operation that acl entry executes;Source [source-wildcard] | and any } indicate source address
And wildcard masking;
The ACL Serial Number Range of the extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source-
wildcard[operator operand][port port-name or name]destination destination-
Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is
Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are
Refusal or permission or remarks;" protocol " represents communication protocol;" source source-wildcard " indicate source address with
And wildcard masking;" destination destination-wildcard " indicates destination address and wildcard masking;
[port port-name or name] " presentation protocol port numbers or title.
[beneficial effect]
Technical solution proposed by the present invention has the advantages that
The technical solution proposed through the invention can guarantee network security, and promote cm device and imitate to the processing of data packet
Rate promotes network performance, and is able to achieve the distal end flexible configuration of cm device, reduces the on-site maintenance cost of cm device.
Detailed description of the invention
Fig. 1 is the Remote Visit and Control list generation for CM and data packet processing side that the embodiment of the present invention one provides
The flow chart of method.
Specific embodiment
It to make the object, technical solutions and advantages of the present invention clearer, below will be to a specific embodiment of the invention
Carry out clear, complete description.
Embodiment one
Fig. 1 is the Remote Visit and Control list generation for CM and data package processing method that the embodiment of the present invention one provides
Flow chart.As shown in Figure 1, the method comprising the steps of S1 to step S3, is separately below described in detail each step.
Step S1: writing ACL order and ACL order is added in the TLV43 field of CM configuration file.
In step S1, one or several ACL orders are write according to default ACL command format, ACL order is passed through into TLV
It is added after coding and binary coding in the TLV43 field of CM configuration file, wherein it is opposite to be stored in CMTS for CM configuration file
On the tftp server answered.
In step S1, the ACL Serial Number Range of standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] |
Any }, wherein content is essential in braces, and content is optional in square brackets, and { ip | ipv6 } indicates the IP type of ACL, and instruction is
IPv4ACL (ip) or IPv6ACL (ipv6);{ ACL number } indicates standard ACL number, is the integer between 1~99;
Deny | and permit } indicate the operation that acl entry executes, that is, the data for matching this rule are to allow (permit) or refuse
(deny);Source [source-wildcard] | and any } indicate source address and wildcard masking, specifically, specify one
IP address range, such as " 192.168.1.0 0.0.0.255 ", " host 192.168.1.1 " or " any ".
The ACL Serial Number Range of extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source-
wildcard[operator operand][port port-name or name]destination destination-
Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is
Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are
Refusal or permission or remarks;" protocol " represents communication protocol, can be replaced with specific protocol name, such as TCP, UDP,
ICMP, IP etc.;" source source-wildcard " indicates source address and wildcard masking;"destination
Destination-wildcard " indicates destination address and wildcard masking;[port port-name or name] " is indicated
Protocol port number or title, the effect for inputting telnet and 23 are identical.
After writing ACL order according to above-mentioned format, ACL order is added in the TLV43 field of CM configuration file.Specifically
Ground, CMTS is according to 3.0 specification of DOCSIS (DOCSIS@3.0MAC and Upper Layer Protocols
Interface Specification CM-SP-MULPIv3.0-I27-150528 appendix C .1.1.18.2), in Euro-
Increase correlation ACL configuration item under DOCSIS vendor specific Extension Field (43) data segment.TLV 43 is
DOCSIS Extension Field is to keep for the customized TLV of manufacturer (Vendor Specification), and coding is former
Reason is as shown in table 1.
1 TLV 43 of table coding
Type (T) | Length (L) | It is worth (V) | The type of value |
43.8 | 3 | 0x982f3c | Hexadecimal value |
43.180 | n | Ip access-list 6permit host 192.168.5.10 | Character string |
43.181 | n | Ip access-group 6eth/0in | Character string |
TLV 43 needs Vendor ID, refers to first three byte of the device mac address of device manufacturer's setting, in table 1,
43.8 be Vendor ID, and 43.180 be acl rule item, and 43.181 be that ACL executes item.I.e. 43.180 be rule, and 43.181 be tool
Body runs up above-mentioned rule in which interface, which side.It is to be appreciated that here 180 or 181 be all the customized number of manufacturer
Value.
In the present embodiment, TLV43 coding specifically uses binary coding (simple to describe, to describe using 16 systems), on
The coding for stating configuration is as follows:
0x2b4c0803982f3cb4296970206163636573732d6c6973742036207065726d697420
686f7374203139322e3136382e352e3130b51a6970206163636573732d67726f757020362065
74682f3020696e。
This coding is generated by configuration file edit tool and is saved in configuration file.
According to above-mentioned coding it is found that a total of 4 TLV fields:
First TLV field: T (0x2b=43) L (0x4c=76) V (080398...20696e).
Second field: T (0x08=43.8) L (0x03=3) V (982f3c).
Third TLV field: T (0xb4=43.180) L (0x29=41) V (697020 ... 2e3130).
4th TLV field: T (0xb5=43.181) L (0x1a=26) V (697020 ... 20696e).
After step S1 has been executed, step S2 is executed.
Step S2:CM downloads CM configuration file and is parsed from tftp server, then deposits the ACL order that parsing obtains
Enqueue buffer area.
In step S2, after CM power-up initializing, line frequency up and down is locked, CM configuration file is downloaded from tftp server
And parse, the ACL order for then obtaining parsing is stored in queue buffer.
Specifically, for the step by carrying out classification parsing to ACL, the order generated under the corresponding classification of ACL order is regular,
The matching principle that control data bag passes through or forbids is defined in its rule, the general rule of ACL follows 3P principle, and as CM is every
Kind agreement (Per-Protocol), each direction (Per-Direction), each interface (Per-Interface) configure one
ACL。
Specifically, from tftp server download CM configuration file method the following steps are included:
(1), CM is powered on and initialized: the initialization of CM completion hardware, system interface, network protocol stack;
(2), CM scans down going channel, synchronous with CMTS foundation;
(3), ranging is carried out;
(4), establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
(5), CM obtains the address of tftp server and path, the file of configuration file in 43 field of DHCP Option
Name information;
(6), CM believes according to the address and the path of configuration file, filename of the tftp server got in previous step
Cease the configuration file from tftp server downloading CM.
Step S3: when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order
It is matched with the head information of data packet, data packet is handled according to matching result.
In step S3, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, ACL is ordered
Order is matched with the head information of data packet, handles data packet according to matching result.Need to extract the order in ACL before matching
Configuration item extracts the TLV43 field corresponding to this CM (meeting this CM vendor id), it is also necessary to carry out packet header to data packet
Data field parsing, extracts the information such as agreement, direction, source/destination address, the port of data frame.In addition, the step according to
Wildcard masking in ACL order matches source address or destination address with the head information of data packet.Method particularly includes: such as
Wildcard masking in fruit ACL order is 1, then ignores corresponding position in the IP address of the head information of data packet;If ACL order
In wildcard masking be 0, then by the source address or mesh in corresponding position in the IP address of the head information of data packet and ACL order
Mark address is accurately matched.
For example, 192.168.1.0 0.0.0.255: all IP in matching 192.168.1.0~192.168.1.255;
192.168.0.0 0.0.255.255: matching 192.168.0.0~192.168.255.255;
192.168.16.0 0.0.7.255: due to 16 binary coding be 00,010 000,7 binary coding be
00000 111, therefore its matched IP address is 192.168.16.0~192.168.23.255;
192.168.1.0 0.0.0.254: all even number IP in matching 192.168.1.0;
192.168.1.1 0.0.0.254: all odd number IP in matching 192.168.1.0.
According to matching result, permission is set, specifically, the permission of the data packet of successful match can be set to permission or forbid,
Allow to pass through if being set as allowing permission, no thoroughfare if being set as forbidding permission;The data packet of non-successful match is defaulted
It is set as that no thoroughfare.
As can be seen from the above embodiments, CM is configured through the embodiment of the present invention, can guarantees network security, mentions
It rises cm device and network performance is promoted to the treatment effeciency of data packet, and be able to achieve the distal end flexible configuration of cm device, reduce CM
The on-site maintenance cost of equipment.
It is to be appreciated that the embodiment of foregoing description is a part of the embodiments of the present invention, rather than whole embodiments, also not
It is limitation of the present invention.Based on the embodiment of the present invention, those of ordinary skill in the art are not making the creative labor premise
Under every other embodiment obtained, belong to protection scope of the present invention.
Claims (4)
1. a kind of Remote Visit and Control list generation and data package processing method for CM, it is characterised in that comprising steps of
A, ACL order is write according to default ACL command format, after encoding by TLV by ACL order and be converted into binary coding
It is added in the TLV43 field of cable modem CM configuration file, it is corresponding that the CM configuration file is stored in CMTS
On tftp server, the ACL order includes wildcard masking, and the ACL order further includes source address or destination address;
B, after cable modem CM is powered on and initialized, line frequency up and down is locked, CM configuration is downloaded from tftp server
File simultaneously parses, and the ACL order for then obtaining parsing is stored in queue buffer;
The step B method of CM configuration file is downloaded from tftp server comprising steps of
B1, CM power-up initializing: the initialization of CM completion hardware, system interface, network protocol stack;
B2, CM scan down going channel, synchronous with CMTS foundation;
B3, ranging is carried out;
B4, establish IP connection: CM obtains the IP address of CM by DHCP service automatically;
B5, CM obtain the address of tftp server and the path of configuration file, filename letter in DHCP Option43 field
Breath;
B6, CM according to the address of the tftp server got in step B5 and the path of configuration file, file name information from
The configuration file of tftp server downloading CM;
C, when CM interface or transmission data packet, the ACL order in queue buffer is obtained, by ACL order and data packet
Head information matched, according to matching result handle data packet, the step C according in ACL order wildcard masking will
Source address or destination address are matched with the head information of data packet.
2. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature
It is that the head information of the wildcard masking in ACL order and data packet is carried out matched method by the step C are as follows: if ACL
Wildcard masking in order is 1, then ignores corresponding position in the IP address of the head information of data packet;If in ACL order
Wildcard masking is 0, then by the source address or target in corresponding position in the IP address of the head information of data packet and ACL order
Location is accurately matched.
3. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature
Being to default in the step C by the priority assignation of the data packet of non-successful match is that no thoroughfare.
4. the Remote Visit and Control list generation and data package processing method according to claim 1 for CM, feature
Be the preset ACL command format be standard ACL or extended acl,
The ACL Serial Number Range of the standard ACL is 1~99, format are as follows:
Ip | ipv6 } access-list { number of ACL } deny | permit } source [source-wildcard] |
Any }, wherein { ip | ipv6 } indicates the IP type of ACL;{ ACL number } indicates standard ACL number, is whole between 1~99
Number;Deny | and permit } indicate the operation that acl entry executes;Source [source-wildcard] | and any } indicate source address
And wildcard masking;
The ACL Serial Number Range of the extended acl is 100~199, format are as follows:
access-list access-list-number{deny|permit}protocol source source-
wildcard[operator operand][port port-name or name]destination destination-
Wildcard [operator operand] [port port-name or name], wherein " access-list-number " is
Extended acl number, range is from 100~199;Deny | and permit | remark } indicate that the operation that acl entry executes, the operation are
Refusal or permission or remarks;" protocol " represents communication protocol;" source source-wildcard " indicate source address with
And wildcard masking;" destination destination-wildcard " indicates destination address and wildcard masking;
[port port-name or name] " presentation protocol port numbers or title.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610098930.4A CN105812352B (en) | 2016-02-23 | 2016-02-23 | Remote Visit and Control list generation and data package processing method for CM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610098930.4A CN105812352B (en) | 2016-02-23 | 2016-02-23 | Remote Visit and Control list generation and data package processing method for CM |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105812352A CN105812352A (en) | 2016-07-27 |
CN105812352B true CN105812352B (en) | 2019-07-19 |
Family
ID=56466381
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610098930.4A Active CN105812352B (en) | 2016-02-23 | 2016-02-23 | Remote Visit and Control list generation and data package processing method for CM |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105812352B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109189542B (en) * | 2018-09-28 | 2021-10-15 | 成都安恒信息技术有限公司 | Remote desktop access method for operation and maintenance auditing system |
CN109450914A (en) * | 2018-11-27 | 2019-03-08 | 东莞摩米创新工场电子科技有限公司 | A kind of control system based on communication technology design |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7092397B1 (en) * | 2001-08-31 | 2006-08-15 | Cisco Technology, Inc. | Method and apparatus for mapping an MPLS tag to a data packet in a headend |
CN102739514A (en) * | 2011-04-05 | 2012-10-17 | 美国博通公司 | Traffic switching in hybrid fiber coaxial (hfc) network |
CN102868543A (en) * | 2011-07-05 | 2013-01-09 | 彭俊 | Method of emergence online of cable modem under fault of TFTP (trivial file transfer protocol) server |
US8630540B1 (en) * | 2007-03-20 | 2014-01-14 | Arris Enterprises, Inc. | Method and system for transporting DOCSIS communication signals over a passive optical network |
WO2015077913A1 (en) * | 2013-11-26 | 2015-06-04 | 华为技术有限公司 | Method and device for forwarding packet in data-over-cable service interface specification system |
CN105025029A (en) * | 2015-07-27 | 2015-11-04 | 潍坊学院 | OLT device dynamic access control list generation method and data packet processing method |
WO2015196441A1 (en) * | 2014-06-27 | 2015-12-30 | 华为技术有限公司 | Configuration file acquisition method, apparatus and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7894445B2 (en) * | 2004-10-13 | 2011-02-22 | Csc Holdings, Inc. | Method and system for redirecting networked traffic |
US9460107B2 (en) * | 2013-07-16 | 2016-10-04 | International Business Machines Corporation | Filename-based inference of repository actions |
-
2016
- 2016-02-23 CN CN201610098930.4A patent/CN105812352B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7092397B1 (en) * | 2001-08-31 | 2006-08-15 | Cisco Technology, Inc. | Method and apparatus for mapping an MPLS tag to a data packet in a headend |
US8630540B1 (en) * | 2007-03-20 | 2014-01-14 | Arris Enterprises, Inc. | Method and system for transporting DOCSIS communication signals over a passive optical network |
CN102739514A (en) * | 2011-04-05 | 2012-10-17 | 美国博通公司 | Traffic switching in hybrid fiber coaxial (hfc) network |
CN102868543A (en) * | 2011-07-05 | 2013-01-09 | 彭俊 | Method of emergence online of cable modem under fault of TFTP (trivial file transfer protocol) server |
WO2015077913A1 (en) * | 2013-11-26 | 2015-06-04 | 华为技术有限公司 | Method and device for forwarding packet in data-over-cable service interface specification system |
WO2015196441A1 (en) * | 2014-06-27 | 2015-12-30 | 华为技术有限公司 | Configuration file acquisition method, apparatus and system |
CN105025029A (en) * | 2015-07-27 | 2015-11-04 | 潍坊学院 | OLT device dynamic access control list generation method and data packet processing method |
Non-Patent Citations (7)
Title |
---|
Acl的培训心得;Renyuchen286061;《http://www.51testing.com/html/17/181917-108680.html》;20090225;全文 |
Cable Modem-CMTS交互过程;李蒙;《信息工程大学学报》;20010630;全文 |
Cable Modem工作原理;Andyhuabing;《http://blog.csdn.net/andyhuabing/article/details/7757803》;20120718;3-5页 |
CMTS和CM按业务分等级部署方案的探讨;吴东喜;《有线电视技术》;20130213;全文 |
CMTS接入网系统方案;成都康特电子高科技公司;《百度文库》;20101005;12-14页 |
CMTS接入网系统方案建议书-时间截图;成都康特电子高科技公司;《百度文库》;20101005;全文 |
DOCSIS3_0_第三代电缆数据传输系统17;高宗敏;《有线电视技术》;20120826;全文 |
Also Published As
Publication number | Publication date |
---|---|
CN105812352A (en) | 2016-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100910818B1 (en) | Method and system for tunneling macsec packets through non-macsec nodes | |
CN101288272B (en) | Tunneled security groups | |
US7411915B1 (en) | Automatically configuring switch ports with appropriate features | |
US7620055B1 (en) | Method and apparatus for mapping an MPLS tag to a data packet in a headend | |
CN101674303B (en) | Embedded network product programming equipment and method thereof | |
EP1458164A2 (en) | Method, apparatus and computer readable storage medium for authentication of optical network units in an Ethernet Passive Optical Network EPON | |
CN107786613A (en) | Broadband Remote Access Server BRAS forwards implementation method and device | |
CN1679263A (en) | Application Level Gateway and Firewall Ruleset Download Validation | |
WO2005091826A3 (en) | Encoding a tcp offload engine within fcp | |
CN101352018A (en) | Distributed Network Protection | |
CN105812352B (en) | Remote Visit and Control list generation and data package processing method for CM | |
US7386699B1 (en) | Aligning IP payloads on memory boundaries for improved performance at a switch | |
CN107070765A (en) | Virtual client end equipment | |
CN103701628A (en) | Home gateway configuration management method, virtual home gateway and optical network terminal | |
WO2016034029A1 (en) | Method and device for processing service traffic | |
EP3113425B1 (en) | Encapsulation method for service routing packet, service forwarding entity and control plane | |
CN102946347A (en) | Method and device for accelerating to process local data packet by using Linux system | |
EP2782300A1 (en) | Two-layer access method, device and system in hfc network | |
EP3701683B1 (en) | Cable modem interface mask based virtual local area network mapping | |
CN102055642A (en) | Data message conversion method | |
CN101360090A (en) | Application Layer Protocol Identification Method | |
US12021753B2 (en) | Preserving quality of service (QoS) markings for downstream flows | |
EP2068494A1 (en) | An access terminal and a method for the terminal binding to the operator | |
CN100579004C (en) | Method and network equipment for preventing invalid message attack | |
WO2019042225A1 (en) | User broadband access processing method, apparatus and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20160727 Assignee: Sichuan Changhong Xinwang Technology Co.,Ltd. Assignor: SICHUAN CHANGHONG ELECTRIC Co.,Ltd. Contract record no.: X2023980043949 Denomination of invention: Remote Access Control List Generation and Packet Processing Method for CM Granted publication date: 20190719 License type: Common License Record date: 20231030 |
|
EE01 | Entry into force of recordation of patent licensing contract |