CN103384281A - Method for preventing EZVPN dialing failure - Google Patents
Method for preventing EZVPN dialing failure Download PDFInfo
- Publication number
- CN103384281A CN103384281A CN2013102574877A CN201310257487A CN103384281A CN 103384281 A CN103384281 A CN 103384281A CN 2013102574877 A CN2013102574877 A CN 2013102574877A CN 201310257487 A CN201310257487 A CN 201310257487A CN 103384281 A CN103384281 A CN 103384281A
- Authority
- CN
- China
- Prior art keywords
- dialing
- private
- ezvpn
- address
- firewall box
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The invention discloses a method for preventing EZVPN dialing failure. The method is characterized by comprising the following steps that S1. a PC sends an EZVPN dialing request to firewall equipment; S2. the firewall equipment receives the dialing request, private IP addresses are distributed, if negotiation key encryption is successful, the procedure is ended, otherwise, the firewall equipment records the failure event to a dialing recording table, the failure event comprises the private IP addresses; S3. the PC sends an EZVPN dialing operation request to the firewall equipment again, the firewall equipment checks the dialing recording table, if the dialing recording table has the dialing failure record of the PC, the private IP addresses are distributed to the PC again, and otherwise, an unused private IP address is selected for the PC from the private IP addresses. According to the method, the firewall equipment is used for recording the private IP addresses in the EZVPN dialing failure request, when the PC uses EZVPN dialing again, the firewall equipment checks the recording table, the same private IP addresses are distributed for the PC, and accordingly EZVPN dialing failure is effectively avoided.
Description
Technical field
The present invention relates to network communications technology field, particularly a kind of failed method of EZVPN dialing that prevents.
Background technology
when using EZVPN software to carry out dial-up operation to firewall box under windows operating system, if dial-up success, firewall box distributes a private IP address and is configured on this PC, if dial unsuccessfully, and consult unsuccessfully after address assignment in the EZVPN negotiations process, the private IP address that this moment, fire compartment wall was distributed to PC so has been configured on this PC, this moment is due to the IKE connection failure of setting up, so fire compartment wall can't send the message of this private IP address of deletion to PC, will form an ossified IP address this moment on PC, the existence of this IP address will have influence on dialing for the second time, because not success of dialing for the first time, when the user continues to dial firewall box for this reason PC distribute a new private IP address, PC can point out and load this new private IP address failure this moment.
The way that prior art addresses the above problem is to restart PC, and the private IP address into the PC configuration was lost efficacy.But this way can make troubles to the user undoubtedly, reduces user's experience sense.
Summary of the invention
The technical problem that (one) will solve
The present invention will solve is that PC uses EZVPN to dial for the first time after failure, forms ossified IP in PC, and firewall box can't be again be the problem of the new IP address of PC distribution under the condition of not restarting PC.
(2) technical scheme
For solving the problems of the technologies described above, the invention provides a kind of failed method of the EZVPN of preventing dialing, it is characterized in that,
Comprise the following steps:
S1:PC sends EZVPN dialing request to firewall box;
S2: described firewall box receives described dialing request, and distributes private IP address, if consult to encrypt secret key success, process ends, otherwise firewall box records this turkey to the dialing record table, and described turkey comprises described private IP address;
S3:PC sends the request of EZVPN dial-up operation to described firewall box again, described firewall box is checked described dialing record table, if record the dialing failure record of described PC in described dialing record table, described private IP address is distributed to described PC again, otherwise, choose an original private IP address for described PC from the private IP address pond.
The dialing failure record holding time in described dialing record table is half an hour.
Comprising also in described step S2 that described firewall box is labeled as the private IP address in the dialing record table uses.
(3) beneficial effect
The present invention utilizes firewall box to record private IP address in EZVPN dialing failure request, when PC reuses the EZVPN dialing, firewall box is searched this record sheet, for PC distributes identical private IP address, therefore prevented that effectively EZVPN from dialling unsuccessfully, strengthen Systems balanth, improved user's experience impression.
Embodiment
The below is described in further detail the specific embodiment of the present invention.Following examples are used for explanation the present invention, but are not used for limiting the scope of the invention.
The method of present embodiment comprises the following steps:
S1:PC sends the request of EZVPN dial-up operation to firewall box;
S2: firewall box receives the dialing request, and distributes private IP address to this PC, if consult to encrypt secret key success, and process ends, otherwise, to consult flow process and stop, firewall box records this turkey, and described unsuccessfully record comprises described private IP address;
S3:PC sends the request of EZVPN dial-up operation to firewall box again, firewall box is checked EZVPN dialing record table, if the dialing record of this PC is arranged in record sheet, the private IP address of record is distributed to this PC again, otherwise, choose an original private IP address for this PC from the private IP address pond.
Further, in EZVPN dialing record table, each holding time of recording of dialling unsuccessfully is half an hour.
Further, also comprise in step S2, firewall box is labeled as the private IP address that records in EZVPN dialing record table and uses.
The present invention adopts firewall box to record private IP address in EZVPN dialing failure request, after if PC uses EZVPN to dial unsuccessfully for the first time, when again initiating the dialing request to firewall box, firewall box is searched EZVPN dialing record table, if this PC dialled unsuccessfully, is distributed to the private IP address of this PC the last time and again distributes to this PC, because PC was configured private ip, when again configuring identical private ip, PC can think repeated load, can not point out mistake.If this PC was distributing a private ip, then configure a different private ip, PC can think configuration error.If there is no the failed record of this PC dialing, select a new private IP address and distribute to this PC.Thereby prevented that PC from using EZVPN to dial unsuccessfully, strengthened Systems balanth, improved user's experience sense.
Above execution mode only is used for explanation the present invention; and be not limitation of the present invention; the those of ordinary skill in relevant technologies field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.
Claims (3)
1. one kind prevents the failed method of EZVPN dialing, it is characterized in that,
Comprise the following steps:
S1:PC sends EZVPN dialing request to firewall box;
S2: described firewall box receives described dialing request, and distributes private IP address, if consult to encrypt secret key success, process ends, otherwise firewall box records this turkey to the dialing record table, and described turkey comprises described private IP address;
S3:PC sends the request of EZVPN dial-up operation to described firewall box again, described firewall box is checked described dialing record table, if record the dialing failure record of described PC in described dialing record table, described private IP address is distributed to described PC again, otherwise, choose an original private IP address for described PC from the private IP address pond.
2. prevent as claimed in claim 1 the failed method of EZVPN dialing, it is characterized in that, the dialing failure record holding time in described dialing record table is half an hour.
3. prevent as claimed in claim 1 the method that EZVPN dialing is failed, it is characterized in that, comprise also in described step S2 that described firewall box is labeled as the private IP address in the dialing record table to use.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310257487.7A CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310257487.7A CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103384281A true CN103384281A (en) | 2013-11-06 |
CN103384281B CN103384281B (en) | 2016-08-24 |
Family
ID=49491972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310257487.7A Active CN103384281B (en) | 2013-06-26 | 2013-06-26 | A kind of method preventing EZVPN dialing failed |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103384281B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016045394A1 (en) * | 2014-09-23 | 2016-03-31 | 中兴通讯股份有限公司 | Internal address allocation method, apparatus, server, and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1291557C (en) * | 2002-03-25 | 2006-12-20 | 精工电子有限公司 | Communication device, communication system and programme |
US20070002769A1 (en) * | 2005-07-01 | 2007-01-04 | Eldad Matityahu | Active packet content analyzer for communications network |
US7987506B1 (en) * | 2006-11-03 | 2011-07-26 | Cisco Technology, Inc. | Methods and systems for dynamically updating a routing table in a virtual private network |
CN102611700A (en) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | Method for realizing VPN (Virtual Private Network) access under transparent mode |
-
2013
- 2013-06-26 CN CN201310257487.7A patent/CN103384281B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1291557C (en) * | 2002-03-25 | 2006-12-20 | 精工电子有限公司 | Communication device, communication system and programme |
US20070002769A1 (en) * | 2005-07-01 | 2007-01-04 | Eldad Matityahu | Active packet content analyzer for communications network |
US7987506B1 (en) * | 2006-11-03 | 2011-07-26 | Cisco Technology, Inc. | Methods and systems for dynamically updating a routing table in a virtual private network |
CN102611700A (en) * | 2012-02-24 | 2012-07-25 | 汉柏科技有限公司 | Method for realizing VPN (Virtual Private Network) access under transparent mode |
Non-Patent Citations (1)
Title |
---|
尹淑玲 等: "《Easy VPN技术及其应用》", 《信息安全与技术》, no. 2, 28 February 2013 (2013-02-28), pages 65 - 66 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016045394A1 (en) * | 2014-09-23 | 2016-03-31 | 中兴通讯股份有限公司 | Internal address allocation method, apparatus, server, and system |
CN105516374A (en) * | 2014-09-23 | 2016-04-20 | 中兴通讯股份有限公司 | Home address distribution method and apparatus, server and system |
Also Published As
Publication number | Publication date |
---|---|
CN103384281B (en) | 2016-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102316101B (en) | Safe access method based on dynamic host configuration protocol (DHCP) SNOOPING | |
CN101179583B (en) | Method and equipment preventing user counterfeit internet | |
CN102025798B (en) | Address allocation processing method, device and system | |
EP2658207B1 (en) | Authorization method and terminal device | |
CN103595530A (en) | Software secret key updating method and device | |
CN104378456A (en) | Allocation optimization method for IP addresses in local area network | |
CN105007164B (en) | Centralized safety control method and device | |
CN105530266A (en) | Exequatur management method, device and system | |
CN103534994A (en) | Method, device and system for realizing communication after virtual machine migration | |
CN104753953A (en) | Access control system | |
WO2015176465A1 (en) | Account management method and apparatus | |
CN105471901A (en) | Industrial information security authentication system | |
CN102263826A (en) | Method and device for establishing connection with transport layer | |
CN111654372A (en) | Key management method and related device | |
CN114124584A (en) | Method, device and system for remotely accessing office network, network access equipment and medium | |
CN103780389A (en) | Port based authentication method and network device | |
CN102546429A (en) | Method and system for authenticating intra-site automatic tunnel addressing protocol (ISATAP) tunnels based on dynamic host configuration protocol (DHCP) monitoring | |
WO2017000625A1 (en) | Dynamic host configuration protocol (dhcp) server management method and apparatus | |
WO2020176021A1 (en) | Automatic distribution of dynamic host configuration protocol (dhcp) keys via link layer discovery protocol (lldp) | |
CN107342972B (en) | Method and device for realizing remote access | |
CN103384281A (en) | Method for preventing EZVPN dialing failure | |
CN115766170B (en) | Trusted SDP network control method and device, storage medium and electronic device | |
WO2015067055A1 (en) | Service emergency method, device and system for network television terminal | |
CN106899545A (en) | A kind of system and method for terminal security communication | |
CN103441876B (en) | A kind of based on DHCP protocol and the network device management method of snmp protocol and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right |
Effective date of registration: 20180528 Granted publication date: 20160824 |
|
PP01 | Preservation of patent right |