[go: up one dir, main page]

WO2016062140A1 - 一种实现虚拟私有云网络与外部网络互通的方法和装置 - Google Patents

一种实现虚拟私有云网络与外部网络互通的方法和装置 Download PDF

Info

Publication number
WO2016062140A1
WO2016062140A1 PCT/CN2015/084963 CN2015084963W WO2016062140A1 WO 2016062140 A1 WO2016062140 A1 WO 2016062140A1 CN 2015084963 W CN2015084963 W CN 2015084963W WO 2016062140 A1 WO2016062140 A1 WO 2016062140A1
Authority
WO
WIPO (PCT)
Prior art keywords
flow table
data
nat
entry
table entry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/084963
Other languages
English (en)
French (fr)
Inventor
王静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2016062140A1 publication Critical patent/WO2016062140A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks

Definitions

  • This document relates to virtual private cloud network technology, and in particular to a method and device for implementing a virtual private cloud (VPC) network to communicate with an external network.
  • VPC virtual private cloud
  • a VPC is a private cloud that exists in a shared or public cloud. Cloud operators can divide a portion of the resources on the public cloud for users to use, so that users can own and manage the cloud like a private cloud.
  • a private cloud can be installed in a virtual machine (VM) mode. You can install or deploy shared storage of different specifications. You can subnet, customize network addressing space, and customize routing rules. You can configure Modes and rules for interworking with external networks; you can install devices such as Network Address Translation (NAT), firewalls, load balancers, and virtual private network (VPNs) and configure corresponding rules; Monitor resources and networks.
  • Figure 1 shows the overall scheme of a virtual private cloud network. As shown in Figure 1, the cloud platform uniformly manages computing, network, and storage resources. Each tenant can apply for one or more virtual private cloud services. Users can apply for the virtual machine, network, and storage resources specified in the contract, and have full configuration rights.
  • a user logs in with an account a so-called tenant.
  • the theory can also correspond to multiple tenants in one account, depending on the platform implementation.
  • a tenant can create multiple networks, corresponding to an underlying virtual network encapsulation label (such as a virtual local area network (vlan) package identifier or a virtual eXtensible local area network (vxlan) package identifier vni).
  • a virtual network has multiple subnets. By default, multiple subnets are isolated. If tenants want subnets to communicate with each other, you need to create a virtual router to mount multiple subnets. If you need to communicate with an external network, you need to create a static route or an external gateway.
  • a tenant can apply for multiple virtual machine resources at the same time. Each virtual machine has one or more ports.
  • Each port is configured with a Media Access Control (MAC) address and a private Internet Protocol (IP). address. If the virtual machine is used for external services, you can configure a dynamic IP (Floating IP) to correspond to a static NAT rule on the network. If the host in the subnet needs to access the external network, In addition to configuring a virtual router, you need a corresponding NAT device.
  • MAC Media Access Control
  • IP Internet Protocol
  • the management of the virtual private cloud network can be completed by the Neutron network components of Openstack (the cloud computing software jointly developed by NASA and Rackspace).
  • the Neutron network components generate corresponding virtual private cloud network resources according to the needs of the tenants.
  • the underlying physical resources are virtualized and then deployed through Software Defined Network (SDN) technology.
  • SDN Software Defined Network
  • the SDN controller builds the network according to the requirements of the Neutron network components.
  • Figure 2 shows the virtual private cloud network virtualization solution.
  • the L2 and L3 functions and network model of the virtual private cloud network can be implemented by the SDN controller.
  • the L4-L7 network device directly controls the OF by the Neutron Plug-In interface. (OpenFlow) switches and L4-L7 network devices.
  • the service orchestration of L4-L7 can also be implemented by SDN.
  • This virtual private cloud network resource management solution has complete network control capabilities, which facilitates refined network management and control. Through the programmable network, the business customization capability becomes stronger.
  • the virtual private cloud network can be isolated by vxlan. In each virtual private cloud network, you can plan your own network segment and address pool.
  • the virtual machine (VM, virtual machine) inside the virtual private cloud can be assigned a private address. There can be address overlap between clouds.
  • 3 is a schematic diagram of a method for implementing interworking between a virtual private network and an external network in the related art. As shown in FIG. 3, when a VM in a virtual private cloud network needs to send data to an external network, the SDN controller controls the OF switch pair data. After the Vxlan encapsulation, the control OF switch sends the data to the Vxlan gateway through the router.
  • the Vxlan gateway is based on the first flow table entry delivered by the SDN controller (including the matching information field and the corresponding action, where the matching information field is the Vxlan package identifier.
  • Vxlan decapsulating the data and according to the second flow table entry (including the matching information field and the corresponding action, where the matching information field is the Vlan package identifier) delivered by the SDN controller, the data is Vlan encapsulated, and then The encapsulated data is forwarded to the NAT network element, and the NAT network element searches for the NAT rule corresponding to the data in the NAT rule table by traversing, and sends the data to the external network according to the found NAT rule.
  • the NAT rule table includes a Vlan package identifier and a corresponding NAT rule.
  • the Vxlan gateway and the NAT network element may be separately configured or combined.
  • the Vxlan gateway needs to map the Vxlan encapsulation identifier to the Vlan identifier in the Vxlan decapsulation and Vlan encapsulation process, and the Vxlan encapsulation identifier is 24 bits, and Vlan The package identifier is 12 bits, therefore, During the mapping process, multiple Vxlan encapsulation identifiers correspond to one Vlan identifier, which reduces the number of virtual private networks that the Vxlan gateway actually supports.
  • the embodiment of the invention provides a method and a device for implementing interworking between a virtual private cloud network and an external network, which can avoid mapping between Vxlan and Vlan.
  • the embodiment of the invention provides a method for implementing interworking between a virtual private cloud network and an external network, including:
  • the virtual scalable LAN Vxlan gateway receives the data from the router, and finds the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table;
  • the Vxlan gateway searches the network address translation NAT table for the NAT entry corresponding to the data according to the third flow table entry, and sends the data to the external network according to the found NAT entry.
  • the Vxlan gateway mirrors the data according to the fourth flow table entry
  • the Vxlan gateway searches for the fifth flow table entry corresponding to the mirrored data in the second flow table, and searches the NAT rule table for the NAT entry corresponding to the mirrored data according to the found fifth flow table entry.
  • the obtained NAT entry is delivered to the NAT table.
  • the method further includes: discarding the data.
  • the method further includes:
  • the Vxlan gateway sends the data to the SDN controller
  • the Vxlan gateway receives a third flow table entry and a fourth flow table entry from the SDN controller.
  • the method further includes: discarding the mirrored data.
  • the method further includes: searching, by the Vxlan gateway, the data corresponding to the image After the NAT entry, the fourth flow table entry is deleted.
  • the Vxlan gateway deletes the fourth flow table entry after the NAT entry corresponding to the mirrored data is found to be:
  • the Vxlan gateway After the Vxlan gateway finds the NAT entry corresponding to the mirrored data, it constructs a special indication, and searches for the sixth flow table entry corresponding to the special indication in the second flow table, according to the search.
  • the sixth flow table entry to the third flow table entry is deleted.
  • the method further includes:
  • the Vxlan gateway sends the matching domain information in the discovered NAT entry to the SDN controller, and after receiving the seventh flow table entry from the SDN controller, deleting the location according to the seventh flow table entry.
  • the fourth flow table entry is described.
  • the first flow table includes matching domain information, and the matching domain information of the first flow table is a network address;
  • the searching, in the first flow table, the third flow table entry corresponding to the data includes:
  • An embodiment of the present invention further provides a virtual scalable local area network gateway, including:
  • the first search module is configured to receive the data from the router, and find the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table; and the network address according to the third flow table entry Convert the NAT entry corresponding to the data in the NAT table.
  • a sending module configured to send the data to an external network according to the found NAT entry
  • a mirroring module configured to mirror the data according to the fourth flow table entry
  • the second search module is configured to search for the fifth flow table entry corresponding to the mirrored data in the second flow table, and search for the NAT corresponding to the mirrored data in the NAT rule table according to the found fifth flow table entry. Entry;
  • the delivery module is configured to deliver the found NAT entry to the NAT table.
  • the gateway further includes: a discarding module, configured to search in the first search module When the NAT entry corresponding to the data is not available, the data is discarded.
  • the first searching module is further configured to send the data when the third flow table entry and the fourth flow table entry corresponding to the data are not found in the first flow table. Go to the SDN controller; receive the third flow table entry and the fourth flow table entry from the SDN controller.
  • the second searching module is further configured to discard the mirrored data when the fifth flow table entry corresponding to the mirrored data is not found in the second flow table.
  • the gateway further includes: a deleting module, configured to delete the fourth flow table entry after the NAT entry corresponding to the mirrored data is found.
  • a deleting module configured to delete the fourth flow table entry after the NAT entry corresponding to the mirrored data is found.
  • the deleting module is configured to: after finding a NAT entry corresponding to the data of the mirror, construct a special indication, and search for, in the second flow table, a corresponding indication corresponding to the special
  • the sixth flow table entry deletes the fourth flow table entry according to the found sixth flow table entry.
  • the sending module is further configured to: send the matching domain information in the found NAT entry to the SDN controller, and after receiving the seventh flow table entry from the SDN controller, according to the The seventh flow table entry deletes the fourth flow table entry.
  • the embodiment of the invention further provides a computer readable storage medium storing program instructions, which can be implemented when the program instructions are executed.
  • the solution of the embodiment of the present invention includes: the Vxlan gateway receives the data from the router, and finds the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table, and the Vxlan gateway according to the first
  • the third-flow table entry searches the NAT table for the NAT entry corresponding to the data; the data is sent to the external network according to the found NAT entry; the Vxlan gateway mirrors the data according to the fourth flow table entry;
  • the Vxlan gateway searches the second flow table for the fifth flow table entry corresponding to the mirrored data, and searches the NAT rule table for the NAT entry corresponding to the mirrored data according to the found fifth flow table entry.
  • the discovered NAT entry is delivered to the NAT table.
  • the corresponding NAT entry is directly searched in the NAT table, and the Vxlan decapsulation and Vlan encapsulation are not required for the data. NAT conversion is then performed, thus avoiding the mapping between Vxlan and Vlan.
  • the data only needs to be searched in the NAT table, and does not need to be searched in the NAT rule table containing all NAT rules, thereby speeding up data transmission.
  • Figure 1 shows the overall scheme of a virtual private cloud network
  • Figure 2 shows a virtual private cloud network virtualization solution
  • FIG. 3 is a schematic diagram of a related art method for implementing interworking between a virtual private network and an external network
  • FIG. 4 is a flowchart of a method for implementing interworking between a virtual private network and an external network according to Embodiment 1 of the present invention
  • FIG. 5 is a flowchart of a method for implementing interworking between a virtual private network and an external network according to Embodiment 2 of the present invention
  • FIG. 6 is a schematic structural diagram of a Vxlan gateway according to Embodiment 3 of the present invention.
  • an embodiment of the present invention provides a method for implementing interworking between a virtual private cloud network and an external network, including:
  • Step 100 The Vxlan gateway receives the data from the router, finds the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table, and searches the NAT table according to the third flow table entry.
  • the NAT entry corresponding to the data sends the data to the external network according to the found NAT entry;
  • the Vxlan gateway mirrors the data according to the fourth flow table entry;
  • the Vxlan gateway searches for the mirrored data in the second flow table.
  • the five-flow table entry is used to find the NAT entry corresponding to the mirrored data in the NAT rule table according to the found fifth flow table entry, and the obtained NAT entry is sent to the NAT table.
  • the first flow table includes matching domain information and corresponding actions
  • the NAT rule table includes matching domain information and corresponding NAT rules
  • the matching domain information of the first flow table is a network address.
  • the destination address and number of data can be
  • the matching domain information of the first-class table is matched to find the third flow table entry.
  • the matching domain information of the NAT rule table may be vni (Vxlan Network identifier) information, subnet information, source address information, destination address information, source port information, destination port information, protocol conversion information, and the like. one or more.
  • vni information, subnet information, source address information, destination address information, source port information, destination port information, protocol conversion information, and the like in the data may be matched with matching domain information of the NAT rule table.
  • the second flow table and the NAT rule table are pre-delivered to the Vxlan gateway by the SDN controller.
  • the second flow table includes matching domain information and corresponding actions.
  • the matching domain information of the second flow table may be one or more of vni information, subnet information, source address information, destination address information, source port information, destination port information, protocol conversion information, and the like.
  • One or more of vni information, subnet information, source address information, destination address information, source port information, destination port information, protocol conversion information, and the like in the data may be matched with the matching domain information of the second flow table.
  • the fifth flow table entry may be one or more of vni information, subnet information, source address information, destination address information, source port information, destination port information, protocol conversion information, and the like in the data.
  • the NAT rule table includes all the NAT entries corresponding to the NAT rules.
  • the Vxlan gateway can also delete the fourth flow table entry after the NAT entry corresponding to the mirrored data is found.
  • a special indication may be constructed after the NAT entry corresponding to the mirrored data is found, and the sixth flow table entry corresponding to the constructed special indication is searched in the second flow table, according to the found sixth flow table.
  • the item deletes the fourth flow table entry.
  • the special indication may be a data packet that includes a specific matching domain (that is, a preset matching domain), and the sixth flowtable entry may be a flowtable entry pre-configured in the second flowtable.
  • the Vxlan gateway sends the matching domain information in the found NAT entry to the SDN controller, and after receiving the seventh flow table entry from the SDN controller, deleting the fourth flow table according to the seventh flow table entry. item.
  • Step 101 The Vxlan gateway sends the data to the SDN controller; the Vxlan gateway receives the fourth flow table entry and the third flow table entry from the SDN controller.
  • the Vxlan gateway can send data to the SDN controller through the Packet in command.
  • the Vxlan gateway After receiving the fourth flow table entry and the third flow table entry from the SDN controller, the Vxlan gateway searches for the NAT corresponding to the data in the network address translation NAT table according to the third flow table entry received from the SDN controller. Entry.
  • the method includes:
  • Step 500 The Vxlan gateway receives data from the router.
  • Step 501 The Vxlan gateway searches for the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table. If the third flow table entry is found, step 502 is performed; if the fourth flow table is found, The entry is performed in step 505; if the third flow table entry and the fourth flow table entry are not found, step 510 is performed;
  • Step 502 The Vxlan gateway searches for the NAT entry corresponding to the data in the NAT table according to the third flow table entry, if it is found, step 503 is performed; if not, step 504 is performed;
  • Step 503 The Vxlan gateway sends data to the external network according to the found NAT entry.
  • Step 504 The Vxlan gateway discards the data.
  • Step 505 The Vxlan gateway mirrors the data according to the fourth flow table entry.
  • Step 506 the Vxlan gateway in the second flow table to find the mirrored data corresponding to the fifth flow table entry, if found, then step 507; if not found, then step 509;
  • Step 507 The Vxlan gateway searches for the NAT entry corresponding to the mirrored data in the NAT rule table according to the found fifth flow table entry, if it is found, step 508 is performed; if not, step 509 is performed;
  • Step 508 The Vxlan gateway sends the found NAT entry to the NAT table, and deletes the fourth flow table entry.
  • Step 509 The Vxlan gateway discards the mirrored data.
  • Step 510 The Vxlan gateway sends the data to the SDN controller.
  • the Vxlan gateway receives the fourth flow table entry and the third flow table entry from the SDN controller, and performs step 501.
  • an embodiment of the present invention further provides a virtual scalable local area network gateway, which at least includes:
  • the first search module 601 is configured to receive the data from the router, and find the third flow table entry and the fourth flow table entry corresponding to the data in the first flow table; Find the NAT entry corresponding to the data in the address translation NAT table.
  • the sending module 602 is configured to send the data to the external network according to the found NAT entry.
  • the mirroring module 603 is configured to mirror data according to the fourth flow table entry.
  • the second search module 604 is configured to search for the fifth flow table entry corresponding to the mirrored data in the second flow table, and find the NAT table corresponding to the mirrored data in the NAT rule table according to the found fifth flow table entry. Item;
  • the sending module 605 is configured to deliver the found NAT entry to the NAT table.
  • the virtual scalable LAN gateway may further include:
  • the discarding module 606 is configured to discard the data when the first lookup module cannot find the NAT entry corresponding to the data.
  • the first searching module 601 is further configured to:
  • the data is sent to the SDN controller; and the third flow table is received from the SDN controller. Item and fourth flow table entry.
  • the second lookup module 604 is further configured to:
  • the mirrored data is discarded.
  • the gateway may further include:
  • the deleting module 607 is configured to delete the fourth flow table entry after the NAT entry corresponding to the mirrored data is found.
  • the deletion module 607 is configured to:
  • the sending module 602 is further configured to:
  • the matching domain information in the discovered NAT entry is sent to the SDN controller, and after receiving the seventh flow table entry from the SDN controller, the fourth flow table entry is deleted according to the seventh flow table entry.
  • the corresponding NAT entry is directly searched in the NAT table, and the Vxlan decapsulation and Vlan encapsulation are not required for the data. NAT conversion is then performed, thus avoiding the mapping between Vxlan and Vlan.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种实现虚拟私有云网络与外部网络互通的方法和装置,包括:虚拟可扩展局域网Vxlan网关接收到来自路由器的数据,在第一流表中查找到数据对应的第三流表表项和第四流表表项,根据第三流表表项在网络地址转换NAT表中查找数据对应的NAT表项;根据查找到的NAT表项将数据发送到外部网络;所述Vxlan网关根据所述第四流表表项对所述数据进行镜像;所述Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项,将查找到的NAT表项下发到所述NAT表中。

Description

一种实现虚拟私有云网络与外部网络互通的方法和装置 技术领域
本文涉及虚拟私有云网络技术,尤指一种实现虚拟私有云(VPC,Virtual Private Cloud)网络与外部网络互通的方法和装置。
背景技术
VPC是存在于共享或公共云中的私有云。云运营商可以在公共云上划分出一部分资源给用户使用,使得用户可以像私有云一样拥有和管理云。私有云可以以虚拟机(VM,Virtual Machine)的方式安装不同规格的服务器;可以安装或者部署不同规格的共享存储;可以自行划分子网、自定义网络编址空间、自定义路由规则;可以配置和外部网络互通的方式以及规则;可以安装网络地址转换(NAT,Network Address Translation)、防火墙、负载均衡器、虚拟专用网络(VPN,Virtual Private Network)网关等设备并配置相应的规则;可以维护、监控资源及网络。图1为虚拟私有云网络总体方案,如图1所示,云平台统一管理计算、网络、存储资源,每个租户可以申请一个或多个虚拟私有云服务。用户可以申请签约所规定的虚拟机、网络、存储资源,并具有完全的配置权限。
一个用户采用一个账户登录,也即所谓的一个租户。理论也可以一个账户对应多个租户,视平台实现而定。一个租户可以创建多个网络,对应一个底层虚拟网络封装标签(例如虚拟局域网(vlan,Virtual Local Area Network)封装标识或虚拟可扩展局域网(vxlan,Virtual eXtensible Local Area Network)封装标识vni),每个虚拟网络有多个子网。默认多个子网之间是隔离的,如果租户希望子网之间互通,则需要创建虚拟路由器挂接多个子网。如果需要和外部网络互通,则需要创建静态路由或外部网关。一个租户可以同时申请多个虚拟机资源,每个虚拟机有一个到多个端口,每个端口配置一个媒体访问控制(MAC,Media Access Control)地址和一个私网互联网协议(IP,Internet Protocol)地址。如果虚拟机是用于对外服务,则可选配置一个动态IP(Floating IP),对应网络的一条静态NAT规则。如果子网内主机需要访问外网,除了 配置虚拟路由器外,还需要对应的NAT设备。
虚拟私有云网络的管理可以通过Openstack(美国国家航空航天局和Rackspace合作研发的云端运算软件)的Neutron网络组件完成,Neutron网络组件按照租户对网络的需求生成相应的虚拟私有云网络资源。底层的物理资源在虚拟化后通过软件定义网络(SDN,Software Defined Network)技术进行调配,SDN控制器按照Neutron网络组件的要求构建网络。图2为虚拟私有云网络虚拟化方案,如图2所示,虚拟私有云网络的L2和L3功能以及网络模型可以通过SDN控制器实现,L4-L7网络设备由Neutron Plug-In接口直接控制OF(OpenFlow)交换机以及L4-L7网络设备。L4-L7的业务编排也可以通过SDN实现。这种虚拟私有云网络的资源管理方案具有完全的网络控制能力,利于精细化的网络管理和控制。通过可编程网络,使得业务定制化能力变强。标准的openflow接口有利于多厂家混合组网。
虚拟私有云网络可以通过vxlan进行隔离,在每个虚拟私有云网络中可以规划自有的网段和地址池,虚拟私有云内部的虚拟机(VM,Virtual Machine)可以分配私有地址,在虚拟私有云之间可以存在地址重叠现象。图3为相关技术中的实现虚拟私有网络与外部网络互通的方法的示意图,如图3所示,当虚拟私有云网络中的VM需要向外部网络发送数据时,SDN控制器控制OF交换机对数据进行Vxlan封装后,控制OF交换机将数据通过路由器发送给Vxlan网关,Vxlan网关根据SDN控制器下发的第一流表表项(包括匹配信息域和对应的动作,其中,匹配信息域为Vxlan封装标识)对数据进行Vxlan解封装,并根据SDN控制器下发的第二流表表项(包括匹配信息域和对应的动作,其中,匹配信息域为Vlan封装标识)对数据进行Vlan封装,然后将封装后的数据转发给NAT网元,NAT网元采用遍历的方式在NAT规则表中查找数据对应的NAT规则,根据查找到的NAT规则将数据发送到外部网络。其中,NAT规则表包括Vlan封装标识和对应的NAT规则。
其中,Vxlan网关和NAT网元可以分设,也可以合设。
相关技术中的实现虚拟私有网络与外部网络互通的方法中,Vxlan网关在对数据进行Vxlan解封装和Vlan封装过程中,需要将Vxlan封装标识映射到Vlan标识,Vxlan封装标识为24比特,而Vlan封装标识为12比特,因此, 在映射过程中会存在多个Vxlan封装标识对应一个Vlan标识的情况,从而降低了Vxlan网关实际所支持的虚拟私有网络的数量。
发明内容
本发明实施例提出了一种实现虚拟私有云网络与外部网络互通的方法和装置,能够避免Vxlan和Vlan之间的映射。
本发明实施例提出了一种实现虚拟私有云网络与外部网络互通的方法,包括:
虚拟可扩展局域网Vxlan网关接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;
所述Vxlan网关根据所述第三流表表项在网络地址转换NAT表中查找所述数据对应的NAT表项,根据查找到的NAT表项将所述数据发送到外部网络;
所述Vxlan网关根据所述第四流表表项对所述数据进行镜像;
所述Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项,将查找到的NAT表项下发到NAT表中。
可选地,当在所述NAT表中查找不到所述数据对应的NAT表项时,该方法还包括:丢弃所述数据。
可选地,当在所述第一流表中查找不到所述数据对应的第三流表表项和第四流表表项时,所述方法还包括:
所述Vxlan网关将所述数据上送到所述SDN控制器;
所述Vxlan网关接收来自所述SDN控制器的第三流表表项和第四流表表项。
可选地,当在所述第二流表中查找不到所述镜像的数据对应的第五流表表项时,该方法还包括:丢弃所述镜像的数据。
可选地,该方法还包括:所述Vxlan网关在查找到所述镜像的数据对应 的NAT表项后删除所述第四流表表项。
可选地,所述Vxlan网关在查找到镜像的数据对应的NAT表项后删除第四流表表项包括:
所述Vxlan网关在查找到所述镜像的数据对应的NAT表项后构建特殊的指示,在所述第二流表中查找所述构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除所述第四流表表项。
可选地,该方法还包括:
所述Vxlan网关将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自所述SDN控制器的第七流表表项后,根据所述第七流表表项删除所述第四流表表项。
可选地,所述第一流表包括匹配域信息,所述第一流表的匹配域信息为网络地址;
所述在第一流表中查找所述数据对应的第三流表表项包括:
将所述数据的目的地址和所述第一流表的匹配域信息进行匹配查找所述第三流表表项。
本发明实施例还提出了一种虚拟可扩展局域网网关,包括:
第一查找模块,设置为接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;根据第三流表表项在网络地址转换NAT表中查找数据对应的NAT表项;
发送模块,设置为根据查找到的NAT表项将所述数据发送到外部网络;
镜像模块,设置为根据所述第四流表表项对所述数据进行镜像;
第二查找模块,设置为在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项;以及
下发模块,设置为将查找到的NAT表项下发到所述NAT表中。
可选地,所述网关还包括:丢弃模块,设置为在所述第一查找模块查找 不到所述数据对应的NAT表项时,丢弃所述数据。
可选地,所述第一查找模块还设置为:在所述第一流表中查找不到所述数据对应的第三流表表项和第四流表表项时,将所述数据上送到SDN控制器;接收来自所述SDN控制器的第三流表表项和第四流表表项。
可选地,所述第二查找模块还设置为:在所述第二流表中查找不到所述镜像的数据对应的第五流表表项时,丢弃所述镜像的数据。
可选地,所述网关还包括:删除模块,其设置为在查找到所述镜像的数据对应的NAT表项后删除所述第四流表表项。
可选地,所述删除模块是设置为:在查找到所述镜像的数据对应的NAT表项后构建特殊的指示,在所述第二流表中查找所述构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除所述第四流表表项。
可选地,所述发送模块还设置为:将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自所述SDN控制器的第七流表表项后,根据所述第七流表表项删除所述第四流表表项。
本发明实施例还提供一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现上述方法。
与相关技术相比,本发明实施例方案包括:Vxlan网关接收到来自路由器的数据,在第一流表中查找到数据对应的第三流表表项和第四流表表项,Vxlan网关根据第三流表表项在NAT表中查找数据对应的NAT表项;根据查找到的NAT表项将数据发送到外部网络;Vxlan网关根据所述第四流表表项对所述数据进行镜像;所述Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项,将查找到的NAT表项下发到所述NAT表中。通过本发明实施例的方案,在第一流表中查找到数据对应的第三流表表项后,直接在NAT表中查找对应的NAT表项,而不需要对数据进行Vxlan解封装和Vlan封装后再执行NAT转换,从而避免了Vxlan和Vlan之间的映射。
另外,只需要将数据在NAT表中进行查找,而不需要在包含所有NAT规则的NAT规则表中进行查找,从而加快了数据的传输。
附图概述
图1为虚拟私有云网络总体方案;
图2为虚拟私有云网络虚拟化方案;
图3为相关技术的实现虚拟私有网络与外部网络互通的方法的示意图;
图4为本发明实施例1的实现虚拟私有网络与外部网络互通的方法的流程图;
图5为本发明实施例2的实现虚拟私有网络与外部网络互通的方法的流程图;
图6为本发明实施例3的Vxlan网关的结构组成示意图。
本发明的实施方式
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的多种方式可以相互任意组合。
实施例1
参见图4,本发明实施例提出了一种实现虚拟私有云网络与外部网络互通的方法,包括:
步骤100、Vxlan网关接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;根据第三流表表项在NAT表中查找数据对应的NAT表项,根据查找到的NAT表项将数据发送到外部网络;Vxlan网关根据第四流表表项对数据进行镜像;Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找镜像的数据对应的NAT表项,将查找到的NAT表项下发到NAT表中。
本步骤中,当在NAT表中查找不到数据对应的NAT表项时,丢弃数据。
本步骤中,第一流表包括匹配域信息和对应的动作,NAT规则表包括匹配域信息和对应的NAT规则。
其中,第一流表的匹配域信息为网络地址。可以将数据的目的地址和第 一流表的匹配域信息进行匹配查找第三流表表项。
其中,NAT规则表的匹配域信息可以是vni(Vxlan Network identifier,Vxlan网络标识符)信息、子网信息、源地址信息、目的地址信息、源端口信息、目的端口信息、协议转换信息等中的一个或多个。可以将数据中的vni信息、子网信息、源地址信息、目的地址信息、源端口信息、目的端口信息、协议转换信息等中的一个或多个与NAT规则表的匹配域信息进行匹配。
本步骤中,当在第二流表中查找不到镜像的数据对应的第五流表表项,或在NAT规则表中查找不到镜像的数据对应的NAT表项时,丢弃镜像的数据。
本步骤中,第二流表和NAT规则表是SDN控制器预先下发到Vxlan网关中的。
本步骤中,第二流表包括匹配域信息和对应的动作。
其中,第二流表的匹配域信息可以是vni信息、子网信息、源地址信息、目的地址信息、源端口信息、目的端口信息、协议转换信息等中的一个或多个。可以将数据中的vni信息、子网信息、源地址信息、目的地址信息、源端口信息、目的端口信息、协议转换信息等中的一个或多个与第二流表的匹配域信息进行匹配查找第五流表表项。
本步骤中,NAT规则表中包括了所有的NAT规则对应的NAT表项。
本步骤中,Vxlan网关还可以在查找到镜像的数据对应的NAT表项后删除第四流表表项。例如,可以在查找到镜像的数据对应的NAT表项后构建特殊的指示,在第二流表中查找构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除第四流表表项。其中,特殊的指示可以是包含特定匹配域(即预设匹配域)的数据包,第六流表表项可以是预先配置在第二流表中的流表表项。或者,Vxlan网关将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自SDN控制器的第七流表表项后,根据第七流表表项删除第四流表表项。
当在第一流表中查找不到数据对应的第三流表表项和第四流表表项时,还可包括以下步骤:
步骤101、Vxlan网关将数据上送到SDN控制器;Vxlan网关接收来自SDN控制器的第四流表表项和第三流表表项。
其中,Vxlan网关可以通过Packet in命令将数据上送到SDN控制器。
Vxlan网关接收到来自SDN控制器的第四流表表项和第三流表表项后,根据从该SDN控制器接收的第三流表表项在网络地址转换NAT表中查找数据对应的NAT表项。
实施例2
下面通过一实施例详细说明上述方法,参见图5,该方法包括:
步骤500、Vxlan网关接收来自路由器的数据;
步骤501、Vxlan网关在第一流表中查找数据对应的第三流表表项和第四流表表项,如果查找到第三流表表项,则执行步骤502;如果查找到第四流表表项,则执行步骤505;如果查找不到第三流表表项和第四流表表项,则执行步骤510;
步骤502、Vxlan网关根据第三流表表项在NAT表中查找数据对应的NAT表项,如果查找到,则执行步骤503;如果查找不到,则执行步骤504;
步骤503、Vxlan网关根据查找到的NAT表项将数据发送到外部网络;
步骤504、Vxlan网关丢弃数据;
步骤505、Vxlan网关根据第四流表表项对数据进行镜像;
步骤506、Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,如果查找到,则执行步骤507;如果查找不到,则执行步骤509;
步骤507、Vxlan网关根据查找到的第五流表表项在NAT规则表中查找镜像的数据对应的NAT表项,如果查找到,则执行步骤508;如果查找不到,则执行步骤509;
步骤508、Vxlan网关将查找到的NAT表项下发到NAT表中,并删除第四流表表项;
步骤509、Vxlan网关丢弃镜像的数据;
步骤510、Vxlan网关将数据上送到SDN控制器;Vxlan网关接收来自SDN控制器的第四流表表项和第三流表表项,并执行步骤501。
实施例3
参见图6,本发明实施例还提出了一种虚拟可扩展局域网网关,至少包括:
第一查找模块601,设置为接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;根据第三流表表项在网络地址转换NAT表中查找数据对应的NAT表项;
发送模块602,设置为根据查找到的NAT表项将所述数据发送到外部网络;
镜像模块603,设置为根据所述第四流表表项对数据进行镜像;
第二查找模块604,设置为在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找镜像的数据对应的NAT表项;以及
下发模块605,设置为将查找到的NAT表项下发到所述NAT表中。
可选地,该虚拟可扩展局域网网关还可包括:
丢弃模块606,设置为在第一查找模块查找不到数据对应的NAT表项时,丢弃数据。
可选地,该第一查找模块601还可设置为:
在第一流表中查找不到所述数据对应的第三流表表项和第四流表表项时,将所述数据上送到SDN控制器;接收来自SDN控制器的第三流表表项和第四流表表项。
可选地,该第二查找模块604还可设置为:
在第二流表中查找不到镜像的数据对应的第五流表表项时,丢弃镜像的数据。
可选地,该网关还可包括:
删除模块607,其设置为在查找到镜像的数据对应的NAT表项后删除第四流表表项。
其中,该删除模块607是设置为:
在查找到镜像的数据对应的NAT表项后构建特殊的指示,在第二流表中查找构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除第四流表表项。
可选地,该发送模块602还可设置为:
将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自SDN控制器的第七流表表项后,根据第七流表表项删除第四流表表项。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,上述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。可选地,上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本发明实施例不限制于任何特定形式的硬件和软件的结合。
工业实用性
通过本发明实施例的方案,在第一流表中查找到数据对应的第三流表表项后,直接在NAT表中查找对应的NAT表项,而不需要对数据进行Vxlan解封装和Vlan封装后再执行NAT转换,从而避免了Vxlan和Vlan之间的映射。

Claims (16)

  1. 一种实现虚拟私有云网络与外部网络互通的方法,包括:
    虚拟可扩展局域网Vxlan网关接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;
    所述Vxlan网关根据所述第三流表表项在网络地址转换NAT表中查找所述数据对应的NAT表项,根据查找到的NAT表项将所述数据发送到外部网络;
    所述Vxlan网关根据所述第四流表表项对所述数据进行镜像;
    所述Vxlan网关在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项,将查找到的NAT表项下发到NAT表中。
  2. 根据权利要求1所述的方法,当在所述NAT表中查找不到所述数据对应的NAT表项时,该方法还包括:丢弃所述数据。
  3. 根据权利要求1或2所述的方法,当在所述第一流表中查找不到所述数据对应的第三流表表项和第四流表表项时,所述方法还包括:
    所述Vxlan网关将所述数据上送到软件定义网络SDN控制器;
    所述Vxlan网关接收来自所述SDN控制器的第三流表表项和第四流表表项。
  4. 根据权利要求1或2所述的方法,当在所述第二流表中查找不到所述镜像的数据对应的第五流表表项时,该方法还包括:
    丢弃所述镜像的数据。
  5. 根据权利要求1或2所述的方法,该方法还包括:
    所述Vxlan网关在查找到所述镜像的数据对应的NAT表项后删除所述第四流表表项。
  6. 根据权利要求5所述的方法,其中,所述Vxlan网关在查找到镜像的数据对应的NAT表项后删除第四流表表项包括:
    所述Vxlan网关在查找到所述镜像的数据对应的NAT表项后构建特殊的 指示,在所述第二流表中查找所述构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除所述第四流表表项。
  7. 根据权利要求1或2所述的方法,该方法还包括:
    所述Vxlan网关将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自所述SDN控制器的第七流表表项后,根据所述第七流表表项删除所述第四流表表项。
  8. 根据权利要求1或2所述的方法,其中,所述第一流表包括匹配域信息,所述第一流表的匹配域信息为网络地址;
    所述在第一流表中查找所述数据对应的第三流表表项包括:
    将所述数据的目的地址和所述第一流表的匹配域信息进行匹配查找所述第三流表表项。
  9. 一种虚拟可扩展局域网网关,包括:
    第一查找模块,设置为接收到来自路由器的数据,在第一流表中查找到所述数据对应的第三流表表项和第四流表表项;根据第三流表表项在网络地址转换NAT表中查找数据对应的NAT表项;
    发送模块,设置为根据查找到的NAT表项将所述数据发送到外部网络;
    镜像模块,设置为根据所述第四流表表项对所述数据进行镜像;
    第二查找模块,设置为在第二流表中查找镜像的数据对应的第五流表表项,根据查找到的第五流表表项在NAT规则表中查找所述镜像的数据对应的NAT表项;以及
    下发模块,设置为将查找到的NAT表项下发到所述NAT表中。
  10. 根据权利要求9所述的虚拟可扩展局域网网关,所述网关还包括:
    丢弃模块,设置为在所述第一查找模块查找不到所述数据对应的NAT表项时,丢弃所述数据。
  11. 根据权利要求9或10所述的虚拟可扩展局域网网关,所述第一查找模块还设置为:
    在所述第一流表中查找不到所述数据对应的第三流表表项和第四流表表 项时,将所述数据上送到软件定义网络SDN控制器;接收来自所述SDN控制器的第三流表表项和第四流表表项。
  12. 根据权利要求9或10所述的虚拟可扩展局域网网关,所述第二查找模块还设置为:
    在所述第二流表中查找不到所述镜像的数据对应的第五流表表项时,丢弃所述镜像的数据。
  13. 根据权利要求9或10所述的虚拟可扩展局域网网关,所述网关还包括:
    删除模块,设置为在查找到所述镜像的数据对应的NAT表项后删除所述第四流表表项。
  14. 根据权利要求13所述的虚拟可扩展局域网网关,所述删除模块是设置为:
    在查找到所述镜像的数据对应的NAT表项后构建特殊的指示,在所述第二流表中查找所述构建的特殊的指示对应的第六流表表项,根据查找到的第六流表表项删除所述第四流表表项。
  15. 根据权利要求9或10所述的虚拟可扩展局域网网关,所述发送模块还设置为:
    将查找到的NAT表项中的匹配域信息发送给SDN控制器,接收到来自所述SDN控制器的第七流表表项后,根据所述第七流表表项删除所述第四流表表项。
  16. 一种计算机可读存储介质,存储有程序指令,当该程序指令被执行时可实现权利要求1-8任一项所述的方法。
PCT/CN2015/084963 2014-10-20 2015-07-23 一种实现虚拟私有云网络与外部网络互通的方法和装置 Ceased WO2016062140A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410559386.XA CN105591863B (zh) 2014-10-20 2014-10-20 一种实现虚拟私有云网络与外部网络互通的方法和装置
CN201410559386.X 2014-10-20

Publications (1)

Publication Number Publication Date
WO2016062140A1 true WO2016062140A1 (zh) 2016-04-28

Family

ID=55760250

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/084963 Ceased WO2016062140A1 (zh) 2014-10-20 2015-07-23 一种实现虚拟私有云网络与外部网络互通的方法和装置

Country Status (2)

Country Link
CN (1) CN105591863B (zh)
WO (1) WO2016062140A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450905A (zh) * 2018-11-20 2019-03-08 郑州云海信息技术有限公司 传输数据的方法和装置及系统
WO2020135381A1 (zh) * 2018-12-26 2020-07-02 华为技术有限公司 一种处理报文的方法、设备及系统
US10855584B2 (en) 2018-12-28 2020-12-01 Alibaba Group Holding Limited Client-equipment-peering virtual route controller
CN115550258A (zh) * 2022-12-02 2022-12-30 苏州浪潮智能科技有限公司 一种流量镜像方法、装置、设备及存储介质

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106059846B (zh) * 2016-08-19 2019-12-06 新华三技术有限公司 应用于vxlan中的故障分析方法和装置
CN106411857B (zh) * 2016-09-07 2019-03-29 河海大学 一种基于虚拟隔离机制的私有云gis服务访问控制方法
CN107872542B (zh) * 2016-09-27 2021-05-04 阿里巴巴集团控股有限公司 一种数据传输的方法及网络设备
CN108023801B (zh) * 2016-10-31 2020-11-10 中国电信股份有限公司 异构网络的资源调度方法及系统
CN106686070B (zh) 2016-12-13 2020-10-16 腾讯科技(深圳)有限公司 一种数据库数据迁移方法、装置、终端及系统
CN110088732B (zh) 2016-12-19 2021-08-20 华为技术有限公司 一种数据包处理方法、主机和系统
CN109561164B (zh) * 2017-09-27 2021-02-09 华为技术有限公司 Nat表项的管理方法、装置及nat设备
CN108449197B (zh) * 2018-01-03 2020-11-20 北京大学 一种基于软件定义网络的多云环境网络构建方法
CN109117650B (zh) * 2018-07-25 2022-03-18 华为云计算技术有限公司 一种企业云的创建方法和管理平台
CN110875884B (zh) * 2018-08-31 2023-10-31 阿里巴巴集团控股有限公司 一种流量迁移系统、一种数据处理方法及装置
CN110290174B (zh) * 2019-05-24 2021-02-05 华为技术有限公司 一种主主集群的控制方法以及控制节点
CN112242952B (zh) * 2019-07-16 2022-08-12 中移(苏州)软件技术有限公司 一种数据转发方法、柜顶式交换机和存储介质
CN110572327A (zh) * 2019-07-31 2019-12-13 苏州浪潮智能科技有限公司 一种实现neutron网络跨网段数据转发方法及流量可控的方法
CN111817961B (zh) * 2020-08-06 2022-02-08 平安科技(深圳)有限公司 Overlay网络中基于Open vSwitch内核态流表的分布式路由方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1476208A (zh) * 2002-08-13 2004-02-18 华为技术有限公司 一种支持地址转换应用网关的方法
US20050010822A1 (en) * 2003-07-09 2005-01-13 Xinyu Zhou Firewall and method for configuring same
CN101119324A (zh) * 2007-09-21 2008-02-06 杭州华三通信技术有限公司 网络地址转换属性自适应方法及装置
CN101707569A (zh) * 2009-12-21 2010-05-12 杭州华三通信技术有限公司 Nat业务报文处理的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1476208A (zh) * 2002-08-13 2004-02-18 华为技术有限公司 一种支持地址转换应用网关的方法
US20050010822A1 (en) * 2003-07-09 2005-01-13 Xinyu Zhou Firewall and method for configuring same
CN101119324A (zh) * 2007-09-21 2008-02-06 杭州华三通信技术有限公司 网络地址转换属性自适应方法及装置
CN101707569A (zh) * 2009-12-21 2010-05-12 杭州华三通信技术有限公司 Nat业务报文处理的方法及装置

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450905A (zh) * 2018-11-20 2019-03-08 郑州云海信息技术有限公司 传输数据的方法和装置及系统
CN109450905B (zh) * 2018-11-20 2021-05-04 郑州云海信息技术有限公司 传输数据的方法和装置及系统
WO2020135381A1 (zh) * 2018-12-26 2020-07-02 华为技术有限公司 一种处理报文的方法、设备及系统
US10855584B2 (en) 2018-12-28 2020-12-01 Alibaba Group Holding Limited Client-equipment-peering virtual route controller
CN115550258A (zh) * 2022-12-02 2022-12-30 苏州浪潮智能科技有限公司 一种流量镜像方法、装置、设备及存储介质
CN115550258B (zh) * 2022-12-02 2023-03-31 苏州浪潮智能科技有限公司 一种流量镜像方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN105591863A (zh) 2016-05-18
CN105591863B (zh) 2019-11-26

Similar Documents

Publication Publication Date Title
WO2016062140A1 (zh) 一种实现虚拟私有云网络与外部网络互通的方法和装置
US11088872B2 (en) Servicing packets in a virtual network and a software-defined network (SDN)
CN108347493B (zh) 混合云管理方法、装置和计算设备
CN104335532B (zh) 将分组路由到虚拟转发实例的远端地址的方法和装置
CN102577256B (zh) 在虚拟化网络基础设施情况下用于透明云计算的方法和设备
CN113595804B (zh) 将远程设备管理属性分发给服务节点以用于服务规则处理
US10931575B2 (en) Multi-tenant virtual private network based on an overlay network
CN104869042B (zh) 报文转发方法和装置
CN103369027B (zh) 混合云环境中的位置感知虚拟服务配备
US20150124823A1 (en) Tenant dhcp in an overlay network
EP3461072B1 (en) Access control in a vxlan
CN113811858A (zh) 使用机架顶交换机启用对虚拟网络中的专用资源的访问
US20180013798A1 (en) Automatic link security
US20160366046A1 (en) Support for high availability of service appliances in a software-defined network (sdn) service chaining infrastructure
WO2016173271A1 (zh) 报文处理方法、设备及系统
CN103748558A (zh) 虚拟网络覆盖
CN107770064A (zh) 一种跨网络通信的方法、设备
US20210184970A1 (en) Disambiguating traffic in networking environments with multiple virtual routing and forwarding (vrf) logical routers
EP3913870A1 (en) Packet forwarding method and network device
WO2017113300A1 (zh) 路由确定方法、网络配置方法以及相关装置
CN104488235A (zh) 报文转发方法和网络设备
CN105635190A (zh) 数据中心网络中的服务执行方法及装置
WO2018006704A1 (zh) 公网ip分配方法、装置以及虚拟化数据中心系统
US20210051077A1 (en) Communication system, communication apparatus, method, and program
CN115552850A (zh) 网络结构中的定向广播

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15853374

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15853374

Country of ref document: EP

Kind code of ref document: A1