WO2013178017A1 - 无线局域网中认证信息处理方法及相关设备、计算机程序及存储介质 - Google Patents

无线局域网中认证信息处理方法及相关设备、计算机程序及存储介质 Download PDF

Info

Publication number
WO2013178017A1
WO2013178017A1 PCT/CN2013/075553 CN2013075553W WO2013178017A1 WO 2013178017 A1 WO2013178017 A1 WO 2013178017A1 CN 2013075553 W CN2013075553 W CN 2013075553W WO 2013178017 A1 WO2013178017 A1 WO 2013178017A1
Authority
WO
WIPO (PCT)
Prior art keywords
data packet
capwap
authentication
data
sent
Prior art date
Application number
PCT/CN2013/075553
Other languages
English (en)
French (fr)
Inventor
邓辉
罗海云
曹振
陈一帆
邵春菊
刘鸿
Original Assignee
***通信集团公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ***通信集团公司 filed Critical ***通信集团公司
Publication of WO2013178017A1 publication Critical patent/WO2013178017A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • Wireless Local Area Network is a wireless broadband access method that supports mobile features in a certain area.
  • WLAN provides a broadband access method for users to access the Internet.
  • WLAN access system Through the WLAN access system, users can use various Internet services such as World Wide Web (WWW, World WMe Web), file transfer, FTP (File Transfer Protocol), and E-mail.
  • the WLAN access system completes user access, access control, billing information collection, and management and control.
  • a WLAN access system is mainly composed of an access point (AP) device, an AC (Access Controller) device, and other related network devices.
  • AP access point
  • AC Access Controller
  • the AP device is a small wireless base station device of the WLAN, and completes the wireless access of the 802, 11 series standard; the AP device is also a network bridge, which is a bridge connecting the wired network and the wireless network, and any WLAN terminal device can pass the corresponding AP.
  • the device is connected to wired network resources.
  • the AP device can control user access through the network logo and Media Access Control (MAC Access) address; at the same time, the AP device supports WEP (Wired Equivalent Privacy) over-the-air encryption to protect users.
  • WEP Wired Equivalent Privacy
  • Information security In terms of data communication, the AP device is responsible for encrypting and decrypting the data packets transmitted between it and the WLAN terminal device.
  • the AP device is responsible for providing wireless signals, and the AC device acts as an access controller, and is responsible for wireless management configuration of multiple AP devices.
  • an AC device has two forms, one is a unified mode, that is, the AC device is responsible for both the wireless management configuration of the AP device and the service/authentication control. The other is the split mode, that is, the AC device is only responsible for the wireless management configuration of the AP device, and the service/authentication control function is performed on another device, which is often a broadband remote access server (BRAS, Broadband Remote Access Server). ).
  • BRAS Broadband Remote Access Server
  • the network management system needs to collect data from the BRAS and the AC device respectively. ⁇ inch completes the data merging, which requires a large transformation of the network management.
  • the authentication function is performed on the BRAS, in order to implement non-aware authentication such as EAP-PEAP/EAP-SIM (acquiring authentication information from existing user information)
  • EAP-PEAP/EAP-SIM acquiring authentication information from existing user information
  • the user does not have an awareness of the authentication process.
  • the interface between the AC device and the BRAS device needs to be added. The information about the key after successful authentication is used. The time is long and it is difficult to meet the time requirement for non-aware authentication. Therefore, in the prior art, the AC device is usually deployed in a unified mode.
  • the data packets flowing through the AP device may include the following two types: an authentication data packet including the authentication information and a normal data packet including the non-authentication information.
  • the processing flow of each device to the data packet is as follows: After receiving the data packet sent by the terminal device, the data packet is sent to the AC device without any processing, and the AC device parses the received data packet. If the AC device confirms that the received data packet is an authentication data packet, the authentication data packet is processed. Otherwise, if the normal data packet will be sent to the Internet.
  • Embodiments of the present invention provide a method, a related device, a computer program, and a storage medium for processing an authentication information in a wireless local area network, to reduce data traffic flowing through the AC device.
  • the embodiment of the invention provides a method for processing wireless local area network authentication information, including:
  • the front-end network device receives the data packet sent by the terminal device, where the front-end network device is located before the access control AC device in the WLAN system of the wireless local area network;
  • Determining that the data packet satisfies a preset authentication data packet condition Determining that the data packet satisfies a preset authentication data packet condition, and sends the data packet to the AC device.
  • An embodiment of the present invention provides a network device, where the network device is located before an access control AC device in a WLAN system of a wireless local area network, and
  • the network device includes:
  • Receiving unit, ⁇ receiving the data packet sent by the terminal device
  • a detecting unit configured to detect the data packet, and determine that the data packet meets a preset number of authentications According to the conditions of the package;
  • a sending unit configured to: when the detecting unit determines that the data packet meets a preset authentication data packet condition, send the data packet to the AC device.
  • Embodiments of the present invention also provide a computer program for performing the above method and a storage medium storing the computer program.
  • the network device in front of the AC device in the WLAN system detects the received data packet, to determine whether the data packet meets the preset authentication data packet condition, When the received data packet satisfies the preset authentication data packet condition, the data packet is sent to the AC device for processing, and when the received data packet does not meet the preset authentication data packet condition, the data packet is sent to the data packet.
  • the BRAS or the Internet so that non-authenticated data packets are not sent to the AC device, thereby reducing the data traffic processed by the AC device, saving the processing resources of the AC device, and reducing the data traffic that the AC device needs to process, and correspondingly Ground, improving the processing speed of AC equipment.
  • FIG. 1 is a schematic diagram showing an implementation process of a method for processing authentication information in a wireless local area network according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a processing flow of processing, by an AP device, a received data packet in the embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a network device in the embodiment of the present invention.
  • a schematic flowchart of an implementation process of an authentication information processing method in a wireless local area network includes the following steps:
  • the SI0 front-end network device receives the data packet sent by the terminal device
  • the front-end network device may be a network device before the AC device in the wireless local area network (WLAN) system; the data packet sent by the terminal device may be an authentication data packet or a normal data packet.
  • WLAN wireless local area network
  • the front-end network device detects the received data packet.
  • the front-end network device determines whether the received data packet meets the preset authentication data packet condition, and if yes, step S104 is performed, otherwise step S105 is performed;
  • the embodiment of the present invention provides two implementation manners, one is to detect a data packet on an AP device, and the other is to detect a data packet on a network device of a higher layer connected to the AP device, where
  • the upper-layer network device connected to the AP device can be, but is not limited to, a router device or a switch device, which are respectively described below.
  • Implementation mode 1 AP device detects the data packet
  • the AP device After receiving the data packet sent by the terminal device, the AP device first determines whether the data packet is an authentication data packet, and then sends the data packet of the authentication data packet to the AC device for processing; for the data packet of the non-authentication data packet, The AP device will forward directly through the tunnel between the AP device and the BRAS device, or directly perform MAC layer conversion and then send it to the Internet.
  • the terminal device accesses the WLAN
  • network authentication needs to be completed.
  • EAP Extensible Authentication Protocol
  • different Extensible Authentication Protocol (EAP) authentication methods are generally adopted, when the terminal and the network are used.
  • EAP authentication method the transmitted authentication data packet is referred to as an EAP authentication data packet.
  • the authentication data packet is an EAP authentication data packet as an example.
  • the EAP authentication packet is encapsulated by the EAPOL (EAP over LAN) protocol.
  • the format of the data packet is shown in Table 1: sound? , - into 3 ⁇ 4' bytes
  • the packet body is variable according to the length, 802.1 ⁇ Ethernet type indicates the Ethernet type, Protocol version indicates the protocol version number used; Packet type indicates the packet type; Packet body length indicates the packet body length; Packet body indicates the packet body, The number of bytes occupied is determined by the Packet body length.
  • the 802, lx Ethernet Type in Table 1 has been assigned a value of 0x888E (16 ⁇ , corresponding to the decimal system 34958) by the IEEE. All EAP authentication packets have this characteristic value, so that the AP device can By checking the value of the byte, it is determined that the data packet is an EAP authentication data packet.
  • the EAP data packet needs to be encapsulated by using a tunneling protocol to send the EAP authentication data packet to the AC device.
  • the tunneling protocol used by the AP device to encapsulate the EAP authentication data packet may be, but is not limited to, the CAPW (Control and Provision of Wireless Access Points) protocol, and the GRE (remote routing). Encapsulation) protocol, UDP (User Data Packet) protocol, IP-in-IP (IP-encapsulated IP) protocol, or IPSEC (IP Security Protocol), etc., correspondingly, the AP device uses the tunneling protocol to establish a tunnel with the AC device. And will be packaged through the established tunnel The subsequent EAP authentication packet is sent to the AC device.
  • the CAPW Control and Provision of Wireless Access Points
  • GRE remote routing
  • Encapsulation protocol UDP (User Data Packet) protocol
  • IP-in-IP IP-encapsulated IP
  • IPSEC IP Security Protocol
  • the CAPEAP protocol includes two encapsulation modes, CAPWAP DATA encapsulation and CAPWAP-CONTROL encapsulation, where CAPWAP-D ATA (CAPWAP data) is used.
  • CAPWAP CONTROL is used to encapsulate control messages.
  • the EAP authentication message may be encapsulated by using the CAPWAP-DATA channel, or the EAP authentication message may be encapsulated by using the CAPWAP CONTROL channel.
  • the following uses the CAPWAP CONTROL channel to encapsulate EAP authentication messages as an example.
  • the EAP authentication message encapsulated by the CAPWAP CONTROL channel can include the following two methods:
  • control message type (Control Message pe) in the CAPWAP protocol is extended.
  • control message type has i-256 optional values, of which only 1-26 are explicitly defined, but the type of encapsulated EAP authentication is not included.
  • a MESSAGE TYPE can be added.
  • AUTHENTICATION CONTROL defines a positive integer whose value is 27-255;
  • AUTHENTICATION PAYLOAD ELEMENT which defines the need to carry the ELEMENT in all AUTHENTICATION CONTROL messages.
  • the prior art defines a generic TLV format for message elements, where TYPE (type) is 16 bits, LENGTH (length) is 16 bits, VALUE
  • (Value) is a variable length (defined by the LENGTH field), and defines the semantics of the TYPE field from 1 49.
  • Type defines a positive integer between 50 and 255;
  • mode 2 does not need to extend the control message type of CAPWAP, but uses the current Some CAPWAP control messages encapsulate authentication packets.
  • the EAP authentication packet is encapsulated by using Daa Transfer Request/Response.
  • the value of the control message type is 21/22.
  • the specific message element can use the message.
  • the element Vendor Specific Pay!oad (Type: 37) carries the EAP authentication packet, and the Element ID can be defined by itself to identify the EAP authentication packet.
  • the data traffic used by the terminal device is recorded by the AC device, but, in the embodiment of the present invention, the data used by the terminal device after the AC device completes the authentication according to the received data packet to the terminal device.
  • the traffic (that is, the non-authentication packet) is forwarded directly by the AP device to the BRAS or the Internet. Therefore, the traffic accounting and user offline functions cannot be performed on the AC device. Other functional entities are required to implement the traffic accounting.
  • the data traffic information used by the terminal device is recorded by the AP device, and the data traffic information used by the terminal device is reported to the AC through a tunnel established between the AP device and the AC device according to a preset period.
  • the device provides a periodic reminder function when the data traffic used by the terminal device reaches a certain percentage of the preset traffic of the terminal device. For example, when the usage flow reaches 20%, 50%, and 80% of the preset traffic, an alert message is sent to the terminal device, so that the user can better manage their own traffic.
  • the AP device determines that the AC device records the data traffic information used by the terminal device after completing the authentication of the terminal device according to the received data packet.
  • the AC device may The AP device sends an authentication success message. For example, after the authentication succeeds, the AC device sends a key to the AP device. After receiving the key, the AP device determines that the AC device successfully authenticates the terminal device.
  • the AP device can process the data packet according to the following method, as shown in FIG. 2, including the following steps:
  • the S20 AP device receives the data packet sent by the terminal device
  • the authentication data packet is sent to the AP device.
  • the terminal device When the terminal device establishes a connection with the WLAN, when the terminal accesses the Internet through the WLAN, the normal data packet is sent to the AP device.
  • the AP device checks the value of the specified field of the received data packet.
  • the AP device determines whether the value of the specified field is a preset value, and if yes, performing the step For example, if the authentication packet is an EAP authentication packet, the specified field is 802, lx Ethernet Type, and the corresponding value is 0x888E.
  • the AP device determines that the received data packet meets the preset authentication data packet condition, and performs step S206;
  • the AP device can determine that the received data packet is an authentication data packet.
  • the AP device determines that the received data packet does not meet the preset authentication data packet condition, and performs step S215.
  • the AP device encapsulates the data packet by using a CAPWAP protocol.
  • S207 Send the encapsulated data packet to the AC device through a CAPWAP tunnel with the AC.
  • S208 The AC device performs an authentication operation on the terminal device according to the received data packet.
  • the CAPWAP tunnel will be densely accessed.
  • the AP device forwards the received key to the terminal device.
  • the S21 terminal device accesses the Internet through the accessed WLAN;
  • the terminal device accesses the Internet
  • the P2P packet is sent to the AP device to generate normal data traffic.
  • the AP device records data traffic information used by the terminal device.
  • the AP device reports the data traffic information used by the terminal device to the AC device through the CAPWAP tunnel according to a preset period.
  • the AC device When the data traffic information used by the terminal reaches a certain proportion of the preset traffic, the AC device notifies the terminal device by using the short message mode.
  • the AP device forwards the received data packet to the BRAS device or the Internet.
  • the AP device when determining that the received data packet is a normal data packet, forwards the data packet to the BRAS device through a tunnel between the BRAS, or directly performs MAC layer conversion and sends the data to the Internet.
  • the AP device detects, by using the feature value of the authentication data packet, whether the data packet received by the AP device is an authentication data packet. If yes, the data packet is encapsulated and then passed through the AP. The tunnel between the device and the AC device is sent to the AC device for processing. If not, the data packet is sent to the BRAS device for processing or sent to the Internet through the tunnel between the AP device and the BRAS device, so that only part of the data flows through the AP. The data traffic of the device is forwarded to the AC device for processing. The data traffic processed on the AC device is reduced, which saves the processing resources of the AC device. Accordingly, the processing speed of the AC device can be improved.
  • the packet detection is performed on the network device connected to the AP device and located behind the AP device, and the network device may be a switch device or a router device.
  • the location of each network device in the network is described by the transmission sequence of the data packets sent by the terminal in each network device. For example, if the data packet is transmitted to the switch device via the AP device, the switch The device is a network device located behind the AP device.
  • the process of detecting whether the data packet is the authentication data packet is the same as the process of the AP device detecting the data packet, and details are not described herein again.
  • the sending manner is different. Specifically, when the network device determines that the received data packet is an authentication data packet, the received data is received. The packet is processed. Specifically, the network device encapsulates the received data packet by the tunneling protocol; the source address filling the data packet is the address of the AP device connected to itself, and the destination address filling the data packet is the AC device address. And forward the packet according to the filled destination address, so that the AC device can receive the packet and process it.
  • the tunneling protocol of the network device may include, but is not limited to, a CAP AP protocol, a GRE protocol, a UDP protocol, an IP-in-IP, a protocol, or an IP security protocol, IPSEC.
  • the AC device After receiving the data packet, the AC device performs authentication on the terminal device according to the received data packet. After the authentication of the terminal device is completed, the AC device sends an authentication success message to the AP device, and the AP device receives the authentication success message.
  • the data traffic information used by the terminal device is recorded and reported to the AC device according to a preset period, so that the AC device can process the data according to the data traffic information used by the terminal device, and the processing manner is the same as that in the first implementation manner. I won't go into details here.
  • the related network device is also provided in the embodiment of the present invention.
  • the network device is located before the access control AC device in the WLAN system of the wireless local area network, and the principle of solving the problem by these devices and the authentication information processing method in the wireless local area network Similar, so these devices Implementation can refer to the implementation of the method, and the repetition will not be repeated.
  • a schematic structural diagram of a network device includes: a receiving unit 301, configured to receive a data packet sent by a terminal device;
  • the detecting unit 302 is configured to detect a data packet received by the receiving unit 301, and determine that the data packet meets a preset authentication data packet condition;
  • the sending unit 303 is configured to: when the detecting unit 302 determines that the data packet meets the preset authentication data packet condition, send the data packet to the AC device.
  • the sending unit 303 is further configured to: when determining that the data packet does not meet the preset authentication data packet condition, send the data packet to the broadband remote access server BRAS device or send the data packet to the Internet.
  • the detecting unit 302 may include:
  • Determining a subunit configured to determine that the data packet meets a preset authentication data packet condition if the value of the specified field is a preset value.
  • the network device may be an AP (access point) device.
  • the sending unit 303 may encapsulate the data packet by using the tunneling protocol, and the encapsulated data packet passes through the AP.
  • a tunnel between the device and the AC device is sent to the AC device, and the tunnel is established using the tunneling protocol.
  • the tunneling protocol used may include, but is not limited to, CAPWAP, protocol, GRE protocol, UDP t3 ⁇ 4, protocol, IP m-IP protocol, or IP security protocol IPSEC.
  • the CAP AP is negotiated.
  • the sending unit 303 can be configured to encapsulate the data packet by using a CAPWAP-DATA channel or a CAPWAP-Control channel.
  • the access point device may further include: a recording unit, configured to: after receiving the authentication success message sent by the AC device, record data traffic information used by the terminal device;
  • the reporting unit is configured to report the recorded data traffic information to the AC device according to a preset period.
  • the network device may be a network device connected to the AP device and located behind the AP device in the WLAN system, for example, a router device or a switch device, where the network device is connected to the AP device and located behind the AP device.
  • the sending unit 303 may be configured to encapsulate the received data packet by using a tunneling protocol; filling the data source address of the data packet into an AP The address of the device, and the destination address that populates the packet is the AC device address; and forwards the packet based on the padded destination address.
  • the network device located before the AC device detects the received data packet to determine whether the data packet meets the preset authentication data packet condition, and when the received data packet meets the preset authentication data packet condition The data packet is sent to the AC device for processing.
  • the data packet is sent to the BRAS or the Internet, so that the non-authentication data packet is not recognized.
  • the data is sent to the AC device, thereby reducing the data traffic processed by the AC device, saving the processing resources of the AC device.
  • the processing speed of the AC device is improved by reducing the data traffic that the AC device needs to process.
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the application can take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the instruction device implements the functions specified in one or more blocks of the flowchart or in a flow or block of the flowchart.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种无线局域网中认证信息处理方法及相关网络设备、计算机程序及存储介质,用以减少流经AC设备的数据流量,其中,无线局域网中认证信息处理方法,包括:前端网络设备接收终端设备发送的数据包,所述前端网络设备位于WLAN***中的AC设备之前;并检测所述数据包;以及确定所述数据包满足预设的认证数据包条件时,将所述数据包发送给AC设备。

Description

无线局域网 (WLAN, Wireless Local Area Network)是一种能够在一定区 域范围内支持移动特性的无线宽带接入方式, WLAN为用户访问互联网提供 了一种宽带接入方式。通过 WLAN接入***,用户能够使用万维网(WWW, World WMe Web ) , 文件传输 、议 (FTP, File Transfer Protocol) , E- mail等各 种互联网业务。 WLAN接入***完成用户的接入, 接入控制, 计费信息采集 以及 务管理和控制等。 WLAN接入***主要由接入点 (AP, Access Point) 设备和业务控制 (AC, Access Controller) 设备以及其它相关网络设备组成。
AP设备是 WLAN的小型无线基站设备, 完成 802,11系列标准的无线接入; AP 设备也是一种网络桥接器, 是连接有线网络与无线网络的桥梁, 任何 WLAN终端设备均可通过相应的 AP设备接入到有线网络资源。 在安全控制 方面, AP设备可以通过网络标志和介质访问控制(MAC设备, Media Access Control )地址来控制用户接入;同时 AP设备支持有线等效保密( WEP, Wired Equivalent Privacy) 空中加密, 保护用户信息安全; 在数据通讯方面, AP设 备负责完成它与 WLAN终端设备之间所传输的数据包的加密和解密。
目前, 运营商部署的 WLAN网络, AP设备负责提供无线信号, AC设备 作为接入控制器, 负责属下多个 AP设备的无线管理配置。 通常, AC设备有 两种形态, 一种是合一模式, 即 AC设备既负责 AP设备的无线管理配置, 也 负责 务 /认证控制。 另一种是分离模式, 即 AC设备只负责 AP设备的无线 管理配置, 业务 /认证控制这部分功能放在另外一台设备上完成, 遥常是宽带 远程接入服务器 ( BRAS, Broadband Remote Access Server )。
由于在分离模式下, 网络发展和融合面临了很多问题, 首先基于分离模 式下的性能管理需要网管***分别从 BRAS和 AC设备进行数据采集, 并同 ø寸完成数据合并, 需要网管进行较大改造; 其次, 分离模式下, 由于认证功 能在 BRAS上执行, 为了实现 EAP-PEAP/EAP-SIM等无感知认证(从已有用 户信息中获取认证信息, 用户对于认证过程无感知) 技术, 需要增加 AC设 备和 BRAS设备接口, 用于下发认证成功后的密钥等信息, 耗费周期较长, 难以满足无感知认证的时间要求。 因此, 现有技术中通常采用合一模式部署 AC设备。
目前流经 AP设备的数据包可以包括以下两类: 包含认证信息的认证数 据包和包含非认证信息的普通数据包, 目前, WLAN接入 ***中, 各设备 对数据包处理流程如下: AP设备接收到终端设备发送的数据包后, 不进行任 何处理即发送给 AC设备, AC设备解析接收到的数据包, 若 AC设备确认接 收到的数据包为认证数据包, 将对认证数据包进行处理, 否则, 若为普通数 据包将发送到互联网。 由上述流程可知, 现有技术中, AP设备接收到的所有 数据包均需要发送给 AC设备, 但是 AC设备只需要处理其中的认证数据包, 这样, - -方面造成了 AC设备成为数据流量的处理瓶颈, 降低了 AC设备的 处理速度, 另一方面也浪费了 AC设备的处理资源。 本发明实施例提供一种无线局域网中认证信息处理方法及相关设备、 计 算机程序及存储介质, 用以减少流经 AC设备的数据流量。
本发明实施例提供一种无线局域网认证信息处理方法, 包括:
前端网络设备接收终端设备发送的数据包, 所述前端网络设备位于无线 局域网 WLAN***中的接入控制 AC设备之前; 并
检测所述数据包; 以及
确定所述数据包满足预设的认证数据包条件^,将所述数据包发送给 AC 设备。
本发明实施例提供一种网络设备, 所述网络设备位于无线局域网 WLAN ***中的接入控制 AC设备之前, 以及
所述网络设备, 包括:
接收单元, ^于接收终端设备发送的数据包;
检测单元, 用于检测所述数据包, 并确定所述数据包满足预设的认证数 据包条件;
发送单元,用于检測单元确定所述数据包满足预设的认证数据包条件时, 将所述数据包发送给 AC设备。
本发明的实施例还提供一种用于执行上述方法的计算机程序及存储该计 算机程序的存储介质。
本发明实施例提供的无线局域网中认证信息处理方法及相关设备, 位于 WLAN***中的 AC设备之前的网络设备检测接收到的数据包, 以确定该数 据包是否满足预设的认证数据包条件, 当接收到的数据包满足预设的认证数 据包条件时, 将该数据包发送给 AC设备处理, 当接收到的数据包不满足预 设的认证数据包条件日寸, 将该数据包发送给 BRAS或者互联网, 从而使得非 认证数据包不会发送给 AC设备, 从而, 减少了 AC设备处理的数据流量, 节约了 AC设备的处理资源, 同时, 由于减少了 AC设备需要处理的数据流 量, 相应地, 提高了 AC设备的处理速度。
本发明的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从说 明书中变得显而易见, 或者遥过实施本发明而了解。 本发明的目的和其他优 点可通过在所写的说明书、 权利要求书、 以及^图中所特别指出的结构来实 现和获得。 图 1 为本发 I 1实施例中, 无线局域网中认证信息处理方法的实施流程示 意图;
图 2为本发 H 实施例中, AP设备对接收到的数据包进行处理的处理流程 示意图;
图 3为本发 H 实施例中, 网络设备的结构示意图。
AC设备的数据流量, 节约 AC设备的处理资源, 提高 AC
Figure imgf000005_0001
本发明实施例提供了一种无线局域网中认证信息处理方法 书附图对本发明的优选实施例进行说明, 应当理解, 此处 所描述的优选实施例仅用于说明和解释本发明, 并不用于限定本发明, 并—且. 在不冲突的情况下, 本发明中的实施例及实施例中的特征可以相互组合。 如图 1所示, 为本发明实施例中, 无线局域网中认证信息处理方法的实 施流程示意图, 包括以下步骤:
SI0 前端网络设备接收终端设备发送的数据包;
其中, 前端网络设备可以为位于无线局域网 (WLAN) ***中的 AC设 备之前的网络设备; 终端设备发送的数据包可以为认证数据包, 也可以为普 通数据包。
5102、 前端网络设备检测接收到的数据包;
5103、 前端网络设备判断接收到的数据包是否满足预设的认证数据包条 件, 如果是, 执行步骤 S104, 否则执行步骤 S105;
5104、 将该数据包发送给 AC设备;
5105、 将接收到的数据包发送给 BRAS设备或者将接收到的数据包发送 到互联网。
具体实施时, 本发明实施例提供了两种实现方式, 一种是在 AP 设备上 对数据包进行检测, 一种是在与 AP 设备连接的上一层网络设备上对数据包 进行检测, 其中, 与 AP 设备连接的上一层网络设备可以但不限于为路由器 设备或者交换机设备, 以下分别介绍之。
实现方式一 AP设备对数据包进行检测
当 AP 设备接收到终端设备发送的数据包之后, 首先要判断该数据包是 否为认证数据包, 然后, 将认证数据包的数据包发送给 AC设备进行处理; 对于非认证数据包的数据包, AP设备将直接通过 AP设备与 BRAS设备之间 的隧道进行转发, 或者直接进行 MAC层转换后发送到互联网中。
具体实施时, 终端设备在接入 WLAN时, 需要完成网络认证, 特别是在 无感知网络认证中, 通常采用不同的可扩展认证 、议 (EAP , Extensible Authentication Protocol)认证方法, 当终端与网络之间采用 EAP认证方法时, 所传输的认证数据包称为 EAP认证数据包, 为了便于描述, 本发明实施例中 以认证数据包为 EAP认证数据包为例进行说明。
EAP认证数据包通过 EAPOL (EAP over LAN) 协议进行封装, 其数据 包格式如表 1所示: 音?、 -入 ¾' 字节数
802.1 χ Ethernet type 2
Protocol version 1
Packet type 1
Packet body length 2
Packet body 根据长度可变 其中 , 802.1 χ Ethernet type表示以太网类型, Protocol version表示采用的 协议版本号; Packet type表示数据包类型; Packet body length表示数据包包 体长度; Packet body表示包体, 其占用的字节数由 Packet body length确定。 其中, Packet Type包含以下几种数据包: a) EAP-PACKET: EAP认证数据包, Packet Type-0; b) EAPOL- START: EAP 认证开始, Packet Type =1 ; c) EAPOL-LOGOFF: EAP认证终止, Packet Type -2; d) EAPOL- EY: EAP 认 证 成 功 后 的 密 钥 传 递 , Packet Type -3 ; e) EAPOL- ENCAPSULATED ASF- ALERT : 供通过非授权端口传递紧急信息, Packet Type =4。
目前,表 1中的 802, lx Ethernet Type已经由 IEEE分配了一个值为 0x888E ( 16迸制数, 对应十迸制 34958), 所有的 EAP认证数据包都具有这个特征 值, 从而, AP设备可以通过检查该字节的取值来判断出此数据包是 EAP认 证数据包。 当 AP设备识别出 EAP认证数据包时, 需要使用某种隧道协议对 该 EAP数据包进行封装, 以便将该 EAP认证数据包发送给 AC设备。具体实 施时, AP设备对 EAP认证数据包进行封装所采用的隧道协议可以但不限于 包括无线接入点的控制和配置 (CAPW >, Control and Provision of Wireless Access Points)协议、 GRE (遥用路由封装)协议、 UDP (用户数据包)协议、 IP-in-IP (IP里面封装 IP) 协议或者 IPSEC (IP安全协议) 等, 相应地, AP 设备使用该隧道协议建立与 AC设备之间的隧道, 并通过建立的隧道将封装 后的 EAP认证数据包发送给 AC设备。 特别地, 若 AP设备和 AC设备之间 采用 CAPWAP协议封装 EAP认证数据包时, CAPEAP ^议中包含两种封装 方式, CAPWAP DATA 封装和 CAPWAP- CONTROL 封装, 其中 CAPWAP- D ATA ( CAPWAP数据) 用于封装数据消息, CAPWAP CONTROL ( CAPWAP 控制) 用于封装控制消息。 本发明实施例中, 既可以使用 CAPWAP- DATA信道封装 EAP认证消息, 也可以使用 CAPWAP CONTROL 信道封装 EAP认证消息。 以下以使用 CAPWAP CONTROL信道封装 EAP认 证消息为例进行说明。
具体实施时, 使用 CAPWAP CONTROL信道封装 EAP认证消息可以包 括以下两种方式:
方式… ·
1 ) 扩展 CAPWAP协议中的控制消息类型 (Control Message pe), 目前 控制消息类型共有 i- 256个可选值, 其中仅有 1 -26被明确定义, 但是不包含 封装 EAP 认证的类型, 因此本发明实施例中可以新增 MESSAGE TYPE—
"AUTHENTICATION CONTROL 定义其值为 27- 255中的正整数;
2 ) 扩展 CAPWAP t¾、议中消息元素 (MESSAGE ELEMENT )
AUTHENTICATION PAYLOAD ELEMENT, 定义所有 AUTHENTICATION CONTROL消息中需要携带该 ELEMENT, 现有技术定义了消息元素的通用 TLV格式, 其中 TYPE (类型) 占 16位, LENGTH (长度) 占 16位, VALUE
(值) 为可变长度 (由 LENGTH字段定义), 且定义了 TYPE字段从 1 49的 语义, 本发明实施例中, 如果使用 CAPWAP- CONTROL消息传递 EAP认证 数据包, 则需要定义新的消息元素类型, 定义其值为 50-255之间的正整数; 定义了上述的 MESSAGE TYPE和 MESSAGE ELEMENT TYPE之后, AP设备就可以把 EAP认证数据包封装在 CAPWAP CONTROL隧道中。 AP 设备和 AC设备在处理 AUTHENTICATION CONTROL类型的消息时, 由于 该消息只是借用 CAPWAP- CONTROL隧道, 因此, 不需要对 CAPWAP中定 义的序列号等元素做严格检查。 与方式一不同, 方式二无需扩展 CAPWAP的控制消息类型, 而是使用现 有的 CAPWAP 控制消息封装认证数据包, 例如, 使用 Daia Transfer Request/Response封装 EAP认证数据包,该控制消息类型的取值分别为 21/22, 在该控制消息中, 具体的消息元素可以采用消息元素 Vendor Specific Pay!oad ( Type: 37 )来承载 EAP认证数据包, 在使用时可以自行定义 Element ID以 识别 EAP认证数据包。
特别地, 在现有技术中, 由 AC设备记录终端设备使用的数据流量, 但 是, 由于本发明实施例中, 在 AC设备根据接收到的数据包对终端设备完成 认证之后, 终端设备使用的数据流量 (即非认证数据包) 由 AP 设备直接转 发至 BRAS或者互联网, 因此, 流量计费和用户下线功能无法在 AC设备上 执行, 需要其他的功能实体才能实现流量计费。
较佳地, 本发明实施中, 可以由 AP 设备记录终端设备使用的数据流量 信息,并按照预设周期、通过 AP设备和 AC设备之间建立的隧道将终端设备 使用的数据流量信息上报给 AC设备, 当终端设备使用的数据流量达到该终 端设备预设流量的一定比例时, 可以提供定期的提醒功能。 例如, 当使用流 量达到预设流量的 20%, 50%, 80%时分别发送提醒消息给终端设备, 便于 ^户更好的管理自己的流量。 具体的, AP设备确定 AC设备在根据接收到的 数据包完成对终端设备的认证之后,开始记录终端设备使用的数据流量信息, 具体实施时, AC设备在完成对终端设备的认证之后, 会向 AP设备发送认证 成功消息, 例如 AC设备在认证成功之后, 会向 AP设备下发密钥, AP设备 以接收到密钥之后确定 AC设备对终端设备认证成功。
基于上述分析, 本发明实施例中, AP设备可以按照以下方法对数据包迸 行处理, 如图 2所示, 包括以下步骤:
S20 AP设备接收终端设备发送的数据包;
具体的, 终端设备需要与 WLAN建立连接时, 将向 AP设备发送认证数 据包; 当终端设备与 WLAN建立连接之后, 通过 WLAN访问互联网时, 将 向 AP设备发送普通数据包。
5202、 AP设备检查接收到的数据包指定字段的取值;
5203 , AP设备判断该指定字段的取值是否为预设值, 如果是, 执行步骤 例如, 若认证数据包为 EAP认证数据包时, 指定字段为 802, lx Ethernet Type, 而其对应的取值为 0x888E,
5204、 AP设备确定接收到的数据包满足预设的认证数据包条件, 并执行 步骤 S206;
若接收到的数据包满足预设的认证数据包条件, AP设备可以确定接收到 的数据包为认证数据包。
5205、 AP设备确定接收到的数据包不满足预设的认证数据包条件, 并执 行步骤 S215 ;
5206、 AP设备采用 CAPWAP ¾议对该数据包进行封装;
5207、将封装后的数据包通过与 AC之间的 CAPWAP隧道发送给 AC设 备;
5208、 AC设备根据接收到的数据包对终端设备执行认证操作;
5209、 AC设备完成对该终端设备的认证之后, 遥过 CAPWAP隧道将密
5210、 AP设备将接收到的密钥转发给终端设备;
S21 终端设备通过接入的 WLAN访问互联网;
具体的, 终端设备访问互联网时, 将向 AP设备发送普遥数据包, 产生 普通数据流量;
5212, AP设备记录终端设备使用的数据流量信息;
5213, AP设备按照预设周期、 通过 CAPWAP隧道将终端设备使用的数 据流量信息上报给 AC设备;
5214, AC设备在终端使用的数据流量信息达到预设流量的一定比例时, 遥过短信方式通知终端设备;
5215, AP设备将接收到的数据包转发给 BRAS设备或者互联网。
具体的, AP设备在确定接收到的数据包为普通数据包时, 将该数据包通 过与 BRAS之间的隧道转发给 BRAS设备处理, 或者直接进行 MAC层转换 发送到互联网。
实现方式一中,在 AP设备上通过认证数据包的特征值检测 AP设备接收 到的数据包是否为认证数据包, 如果是, 将该数据包进行封装后, 通过 AP 设备和 AC设备之间的隧道发送给 AC设备进行处理, 如果否, 将该数据包 发送通过 AP设备与 BRAS设备之间的隧道发送给 BRAS设备处理或者发送 给互联网, 这样, 只有部分流经 AP设备的数据流量被转发至 AC设备处理, 认而, 减少了 AC设备上处理的数据流量, 节约了 AC设备的处理资源, 相 应地, 能够提高 AC设备的处理速度。
实现方式二
实现方式二中, 在 WLAN***中、 与 AP设备连接且位于 AP设备之后 的网络设备上进行数据包检测, 该网络设备可以为交换机设备或者路由器设 备。 需要说明的是, 本发明实施例中, 以终端发送的数据包在各网络设备间 的传输顺序来描述各网络设备在网络中的位置, 例如, 数据包经由 AP 设备 向交换机设备传输, 则交换机设备为位于 AP 设备之后的网络设备。 在这种 实现方式下, 该网络设备检测数据包是否为认证数据包的流程与 AP 设备检 测数据包的流程相同, 这里不再赘述。 二者的区别在于: 将确定为认证数据 包的数据包发送给 AC设备时的发送方式不同, 具体的, 当该网络设备确定 接收到的数据包为认证数据包时, 将对接收到的数据包进行处理, 具体的, 该网络设备使 ^隧道协议封装接收到的数据包; 填充该数据包的源地址为与 自身连接的 AP设备的地址, 以及填充该数据包的目标地址为 AC设备地址; 并根据填充的目标地址转发该数据包, 使得 AC设备能够接收到该数据包并 进行处理。其中, 该网络设备使 ^的隧道协议可以但不限于包括 CAP AP协 议、 GRE协议、 UDP协议、 IP- in- IP 、议或者 IP安全协议 IPSEC等。
AC设备接收到数据包之后, 根据接收到的数据包对终端设备迸行认证, 在完成对终端设备的认证之后, AC设备将向 AP设备发送认证成功消息, AP 设备接收到该认证成功消息之后, 将开始记录该终端设备使用的数据流量信 息, 并按照预设周期上报给 AC设备, 使得 AC设备能够根据终端设备使用 的数据流量信息进行相应地处理, 其处理方式与实现方式一中相同, 这里不 再赘述。
基于同一发明构思, 本发明实施例中还提供了相关网络设备, 这些, 网 络设备位于无线局域网 WLAN***中的接入控制 AC设备之前, 由于这些设 备解决问题的原理与无线局域网中认证信息处理方法相似, 因此这些设备的 实施可以参见方法的实施, 重复之处不再赘述。
如图 3所示, 为本发明实施例提供的网络设备的结构示意图, 包括: 接收单元 301, 用于接收终端设备发送的数据包;
检测单元 302, 用于检測接收单元 301接收到的数据包, 并确定该数据 包满足预设的认证数据包条件;
发送单元 303, 用于检測单元 302确定该数据包满足预设的认证数据包 条件时, 将该数据包发送给 AC设备。
具体实施时, 发送单元 303, 还可以用于确定该数据包不满足预设的认 证数据包条件时, 将该数据包发送给宽带远程接入服务器 BRAS设备或者将 该数据包发送到互联网。
较佳地, 检测单元 302, 可以包括:
检查子单元, 用于检查所述数据包指定字段的取值;
确定子单元, 用于若指定字段的取值为预设值时, 确定所述数据包满足 预设的认证数据包条件。
其中, 该网络设备可以为 AP (接入点)设备, 当该网络设备为接入点设 备时, 发送单元 303 , 可以 ^于使 ^隧道协议封装该数据包, 以及封装后的 数据包通过 AP设备与 AC设备之间的隧道发送给 AC设备,该隧道使用该隧 道协议建立。 其中, 使用的隧道协议可以但不限于包括 CAPWAP 、议、 GRE 协议、 UDP t¾、议、 IP m- IP协议或者 IP安全协议 IPSEC; 具体实施时, 若采 ^的隧道 、议为 CAP AP 、议时, 发送单元 303, 可以用于使用 CAPWAP-DATA信道或者 CAPWAP- CONTROL信道封装该数据包。
较佳地, 若该网络设备为接入点设备时, 接入点设备还可以包括: 记录单元, 用于在接收到 AC设备发送的认证成功消息之后, 记录该终 端设备使用的数据流量信息;
上报单元, 用于按照预设周期向 AC设备上报记录的数据流量信息。 具体实施时, 该网络设备还可以为 WLAN***中, 与 AP设备连接且位 于 AP 设备之后的网络设备, 例如可以为路由器设备或者交换机设备, 当该 网络设备为与 AP设备连接且位于 AP设备之后的网络设备时, 发送单元 303 可以用于使用隧道协议封装接收到的数据包; 填充该数据包的源地址为 AP 设备的地址, 以及填充该数据包的目标地址为 AC设备地址; 并根据填充的 目标地址转发该数据包。
本发明实施例提供的无线局域网中认证信息处理方法及相关设备, 在
WLAN接入***中, 位于 AC设备之前的网络设备, 检测接收到的数据包, 以确定该数据包是否满足预设的认证数据包条件, 当接收到的数据包满足预 设的认证数据包条件日寸, 将该数据包发送给 AC设备处理, 当接收到的数据 包不满足预设的认证数据包条件日寸, 将该数据包发送给 BRAS或者互联网, 认而使得非认证数据包不会发送给 AC设备, 从而, 减少了 AC设备处理的 数据流量, 节约了 AC设备的处理资源, 同时, 由于减少了 AC设备需要处 理的数据流量, 相应地, 提高了 AC设备的处理速度。
本领域内的技术人员应明白, 本申请的实施例可提供为方法、 ***、 或 计算机程序产品。 因此, 本申请可采用完全硬件实施例、 完全软件实施例、 或结合软件和硬件方面的实施例的形式。 而且, 本申请可采用在一个或多个 其中包含有计算机可 ^程序代码的计算机可用存储介质 (包括但不限于磁盘 存储器、 CD- ROM、 光学存储器等) 上实施的计算机程序产品的形式。
本申请是参照根据本申请实施例的方法、 设备(***)、 和计算机程序产 品的流程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图 和 I或方框图中的每一流程和 I或方框、 以及流程图和 I或方框图中的流程 和 I或方框的结合。可提供这些计算机程序指令到通 ^计算机、专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器, 使得通 过 算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流 程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 直
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设 备以特定方式工作的计算机可读存储器中, 使得存储在该 算机可读存储器 中的指令产生包括指令装置的制造品, 该指令装置实现在流程图一个流程或 多个流程和 /或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的 处理, 从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图 一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的步 骤。
尽管已描述了本申请的优选实施例, 但本领域内的技术人员一旦得知了 基本创造性概念, 则可对这些实施例做出另外的变更和修改。 所以, 所^权 利要求意欲解释为包括优选实施例以及落入本申请范围的所有变更和修改。
显然, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。

Claims

一种无线局域网中认证信息处理方法, 其特征在于, 包括: 前端网络设备接收终端设备发送的数据包, 所述前端网络设备位于无线 局域网 WLAN***中的接入控制 AC设备之前; 并
检测所述数据包; 以及
确定所述数据包满足预设的认证数据包条件时,将所述数据包发送给 AC 设备。
2、 如权利要求 1所述的方法, 其特征在于, 还包括:
确定所述数据包不满足预设的认证数据包条件时, 将所述数据包发送给 宽带远程接入服务器 BRAS设备或者将所述数据包发送到互联网。
3、 如权利要求 1所述的方法, 其特征在于, 按照以下方法确定所述数据 检查所述数据包指定字段的取值; 以及
若指定字段的取值为预设值时, 确定所述数据包满足预设的认证数据包 余 ΊΤ。
4、 如权利要求 3所述的方法, 其特征在于, 所述前端网络设备为接入点 ΑΡ设备; 以及
将所述数据包发送给 AC设备, 具体包括:
使用隧道协议封装所述数据包; 并
将封装后的数据包通过 AP设备与 AC设备之间的隧道发送给 AC设备, 所述隧道使用所述隧道 ^议建立。
5、如权利要求 4所述的方法, 其特征在于, 若所述隧道协议为 CAPWAP 协议时, 使用隧道协议封装所述数据包, 具体包括:
使用 CAPWAP 数据 CAPWAP DATA 信道或者 CAPWAP 控制 CAPWAP- CONTROL信道封装所述数据包。
6、 如权利要求 5所述的方法, 其特征在于, 使用 CAPWAP- CONTROL 信道封装所述数据包时, 还包括: 扩展 CAP AP CONTROL消息类型,并定义扩展的 CAP AP- CONTROL 消息类型值为 27〜255中任一整数值; 或者
扩展 CAPWAP CONTROL消息元素,并定义扩展的 CAPWAP- CONTROL 消息元素类型值为 50〜255中任一整数值。
7、 如权利要求 5所述的方法, 其特征在于, 使用 CAP AP-CONTROL 信道封装所述数据包, 具体包括:
使用已定义的 CAPWAP-CONTROL 消息封装所述数据包, 并定义 CAPWAP- CONTROL消息的消息元素标识为指定值。
8、 如权利要求 3所述的方法, 其特征在于, 所述前端网络设备为与 AP 设备连接且位于 AP设备之后的网络设备; 以及
将所述数据包发送给 AC设备, 具体包括:
使用隧道协议封装所述数据包; 并
填充所述数据包的源地址为所述 AP 设备的地址, 以及填充所述数据包 的目标地址为 AC设备地址; 并
根据所述目标地址转发所述数据包。
9、 如权利要求 4〜8任一权利要求所述的方法, 其特征在于, 还包括: 所述 AP设备在接收到所述 AC设备发送的认证成功消息之后,记录所述 终端设备使用的数据流量信息; 并
按照预设周期向所述 AC设备上报记录的数据流量信息。
10、 一种网络设备, 其特征在于, 所述网络设备位于无线局域网 WLAN ***中的接入控制 AC设备之前, 以及
所述网络设备, 包括:
接收单元, 用于接收终端设备发送的数据包;
检测单元, 用于检测所述数据包, 并确定所述数据包满足预设的认证数 据包条件;
发送单元,用于检测单元确定所述数据包满足预设的认证数据包条件时, 将所述数据包发送给 AC设备。
I 如权利要求 10所述的网络设备, 其特征在于,
所述发送单元,还用于确定所述数据包不满足预设的认证数据包条件寸, 将所述数据包发送给宽带远程接入服务器 BRAS设备或者将所述数据包发送 到互联网。
12、如权利要求 10所述的网络设备,其特征在于, 所述检测单元,包括: 检查子单元, 用于检查所述数据包指定字段的取值;
确定子单元, 用于若指定字段的取值为预设值时, 确定所述数据包满足 预设的认证数据包条件。
13、 如权利要求 10所述的网络设备, 其特征在于, 所述网络设备为接入 点 AP 设备, 所述发送单元, 具体用于使用隧道协议封装所述数据包, 以及 将封装后的数据包通过 AP设备与 AC设备之间的隧道发送给 AC设备,所述 隧道使用所述隧道协议建立。
14、 如权利要求 13所述的网络设备, 其特征在于,
所述发送单元, 具体用于使 ffi CAPWAP数据 CAP AP- DATA信道或者 CAPWAP控制 CAPWAP- CONTROL信道封装所述数据包。
15、 如权利要求 14所述的网络设备, 其特征在于,
所述发送单元, 还用于使用 CAPWAP- CONTROL 信道封装所述数据包 时,扩展 CAPWAP- CONTROL消息类型,并定义扩展的 CAPWAP- CONTROL 消息类型值为 27〜255中任一整数值; 或者扩展 CAPWAP- CONTROL消息元 素, 并定义扩展的 CAPWAP- CONTROL消息元素类型值为 50~255中任一整 数值。
16、 如权利要求 14所述的网络, 其特征在于,
所述发送单元,具体用于使用已定义的 CAPWAP- CONTROL消息封装所 述数据包, 并定义 CAPWAP- CONTROL消息的消息元素标识为指定值。
17、 如权利要求 13所述的网络设备, 其特征在于, 还包括:
记录单元, ^于在接收到 AC设备发送的认证成功消息之后, 记录所述 终端设备使用的数据流量信息;
上报单元, 用于按照预设周期向所述 AC设备上报记录的数据流量信息。
18、 如权利要求 10所述的网络设备, 其特征在于, 所述网络设备为与接 入点 AP设备连接且位于 AP设备之后的网络设备, 所述发送单元, 用于使用 隧道协议封装所述数据包; 填充所述数据包的源地址为所述 AP设备的地址, 以及填充所述数据包的目标地址为 AC设备地址; 根据所述目标地址转发所 述数据包。
】9、 一种包括指令的计算机程序, 所述指令在由处理器执行时被设置成 使所述处理器执行如权利要求 1 9中任一项所述的方法。
20、 一种存储了如权利要求 19所述计算机程序的存储介质。
PCT/CN2013/075553 2012-05-28 2013-05-13 无线局域网中认证信息处理方法及相关设备、计算机程序及存储介质 WO2013178017A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210170228.6 2012-05-28
CN2012101702286A CN103458405A (zh) 2012-05-28 2012-05-28 无线局域网中认证信息处理方法及相关网络设备

Publications (1)

Publication Number Publication Date
WO2013178017A1 true WO2013178017A1 (zh) 2013-12-05

Family

ID=49672399

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/075553 WO2013178017A1 (zh) 2012-05-28 2013-05-13 无线局域网中认证信息处理方法及相关设备、计算机程序及存储介质

Country Status (2)

Country Link
CN (1) CN103458405A (zh)
WO (1) WO2013178017A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104754602A (zh) * 2013-12-30 2015-07-01 ***通信集团上海有限公司 一种无线质量监控方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505329A (zh) * 2002-11-28 2004-06-16 深圳市中兴通讯股份有限公司 数据帧转发方法
US7646713B1 (en) * 2005-10-06 2010-01-12 Alcatel Lucent Method and access node configured for providing intelligent cross connection functionality
CN101640621A (zh) * 2008-08-01 2010-02-03 上海贝尔阿尔卡特股份有限公司 一种在无线网络中实现数据传输的方法和装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100591068C (zh) * 2003-03-04 2010-02-17 华为技术有限公司 一种桥接设备透传802.1x认证报文的方法
JP4796754B2 (ja) * 2004-06-15 2011-10-19 日本電気株式会社 ネットワーク接続システムおよびネットワーク接続方法
CN100486198C (zh) * 2006-11-21 2009-05-06 杭州华三通信技术有限公司 无线局域网中搜索接入控制器的方法及代理服务器
CN101841815B (zh) * 2010-04-14 2012-05-30 曹鹏 基于无线路由器的集群受控方法及网络***

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1505329A (zh) * 2002-11-28 2004-06-16 深圳市中兴通讯股份有限公司 数据帧转发方法
US7646713B1 (en) * 2005-10-06 2010-01-12 Alcatel Lucent Method and access node configured for providing intelligent cross connection functionality
CN101640621A (zh) * 2008-08-01 2010-02-03 上海贝尔阿尔卡特股份有限公司 一种在无线网络中实现数据传输的方法和装置

Also Published As

Publication number Publication date
CN103458405A (zh) 2013-12-18

Similar Documents

Publication Publication Date Title
US20220360634A1 (en) User plane model for non-3gpp access to fifth generation core network
WO2018137488A1 (zh) 安全实现方法、设备以及***
US10805473B2 (en) Triggering a usage of a service of a mobile packet core network
CN110999359B (zh) 通过非接入层的安全短消息服务
JP5209475B2 (ja) Simカードを有する個人用アクセスポイント
WO2020024764A1 (zh) 一种鉴权过程中验证用户设备标识的方法及装置
WO2019033920A1 (zh) 网络侧对远端用户设备的识别和控制方法以及设备
TW201644236A (zh) 使用用於服務c平面方法的網路符記的高效策略實施
JP4022121B2 (ja) 統合無線通信システム、移動体通信システム、交換装置及び無線端末、並びに通信方法
WO2010075745A1 (zh) 鉴权处理方法和***、3gpp认证授权计费服务器及用户设备
TW201108766A (en) Fast authentication between heterogeneous wireless networks
WO2020238327A1 (zh) 一种用户面连接的建立方法、装置及***
WO2019062862A1 (zh) 参数的保护方法、设备和***
US7979901B2 (en) Controlling the number of internet protocol security (IPsec) security associations
WO2012167500A1 (zh) 一种隧道数据安全通道的建立方法
EP2317694B1 (en) Method and system and user equipment for protocol configuration option transmission
WO2011127774A1 (zh) 一种用户终端接入互联网方式的控制方法及装置
JP6245619B2 (ja) データ送信方法、装置、およびシステム
WO2009012675A1 (fr) Passerelle de réseau d'accès, terminal, procédé et système pour établir une connexion de données
WO2008110099A1 (fr) Procédé, système et dispositif associé pour accès d'un appareil d'authentification à un réseau de communication
WO2014048373A1 (zh) 无线信息传输方法和设备
WO2013178017A1 (zh) 无线局域网中认证信息处理方法及相关设备、计算机程序及存储介质
WO2011066779A1 (zh) 业务流加密处理方法及***
JP2020505845A (ja) 緊急アクセス中のパラメータ交換のための方法およびデバイス
CN108990052B (zh) Wpa2协议脆弱性的检测方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13797159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13797159

Country of ref document: EP

Kind code of ref document: A1