CN113472581A - Zero-contact configuration opening method and device, computer equipment and storage medium - Google Patents

Zero-contact configuration opening method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113472581A
CN113472581A CN202110757533.4A CN202110757533A CN113472581A CN 113472581 A CN113472581 A CN 113472581A CN 202110757533 A CN202110757533 A CN 202110757533A CN 113472581 A CN113472581 A CN 113472581A
Authority
CN
China
Prior art keywords
zero
information
server
link
network equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110757533.4A
Other languages
Chinese (zh)
Inventor
李骢
张勇
霍江游
陈彦锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110757533.4A priority Critical patent/CN113472581A/en
Publication of CN113472581A publication Critical patent/CN113472581A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0843Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a zero-contact configuration opening method, a zero-contact configuration opening device, computer equipment and a storage medium, relates to the technical field of communication, and can be used in the field of finance, and the method comprises the following steps: sending a zero-contact configuration request to a server through relay equipment, wherein the zero-contact configuration request carries identity authentication information; receiving link information matched with the identity authentication information returned by the server through the relay equipment; establishing a file transmission link with a server according to the link information; receiving a configuration file which is returned by the server through a file transmission link and is matched with the identity authentication information; and opening the zero-contact configuration according to the configuration file. The zero-contact configuration opening method greatly simplifies the opening deployment process of the network equipment; the efficiency of opening the zero-contact configuration of the network equipment is improved; the operator only needs simple operation, which reduces the technical threshold of network equipment operation and reduces the working intensity of the operator.

Description

Zero-contact configuration opening method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of communication, can be used in the financial field, and particularly relates to a zero-contact configuration opening method, a zero-contact configuration opening device, computer equipment and a storage medium.
Background
With the rapid development of the internet industry, the scale of a data center serving as an infrastructure for supporting internet services is gradually enlarged with the rapid increase of services, a large number of network devices such as servers need to be opened at the beginning of network construction (referring to the process of loading system files, configuration files and the like when a newly-shipped device or an empty configuration device is powered on and started), and the data center becomes an important factor for limiting the simplification of a deployment process and the limitation of deployment efficiency due to the fact that professional staff are required to support the data center to the site, the cost is high, and the implementation period is long.
In the prior art, a ZTP (Zero Touch Provisioning) opening method is often adopted, and this method does not require a professional to perform field deployment, and only needs to deploy edge equipment, plug in a communication link and access a power supply, the equipment can automatically download a designated configuration and a policy through a centralized management device, thereby realizing simplified and flexible deployment. However, the prior ZTP issuing method also has the problems of safety, complex operation and the like which need to be solved: currently, the mainstream ZTP opening in the industry adopts a USB flash disk opening and mail opening mode, so that the security risk of a transmission medium still exists, and higher requirements are provided for the conditions of a zero-contact configuration opening site of network equipment; the technical threshold is high, and network professional technicians are required to be deployed on site; the devices to be opened are dispersed, so that the online operation is long in time consumption and the deployment efficiency is low; in addition, there is a risk of misoperation, and the initialization configuration still has partial manual operation, so that the risk of manual misoperation cannot be completely eliminated.
In view of the above-mentioned drawbacks of the prior art, the present disclosure is directed to a method and an apparatus for opening a zero-contact configuration, a computer device, and a storage medium, so as to reduce the operation and maintenance work intensity and technical threshold of a network node, thereby effectively improving the network operation and maintenance efficiency.
Disclosure of Invention
In view of the foregoing problems in the prior art, an object of the present disclosure is to provide a zero-contact configuration opening method, apparatus, computer device, and storage medium, so as to solve the problems of low efficiency and poor reliability in opening deployment of network devices in the prior art.
In order to solve the technical problems, the specific technical scheme is as follows:
in one aspect, provided herein is a method for zero-touch configuration opening, comprising:
sending a zero-contact configuration request to a server through relay equipment, wherein the zero-contact configuration request carries identity authentication information;
receiving link information matched with the identity authentication information returned by the server through the relay equipment;
establishing a file transmission link with the server according to the link information;
receiving a configuration file which is returned by the server through the file transmission link and matched with the identity authentication information;
and opening the zero-contact configuration according to the configuration file.
Further, before establishing a file transmission link with the server according to the link information, the method further includes:
judging whether the received link information is unique or not;
if the link information is unique, establishing a file transmission link with the server according to the link information;
and if the link information is more than one, selecting one of the link information according to a preset screening rule, and establishing a file transmission link according to the screened link information and the server.
Preferably, before establishing the file transmission link with the server according to the link information, the method further includes:
transmitting a link information confirmation request to the server through the relay device;
and receiving confirmation information corresponding to the confirmation request returned by the server through the relay equipment so as to establish a file transmission link with the server.
Further, before sending the zero-touch configuration request to the server through the relay device, the method further includes:
acquiring information of a plurality of alternative relay devices and architecture information between the alternative relay devices and a server;
and selecting one of the candidate relay devices as the relay device according to the information of the candidate relay devices and the architecture information.
In another aspect, provided herein is a zero-touch configuration opening apparatus, including:
the system comprises a first sending module, a second sending module and a sending module, wherein the first sending module is used for sending a zero-contact configuration request to a server through relay equipment, and the zero-contact configuration request comprises identity authentication information;
the first receiving module is used for receiving link information matched with the identity authentication information, which is returned by the server through the relay equipment;
the first link establishing module is used for establishing a file transmission link with the server according to the link information;
the second receiving module is used for receiving the configuration file which is returned by the server through the file transmission link and is matched with the identity authentication information;
and the configuration module is used for carrying out zero-contact configuration opening according to the configuration file.
In another aspect, provided herein is a method for zero-touch configuration opening, comprising:
receiving a zero-contact configuration request forwarded by a network device through a relay device, wherein the zero-contact configuration request carries identity authentication information of the network device;
determining whether the network equipment meets a preset condition or not according to the identity authentication information;
when the network equipment is determined to meet the preset conditions, corresponding link information is obtained according to the identity authentication information in a matching mode;
transmitting the link information to the network device through the relay device;
establishing a file transmission link with the network equipment according to the link information;
and sending a configuration file corresponding to the identity authentication information to the network equipment through the file transmission link so that the network equipment performs zero-contact configuration opening based on the configuration file.
Specifically, before establishing a file transmission link with the network device according to the link information, the method further includes:
receiving a link information confirmation request sent by the network equipment through the relay equipment;
and feeding back confirmation information corresponding to the confirmation request to the network equipment through the relay equipment so as to establish a file transmission link with the network equipment.
In another aspect, provided herein is a method for zero-touch configuration opening, comprising:
a third receiving module, configured to receive a zero-contact configuration request forwarded by a network device through a relay device, where the zero-contact configuration request carries identity authentication information of the network device;
the first judgment module is used for determining whether the network equipment meets a preset condition according to the identity authentication information;
the matching module is used for obtaining corresponding link information according to the identity authentication information in a matching mode when the network equipment is determined to meet the preset conditions;
a second sending module, configured to send the link information to the network device through the relay device;
the second link establishing module is used for establishing a file transmission link with the network equipment according to the link information;
and the third sending module is used for sending a configuration file corresponding to the identity authentication information to the network equipment through the file transmission link so that the network equipment performs zero-contact configuration opening based on the configuration file.
In another aspect, provided herein is a method for zero-touch configuration opening, comprising:
receiving a zero-contact configuration request sent by network equipment;
analyzing the zero-contact configuration request to obtain the identity verification information of the network equipment;
judging whether the network equipment meets a preset condition or not according to the identity verification information;
when the network equipment meets a preset condition, forwarding the zero-contact configuration request to a server;
and receiving link information matched with the identity authentication information returned by the server, so that the network equipment establishes a file transmission link with the server according to the link information.
In another aspect, a zero-touch configuration opening apparatus is also provided herein, including:
the fourth receiving module is used for receiving a zero-contact configuration request sent by the network equipment;
the analysis module is used for analyzing the zero-contact configuration request to obtain the identity authentication information of the network equipment;
the second judgment module is used for judging whether the network equipment meets the preset condition or not according to the identity authentication information;
the first forwarding module is used for forwarding the zero-contact configuration request to a server when the network equipment meets a preset condition;
and the second forwarding module is used for receiving link information which is returned by the server and matched with the identity authentication information so as to enable the network equipment to establish a file transmission link with the server according to the link information.
In another aspect, a computer device is also provided herein, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method provided in the above technical solution is implemented.
Finally, a computer-readable storage medium is provided, which stores a computer program, which, when executed by a processor, performs the method according to the above-mentioned embodiments.
By adopting the technical scheme, the zero-contact configuration opening method, the zero-contact configuration opening device, the computer equipment and the storage medium can establish a file transmission link with the server and acquire the configuration file required by the zero-contact configuration only by carrying out simple message interaction between the zero-contact configuration opening network equipment and the server through the relay equipment, so that the zero-contact configuration opening is completed, and the opening deployment process of the network equipment is greatly simplified; the efficiency of opening the zero-contact configuration of the network equipment is improved; the technical threshold of the operation and maintenance of the network equipment is reduced, and the working intensity of the operation and maintenance personnel is reduced.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 illustrates a first flow diagram of a zero-contact configuration opening method provided in an embodiment herein;
fig. 2 shows a first flow diagram for acknowledging link information in an embodiment herein;
fig. 3 is a schematic diagram illustrating a first structure of a zero-contact configuration opening apparatus provided in an embodiment of the present disclosure;
fig. 4 is a second flow chart illustrating a zero-touch configuration opening method provided in an embodiment of the present disclosure;
fig. 5 shows a second flow diagram for acknowledging link information in an embodiment herein;
fig. 6 is a second schematic structural diagram of a zero-contact configuration opening apparatus provided in an embodiment of the present disclosure;
fig. 7 shows a third flow diagram for acknowledging link information in an embodiment herein;
fig. 8 is a schematic diagram illustrating a third structure of a zero-contact configuration opening apparatus provided in an embodiment of the present disclosure;
fig. 9 shows a schematic structural diagram of a computer device provided in an embodiment herein.
Description of the symbols of the drawings:
31. a first sending module;
32. a first receiving module;
33. a first link establishing module;
34. a second receiving module;
35. a configuration module;
61. a third receiving module;
62. a first judgment module;
63. a matching module;
64. a second sending module;
65. a second link establishing module;
66. a third sending module;
81. a fourth receiving module;
82. an analysis module;
83. a second judgment module;
84. a first forwarding module;
85. a second forwarding module;
902. a computer device;
904. a processor;
906. a memory;
908. a drive mechanism;
910. an input/output module;
912. an input device;
914. an output device;
916. a presentation device;
918. a graphical user interface;
920. a network interface;
922. a communication link;
924. a communication bus.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments herein without making any creative effort, shall fall within the scope of protection.
It should be noted that the terms "first," "second," and the like in the description and claims herein and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments herein described are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
When network equipment is accessed to a network, the configuration cost is high and the period is long due to the fact that the number of the equipment is large, the deployment is scattered and professional staff are required to go to the site for support, and the configuration cost is high and the period is long, so that the configuration cost becomes an important factor for limiting the simplification of a deployment process and limiting the deployment efficiency. Reducing the operation and maintenance management intensity of the end side is particularly important for improving the operation and maintenance efficiency of network equipment of a network node, wherein the maintenance workload is obviously reflected in the operation of opening bureaus such as the installation and the configuration of the network equipment. In the prior art, although the zero-contact configuration opening method is adopted, the problems of safety, complex operation and the like of the existing zero-contact configuration opening method still exist due to the fact that a transmission medium has safety risks, opening field requirements and high technical threshold, manual operation exists and the like.
In order to solve the above problems, embodiments herein provide a zero-contact configuration opening method and apparatus, a computer device, and a storage medium, which can simplify a network device deployment process, improve network device deployment efficiency, reduce a technical threshold for opening a network device at a network point, and reduce workload of an operation and maintenance staff for opening an office. It should be noted that the zero-touch configuration issuing method, the zero-touch configuration issuing device, the computer device and the storage medium provided herein may be used in the financial field, and may also be used in any field other than the financial field. Fig. 1 is a schematic diagram of the steps of a method for opening a zero-contact configuration provided in the embodiments herein, and the present specification provides the method operation steps as described in the embodiments or flowcharts, but may include more or less operation steps based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual system or apparatus product executes, it can execute sequentially or in parallel according to the method shown in the embodiment or the figures. Specifically, as shown in fig. 1, the method is applicable to a network device (i.e., a user-side device to be configured with zero touch), and the method may include:
s110: sending a zero-contact configuration request to a server through relay equipment, wherein the zero-contact configuration request comprises identity authentication information;
the authentication information may include a unique identification Serial Number (SN) of the network device, and the authentication information may further include information such as a port Number of the network device and an IP address of the downstream router.
S120: receiving link information matched with the identity authentication information returned by the server through the relay equipment;
it should be noted that, in the embodiment of the present specification, the server integrates the functions and functions of a DHCP server and a file server. After receiving a zero-contact Configuration request sent by a network device through a relay device, a server selects an IP address (and a corresponding subnet mask) from IP addresses that are not leased (i.e., not occupied) to allocate to a network device with a legal identity based on a Dynamic Host Configuration Protocol (DHCP), and allocates information of a file server corresponding to a Configuration file required for zero-contact Configuration of the network device (including information of a URL of the file server, i.e., a Uniform Resource Locator, etc.). That is, the link information includes an IP address of the network device, a subnet mask, and the like, and information related to the file server, and the link information may further include other setting amount information.
Besides, the network device may receive other configuration information returned by the server through the relay device, for example, file information (including a file name, a file number, file version information, and the like) of a desired configuration file.
S130: establishing a file transmission link with the server according to the link information;
namely, according to the link information, the network device establishes a file transmission link with the server.
S140: receiving a configuration file which is returned by the server through the file transmission link and matched with the identity authentication information;
namely, the server issues the configuration file based on a CPE wide area network Management Protocol (CWMP) Protocol, so as to solve the problem that the opening operation and maintenance of a Customer Premise Equipment (CPE) device (i.e., the network device described herein) is difficult, save the maintenance cost, and improve the opening deployment efficiency.
Namely, the authentication information is not only used for matching the link information, but also used for issuing the corresponding configuration file, so that the network equipment side does not need to send the authentication information for multiple times, and the operation flow of the network equipment side is simplified. The configuration files include system software, configuration files, License files, patch files, custom files, and the like required by the network device for opening, and it should be noted that the configuration files may be different for different network devices.
S150: and opening the zero-contact configuration according to the configuration file.
In the zero-contact configuration opening method provided in the embodiments of the present specification, when a network device and a server of the zero-contact configuration opening perform simple message interaction (send a zero-contact configuration carrying identity verification information) only through a relay device, a file transmission link can be established with the server to obtain a configuration file required by the zero-contact configuration, thereby completing the zero-contact configuration opening, and greatly simplifying a network device opening deployment process; the efficiency of opening the zero-contact configuration of the network equipment is improved; the operator only needs simple operation, which reduces the technical threshold of network equipment operation and reduces the working intensity of the operator. In addition, in the embodiment of the specification, the security of file transmission is improved by establishing a file transmission link and then issuing a configuration file.
In the embodiment of the present specification, on one hand, since the network device may not know the number of IP addresses that the server has not leased yet and whether the IP addresses managed by the unknown server side are adapted to itself, the network device may send a zero configuration request to the plurality of servers through the relay device, so as to improve timeliness and success rate of response to the zero contact configuration request. Alternatively, the server may send multiple link information (e.g., multiple, non-leased, IP addresses adapted to the network device, and/or information of multiple file servers adapted to the network device) for selection by the network device, such that more than one link information may be received by the network device.
Therefore, at step S130: before establishing a file transmission link with the server according to the link information, the method further includes:
judging whether the received link information is unique or not;
if the link information is unique, establishing a file transmission link with the server according to the link information;
and if the link information is more than one, selecting one of the link information according to a preset screening rule, and establishing a file transmission link according to the screened link information and the server.
In some possible embodiments, the preset screening rule may be according to the receiving sequence of each link information, that is, the network device may establish a file transmission link with a server corresponding to the first received link information.
Preferably, as shown in fig. 2, in the embodiment of the present specification, in step S130: before establishing a file transmission link with the server according to the link information, the method further includes:
s210: transmitting a link information confirmation request to the server through the relay device;
the confirmation request carries link information to be confirmed;
it should be noted that, if the link information received by the network device is unique, the link information to be confirmed here is the link information received in the foregoing step;
since the network device may receive a plurality of link information from the same server or different servers, if the link information received by the network device is not unique, the link information to be confirmed here is the link information screened according to the preset screening rule.
S220: and receiving confirmation information corresponding to the confirmation request returned by the server through the relay equipment so as to establish a file transmission link with the server.
When receiving the confirmation information returned by the server, the network device indicates that the link information to be confirmed is available, and the network device can successfully establish a file transmission link with the server according to the link information to be confirmed and enable the server to recover other link information once provided.
In some possible embodiments, the method further comprises:
and when receiving the negative confirmation information corresponding to the confirmation request returned by the server through the relay equipment or not receiving the confirmation information returned by the server within a first preset time limit, judging that the link information to be confirmed can not be used.
If the link information to be confirmed is not available, different processing measures can be taken according to the number of the received link information in the previous steps:
if the received link information is unique, a zero-contact configuration request is initiated again through the relay equipment;
if more than one link information is received, another link information is selected from the multiple link information (for example, the second received link information is selected, that is, the next link information is selected according to the receiving sequence of the link information), and a link information confirmation request is sent to the server through the relay device again. Under the scene, the network equipment can be prevented from repeatedly initiating the zero-contact configuration request for many times, the process is simplified, and the processing efficiency is improved.
The method steps meet the requirement of confirming whether the file transmission link is successfully established between the network equipment and the server under various scenes, and provide a countermeasure when the file transmission link is not successfully established.
And if the confirmation request or the zero-contact configuration request is transmitted for a plurality of times in an accumulated manner (for example, three times or more), and the confirmation information of the link information fed back by the server is still not received, transmitting alarm information to an operation and maintenance person who opens an office, and reminding the operation and maintenance person to check the network equipment, the relay equipment and the server.
In step S110: before sending the zero-touch configuration request to the server through the relay device, the method further includes:
acquiring information of a plurality of alternative relay devices and architecture information between each alternative relay device and a server;
and selecting one of the candidate relay devices as the relay device according to the information of the candidate relay devices and the architecture information.
In the banking field, the server, the relay device and the network device may adopt a flat architecture or a non-flat architecture, or an architecture in which a flat architecture and a non-flat architecture are mixed.
The network topology in the flat architecture is: the system comprises a server, network equipment of a first-level branch and network equipment of each network point, wherein the first-level branch is a local branch which is established by taking province level as a unit and is mainly responsible for overall planning and administrative management of all (or most) branches governed by the whole province.
Because the number of the first-level branch lines is limited, when network equipment of the first-level branch lines is deployed in an opening, a traditional mode of utilizing transmission media such as a U disk and mails can be adopted; when the network devices of the mesh points are subjected to zero-contact configuration opening, because the mesh points are numerous, the network devices of the primary branch lines are required to serve as relay devices to perform zero-contact configuration requests and forward link information.
The network topology structure of the non-flat architecture is as follows: the system comprises a server, a first-level branch network device, a second-level branch network device and a network device of a network point, wherein the second-level branch is established by taking the city level as a unit.
The zero-contact configuration method of the first-level branch network equipment in the non-flat architecture can be consistent with the configuration opening method in the flat architecture; when zero-contact configuration opening is carried out on the network equipment in the secondary branch, the network equipment in the primary branch is used as relay equipment; and when the network equipment of the network point is opened and deployed, the network equipment of the second-level branch is selected as the relay equipment. The global network equipment is deployed in the layer-by-layer progressive mode, so that mistakes and omissions can be avoided.
In the architecture in which the flat architecture and the non-flat architecture are mixed, the deployment of the network device is a combination of the deployment manners of the two architectures, and details are not repeated here.
Therefore, the zero-contact configuration issuing method provided by the embodiment of the specification can meet the issuing configuration requirements of network equipment under different architectures in a bank financial system. The network equipment of different levels is used as the relay equipment, so that the service pressure of each relay equipment can be reduced.
The zero-contact configuration opening method provided by the embodiment of the present specification further includes:
judging whether the link information (mainly the IP address issued by the server to the network equipment) reaches a preset service life and judging whether the zero-contact configuration opening is finished;
if the link information expires and the zero-contact configuration opening is not completed, sending a continuing request of the link information to a server so as to prolong the service life of the link information;
if the zero-contact configuration opening of the network equipment is completed, the network equipment does not initiate a zero-contact configuration request according to the closing of the DHCP function; and returning the link information to the server so that the server recycles the link information to provide the zero-touch configuration service for other network devices again.
Preferably, in order to avoid the influence of the expiration of the link information on the zero-contact configuration opening of the network equipment, the network equipment preferably starts to time when a file transmission link is established with the server, and automatically sends a request for prolonging the service life to the server when the service life of the link information exceeds half. And after the service life is successfully prolonged, restarting the timing by using the updated node of the service life.
As shown in fig. 3, based on the same inventive concept, an embodiment of this specification further provides a zero-touch configuration opening apparatus, which is a network device to be configured with zero-touch, and includes:
a first sending module 31, configured to send a zero-contact configuration request to a server through a relay device, where the zero-contact configuration request carries identity authentication information of the network device;
a first receiving module 32, configured to receive link information that is returned by the server through the relay device and matches the authentication information;
a first link establishing module 33, configured to establish a file transmission link with the server according to the link information;
a second receiving module 34, configured to receive a configuration file that matches the authentication information and is returned by the server through the file transmission link;
and the configuration module 35 is configured to perform zero-touch configuration opening according to the configuration file.
The advantages achieved by the device provided by the embodiment of the specification are consistent with those achieved by the method, and are not described in detail herein.
As shown in fig. 4, an embodiment of the present specification further provides a zero-touch configuration opening method, which is applied to a server side, and the method includes:
s410: receiving a zero-contact configuration request forwarded by a network device through a relay device, wherein the zero-contact configuration request carries identity authentication information of the network device;
s420: determining whether the network equipment meets a preset condition or not according to the identity authentication information;
for example, according to the SN number of the network device (which may also include its port number and the IP address of the downstream router), it is determined whether the SN number of the network device is located in a network device information list pre-stored on the server side.
S430: when the network equipment is determined to meet the preset conditions, corresponding link information is obtained according to the identity authentication information in a matching mode;
the link information includes an IP address, a subnet mask, and the like allocated to the network device and related information of a file server corresponding to a configuration file required by the network device, and the link information may further include other setting amount information.
S440: transmitting the link information to the network device through the relay device;
s450: establishing a file transmission link with the network equipment according to the link information;
s460: and sending a configuration file corresponding to the identity authentication information to the network equipment through the file transmission link so that the network equipment performs zero-contact configuration opening based on the configuration file.
It should be noted that, for different network devices, configuration files required for opening the network device may be different, and therefore, the authentication information may be used to not only verify whether the network device meets the preset condition, but also match the configuration file adapted to the network device according to the authentication information when the configuration file is sent to the network device through the file transmission link.
The server integrates the functions of a DHCP server and a file server, and after receiving a zero-contact Configuration request sent by a network device through a relay device and judging that the identity of the network device meets a preset condition, based on a DHCP (Dynamic Host Configuration Protocol) Protocol, selects one (and a subnet mask corresponding to the IP address) from unoccupied IP addresses to allocate to the network device, and sends information (including information such as a uniform resource locator of the file server) of the file server corresponding to a Configuration file required by the zero-contact Configuration of the network device.
After the file transmission link is established with the network equipment, the server also issues a configuration file based on a CWMP (CPE WAN Management Protocol) Protocol, so that the problem of difficulty in opening operation and maintenance of the network equipment in the prior art is solved, the maintenance cost is saved, and the opening deployment efficiency is improved.
Therefore, according to the zero-contact configuration opening method provided by the embodiment of the specification, the server integrates the functions of the DHCP server and the file server, and the opening operation and maintenance personnel can issue the link information of the network equipment and the configuration file only in one software, so that the opening deployment efficiency is improved.
Since the server may send multiple link messages to the same or different network devices for selection by the network devices, the network devices need to confirm with the server after receiving the link messages or the selected link messages. In some preferred embodiments, as shown in FIG. 5, at step S450: before establishing a file transmission link with the network device according to the link information, the method further includes:
s510: receiving a link information confirmation request sent by the network equipment through the relay equipment;
the confirmation request carries link information to be confirmed, and if the link information received by the network equipment in the step is unique, the link information to be confirmed is the link information received in the step; if the link information received by the network device is not unique, the link information to be confirmed here is the link information screened according to the preset screening rule.
S520: and feeding back confirmation information corresponding to the confirmation request to the network equipment through the relay equipment so as to establish a file transmission link with the network equipment.
Specifically, step S520 further includes:
judging whether the link information to be determined is occupied or not;
if the link information is occupied, transmitting the denial information of the confirmation request to the network equipment through the relay equipment;
and if the link information is not occupied, sending the confirmation information of the confirmation request to the network equipment through the relay equipment so that the network equipment establishes a file transmission link with the server according to the link information to be determined.
For the same server, it may receive zero-contact configuration requests initiated by multiple network devices, and therefore, after feeding back corresponding link information to the network devices, may receive confirmation requests initiated by multiple network devices for different or the same link information.
In this embodiment of the present specification, when the server receives two or more acknowledgement requests for the same link information, it preferably adopts the following method:
judging whether the link information corresponding to the confirmation request is occupied or not;
if the link information is not occupied, according to the time sequence of the received confirmation requests, selecting the network equipment corresponding to the first received confirmation request, sending confirmation information to the network equipment through the relay equipment, and sending denial information to the rest network equipment through the relay equipment to inform other network equipment that the link information is occupied;
and if the link information is occupied, transmitting negative acknowledgement information to all network equipment which transmits acknowledgement requests through the relay equipment.
In some preferred embodiments, in step S450: before establishing a file transmission link with the network device according to the link information, the method further includes:
and judging whether the file transmission link is successfully established.
Specifically, the following method may be employed:
judging whether a link information confirmation request sent by the network equipment through the relay equipment is received within a second preset time limit after the link information is issued;
if a confirmation request is received, generating confirmation information or non-confirmation information corresponding to the link information and feeding back the confirmation information or the non-confirmation information to the network equipment through the relay equipment;
if the confirmation request is not received, judging that the establishment of the file transmission link is abnormal and generating alarm information; and sending the alarm information to network equipment and operation and maintenance personnel.
In some embodiments, if there is more than one link information sent by the server to the network device, after the acknowledgement information corresponding to the acknowledgement request is fed back to the network device through the relay device, the method further includes:
and recovering the link information of other links sent to the network equipment.
As shown in fig. 6, based on the same inventive concept, an embodiment of the present specification further provides a zero-touch configuration opening apparatus, which is substantially a server, and the apparatus includes:
a third receiving module 61, configured to receive a zero-contact configuration request forwarded by a network device through a relay device, where the zero-contact configuration request includes authentication information of the network device;
a first judging module 62, configured to determine whether the network device meets a preset condition according to the identity verification information;
the matching module 63 is configured to, when it is determined that the network device meets a preset condition, obtain corresponding link information according to the identity authentication information through matching;
a second sending module 64, configured to send the link information to the network device through the relay device;
a second link establishing module 65, configured to establish a file transmission link with the network device according to the link information;
a third sending module 66, configured to send a configuration file corresponding to the authentication information to the network device through the file transfer link, so that the network device performs a zero-touch configuration opening based on the configuration file.
As shown in fig. 7, an embodiment of the present specification further provides a zero-contact configuration opening method, which is applied to a relay device, and includes:
s710: receiving a zero-contact configuration request sent by network equipment;
the zero-contact configuration request carries the authentication information of the network device. The identity authentication information comprises information such as SN number of the network equipment, port number of the network equipment, IP address of the downlink router and the like.
S720: analyzing the zero-contact configuration request to obtain the identity verification information of the network equipment;
s730: judging whether the network equipment meets a preset condition or not according to the identity verification information;
the decision logic of the relay device on whether the network device meets the preset condition may be the same as or different from the decision logic of the server on whether the network device meets the preset condition.
S740: when the network equipment meets a preset condition, forwarding the zero-contact configuration request to a server;
s750: and receiving link information matched with the identity authentication information returned by the server, so that the network equipment establishes a file transmission link with the server according to the link information.
In the zero-contact configuration opening method provided in the embodiments of the present description, the relay device may determine, according to the identity verification information of the network device, whether to forward the zero-contact configuration request sent by the relay device to the network device, so as to perform an effect of screening the network device, and avoid that the network device with an illegal identity occupies limited link resources; and meanwhile, the working pressure of the server side can be reduced. When receiving the zero-contact configuration request forwarded by the relay equipment, the server judges the identity of the network equipment according to the identity authentication information in the zero-contact configuration request again, so that the effect of double authentication can be achieved, and the safety of configuration deployment is improved.
In this embodiment of the present specification, when the relay device determines whether the network device meets the preset condition according to the authentication information in step S730, the following method may be specifically adopted:
and judging whether the network equipment is the equipment which is allowed to open according to the information such as the SN number of the network equipment, the port number of the network equipment, the IP address of the downlink router and the like.
The method can also comprise the steps of judging whether the network equipment is the next level of the relay equipment according to the architecture relationship among the network equipment, the relay equipment and the server:
when a flat topological architecture is adopted among the network equipment, the relay equipment and the server, the relay equipment is served by the network equipment of the first-level branch, and the network equipment can be the network equipment at a network point or the network equipment at the second-level branch;
when the network equipment, the relay equipment and the server adopt an un-flattened topological structure and the relay equipment is a primary branch network, the network equipment should be network equipment at a secondary branch position; when the relay device is a network device at the secondary branch, the network device is a network device at a network point.
Illustratively, when a non-flat topology architecture is adopted and a relay device is a network divided into a first-level branch, if the relay device receives a zero-contact configuration request from a network device of a node, it is determined that the network device of the node is not in compliance according to identity authentication information carried in the zero-contact configuration request.
The method further comprises:
and when the network equipment is judged to be not in accordance with the preset conditions according to the identity authentication information, refusing to forward the zero-contact configuration request and sending alarm information to an operation and maintenance personnel of an opening office so as to remind related personnel to check the network equipment.
As shown in fig. 8, an embodiment of the present specification further provides a zero-contact configuration opening apparatus, which is essentially a relay device, including:
a fourth receiving module 81, configured to receive a zero-touch configuration request sent by a network device;
the analyzing module 82 is configured to analyze the zero-contact configuration request to obtain the authentication information of the network device;
the second judging module 83 is configured to judge whether the network device meets a preset condition according to the identity verification information;
a first forwarding module 84, configured to forward the zero-touch configuration request to a server when the network device meets a preset condition;
and the second forwarding module 85 is configured to receive link information that is returned by the server and matches the authentication information, so that the network device establishes a file transmission link with the server according to the link information.
The advantages achieved by the device provided by the embodiment of the specification are consistent with those achieved by the method, and are not described in detail herein.
Based on the same inventive concept, the embodiment of the present specification further provides a zero-contact configuration opening system, which includes the server, the client and the relay device in the above technical solution.
As shown in fig. 9, for a computer device provided for embodiments herein, the computer device 902 may include one or more processors 904, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The computer device 902 may also include any memory 906 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, memory 906 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any memory may use any technology to store information. Further, any memory may provide volatile or non-volatile retention of information. Further, any memory may represent fixed or removable components of computer device 902. In one case, when the processor 904 executes the associated instructions, which are stored in any memory or combination of memories, the computer device 902 can perform any of the operations of the associated instructions. The computer device 902 also includes one or more drive mechanisms 908, such as a hard disk drive mechanism, an optical disk drive mechanism, etc., for interacting with any memory.
Computer device 902 may also include an input/output module 910(I/O) for receiving various inputs (via input device 912) and for providing various outputs (via output device 914)). One particular output mechanism may include a presentation device 916 and an associated Graphical User Interface (GUI) 918. In other embodiments, input/output module 910(I/O), input device 912, and output device 914 may also be excluded, acting as only one computer device in a network. Computer device 902 may also include one or more network interfaces 920 for exchanging data with other devices via one or more communication links 922. One or more communication buses 924 couple the above-described components together.
Communication link 922 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the Internet), a point-to-point connection, etc., or any combination thereof. Communication link 922 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers, etc., governed by any protocol or combination of protocols.
Corresponding to the methods in fig. 1-2, 4-5, and 7, the embodiments herein also provide a computer-readable storage medium having stored thereon a computer program, which, when executed by a processor, performs the steps of the above-described method.
Embodiments herein also provide computer readable instructions, wherein a program therein causes a processor to perform the method as in fig. 1-2, 4-5 and 7 when the instructions are executed by the processor.
It should be understood that, in various embodiments herein, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments herein.
It should also be understood that, in the embodiments herein, the term "and/or" is only one kind of association relation describing an associated object, meaning that three kinds of relations may exist. For example, a and/or B, may represent: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided herein, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purposes of the embodiments herein.
In addition, functional units in the embodiments herein may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present invention may be implemented in a form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The principles and embodiments of this document are explained herein using specific examples, which are presented only to aid in understanding the methods and their core concepts; meanwhile, for the general technical personnel in the field, according to the idea of this document, there may be changes in the concrete implementation and the application scope, in summary, this description should not be understood as the limitation of this document.

Claims (12)

1. A zero-touch configuration opening method, comprising:
sending a zero-contact configuration request to a server through relay equipment, wherein the zero-contact configuration request carries identity authentication information;
receiving link information matched with the identity authentication information returned by the server through the relay equipment;
establishing a file transmission link with the server according to the link information;
receiving a configuration file which is returned by the server through the file transmission link and matched with the identity authentication information;
and opening the zero-contact configuration according to the configuration file.
2. The method of claim 1, wherein before establishing a file transmission link with the server according to the link information, the method further comprises:
judging whether the received link information is unique or not;
if the link information is unique, establishing a file transmission link with the server according to the link information;
and if the link information is more than one, selecting one of the link information according to a preset screening rule, and establishing a file transmission link according to the screened link information and the server.
3. The method according to claim 2, before establishing a file transmission link with the server according to the link information, further comprising:
transmitting a link information confirmation request to the server through the relay device;
and receiving confirmation information corresponding to the confirmation request returned by the server through the relay equipment so as to establish a file transmission link with the server.
4. The method of claim 1, wherein before sending the zero contact configuration request to the server through the relay device, the method further comprises:
acquiring information of a plurality of alternative relay devices and architecture information between the alternative relay devices and a server;
and selecting one of the candidate relay devices as the relay device according to the information of the candidate relay devices and the architecture information.
5. A zero-touch configuration opening apparatus, comprising:
the system comprises a first sending module, a second sending module and a sending module, wherein the first sending module is used for sending a zero-contact configuration request to a server through relay equipment, and the zero-contact configuration request comprises identity authentication information;
the first receiving module is used for receiving link information matched with the identity authentication information, which is returned by the server through the relay equipment;
the first link establishing module is used for establishing a file transmission link with the server according to the link information;
the second receiving module is used for receiving the configuration file which is returned by the server through the file transmission link and is matched with the identity authentication information;
and the configuration module is used for carrying out zero-contact configuration opening according to the configuration file.
6. A zero-touch configuration opening method, comprising:
receiving a zero-contact configuration request forwarded by a network device through a relay device, wherein the zero-contact configuration request carries identity authentication information of the network device;
determining whether the network equipment meets a preset condition or not according to the identity authentication information;
when the network equipment is determined to meet the preset conditions, corresponding link information is obtained according to the identity authentication information in a matching mode;
transmitting the link information to the network device through the relay device;
establishing a file transmission link with the network equipment according to the link information;
and sending a configuration file corresponding to the identity authentication information to the network equipment through the file transmission link so that the network equipment performs zero-contact configuration opening based on the configuration file.
7. The method of claim 6, wherein before establishing a file transmission link with the network device according to the link information, the method further comprises:
receiving a link information confirmation request sent by the network equipment through the relay equipment;
and feeding back confirmation information corresponding to the confirmation request to the network equipment through the relay equipment so as to establish a file transmission link with the network equipment.
8. A zero-touch configuration opening apparatus, comprising:
a third receiving module, configured to receive a zero-contact configuration request forwarded by a network device through a relay device, where the zero-contact configuration request carries identity authentication information of the network device;
the first judgment module is used for determining whether the network equipment meets a preset condition according to the identity authentication information;
the matching module is used for obtaining corresponding link information according to the identity authentication information in a matching mode when the network equipment is determined to meet the preset conditions;
a second sending module, configured to send the link information to the network device through the relay device;
the second link establishing module is used for establishing a file transmission link with the network equipment according to the link information;
and the third sending module is used for sending a configuration file corresponding to the identity authentication information to the network equipment through the file transmission link so that the network equipment performs zero-contact configuration opening based on the configuration file.
9. A zero-touch configuration opening method, comprising:
receiving a zero-contact configuration request sent by network equipment;
analyzing the zero-contact configuration request to obtain the identity verification information of the network equipment;
judging whether the network equipment meets a preset condition or not according to the identity verification information;
when the network equipment meets a preset condition, forwarding the zero-contact configuration request to a server;
and receiving link information matched with the identity authentication information returned by the server, so that the network equipment establishes a file transmission link with the server according to the link information.
10. A zero-touch configuration opening apparatus, comprising:
the fourth receiving module is used for receiving a zero-contact configuration request sent by the network equipment;
the analysis module is used for analyzing the zero-contact configuration request to obtain the identity authentication information of the network equipment;
the second judgment module is used for judging whether the network equipment meets the preset condition or not according to the identity authentication information;
the first forwarding module is used for forwarding the zero-contact configuration request to a server when the network equipment meets a preset condition;
and the second forwarding module is used for receiving link information which is returned by the server and matched with the identity authentication information so as to enable the network equipment to establish a file transmission link with the server according to the link information.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 4 or 6 to 7 or 9 when executing the computer program.
12. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, performs the method of any of claims 1 to 4 or claims 6 to 7 or claim 9.
CN202110757533.4A 2021-07-05 2021-07-05 Zero-contact configuration opening method and device, computer equipment and storage medium Pending CN113472581A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110757533.4A CN113472581A (en) 2021-07-05 2021-07-05 Zero-contact configuration opening method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110757533.4A CN113472581A (en) 2021-07-05 2021-07-05 Zero-contact configuration opening method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113472581A true CN113472581A (en) 2021-10-01

Family

ID=77878058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110757533.4A Pending CN113472581A (en) 2021-07-05 2021-07-05 Zero-contact configuration opening method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113472581A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297101A (en) * 2022-06-20 2022-11-04 中银金融科技有限公司 File transmission method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190342262A1 (en) * 2018-05-02 2019-11-07 Ciena Corporation Zero touch provisioning of a network element through a Network Address Translation gateway
CN112333026A (en) * 2020-11-20 2021-02-05 迈普通信技术股份有限公司 Network device, network management device and zero configuration opening system and method for network device
CN112395016A (en) * 2020-11-26 2021-02-23 深信服科技股份有限公司 Equipment deployment method, device and related equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190342262A1 (en) * 2018-05-02 2019-11-07 Ciena Corporation Zero touch provisioning of a network element through a Network Address Translation gateway
CN112333026A (en) * 2020-11-20 2021-02-05 迈普通信技术股份有限公司 Network device, network management device and zero configuration opening system and method for network device
CN112395016A (en) * 2020-11-26 2021-02-23 深信服科技股份有限公司 Equipment deployment method, device and related equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115297101A (en) * 2022-06-20 2022-11-04 中银金融科技有限公司 File transmission method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108322345A (en) A kind of dissemination method and server of fault restoration data packet
US10997047B2 (en) Automatic selection of agent-based or agentless monitoring
CN110661670A (en) Network equipment configuration management method and device
US20050262218A1 (en) System and method for DHCP-based assignment of IP addresses to servers based on geographic identifiers
CN108886477A (en) A kind of equipment configuration method, device, customer terminal equipment and cloud server
CN107786681B (en) Method, device and system for scheduling IP address resources
CN107547589A (en) A kind of data acquisition treatment method and device
CN101156360A (en) Management based on policy in communication network
CN110289999B (en) Data processing method, system and device
CN106657259B (en) Routing server and routing service method for server cluster
EP3198792B1 (en) Automated standalone bootstrapping of hardware inventory
CN110266761B (en) Load balancing application creation method and device, computer equipment and storage medium
CN113472581A (en) Zero-contact configuration opening method and device, computer equipment and storage medium
WO2015135322A1 (en) Self-service terminal service emergency method and site server
CN109194919A (en) A kind of camera data flow distribution system, method and its computer storage medium
CN107517121B (en) Equipment configuration method and device
CN106534342A (en) Connection control method and system, and hosts
CN108933680A (en) A kind of method and apparatus of SPTN equipment resource management
CN110034979A (en) A kind of proxy resources monitoring method, device, electronic equipment and storage medium
CN104780229A (en) Method of setting cloud server IP address through cloud terminal, system and cloud system
CN113342617A (en) Equipment monitoring method, system, device, computer equipment and storage medium
CN106452892A (en) Virtual management method and system, and node
CN101661575A (en) System and method for evaluating service quality
CN109064144A (en) Receipt acquisition methods, device, computer equipment and storage medium
WO2023125139A1 (en) Network slice processing method, network element, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211001

RJ01 Rejection of invention patent application after publication