Movatterモバイル変換


[0]ホーム

URL:


CN120110875A - A method and system for monitoring static routing changes based on BFD Trap event triggering - Google Patents

A method and system for monitoring static routing changes based on BFD Trap event triggering
Download PDF

Info

Publication number
CN120110875A
CN120110875ACN202510269024.5ACN202510269024ACN120110875ACN 120110875 ACN120110875 ACN 120110875ACN 202510269024 ACN202510269024 ACN 202510269024ACN 120110875 ACN120110875 ACN 120110875A
Authority
CN
China
Prior art keywords
bfd
static route
trap event
snmp
trap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510269024.5A
Other languages
Chinese (zh)
Inventor
苟建国
雷思磊
董昌智
陈文周
吕久明
刘志伟
李琳琳
邱燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unit 63626 Of Pla
Original Assignee
Unit 63626 Of Pla
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unit 63626 Of PlafiledCriticalUnit 63626 Of Pla
Priority to CN202510269024.5ApriorityCriticalpatent/CN120110875A/en
Publication of CN120110875ApublicationCriticalpatent/CN120110875A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The application discloses a method and a system for monitoring static route change based on BFD Trap event triggering, wherein the method comprises the steps of establishing SNMP connection between a server side and a switch configured with BFD, binding the BFD with the static route, monitoring BFD Trap event from the switch, checking BFD state and checking change information of the static route bound with the BFD when the BFD Trap event is monitored, and pushing the change information of the BFD state and the static route to a client side for display. By utilizing the scheme of the application, the problems that the switch is frequently inquired, and the BFD state change and the binding static route change cannot be timely found can be avoided. Meanwhile, the change information of the BFD state and the static route is pushed to the client for display, so that the situation that a user frequently refreshes a webpage to request a related network state is avoided, the BFD state change and the static route binding change situation can be presented in an intuitive and concise mode, and network management staff can conveniently master the network state change situation in time.

Description

Method and system for triggering and monitoring static route change based on BFD Trap event
Technical Field
The present application relates generally to the field of network management technology. More particularly, the present application relates to a method and system for monitoring static route changes based on BFDTrap event triggers.
Background
In network design, in order to improve reliability and availability of a network, a plurality of links are generally arranged to ensure that when a certain link fails, data traffic can be quickly switched to a standby path, so as to ensure continuity of service. However, in practical applications, static routing cannot automatically sense changes in link state due to its lack of dynamic monitoring mechanisms. When the primary link fails, the static route cannot be found and adjusted accordingly in time, which can cause interruption of network communication until an administrator manually intervenes to fix the problem.
To address the above problems, the prior art introduces a bidirectional forwarding detection (BidirectionalForwardingDetection, BFD) protocol that provides a generic, standardized and medium and protocol independent fast failure detection mechanism. BFD can be used in combination with static routing to quickly notify upper applications when a link fails, triggering fast failover, thereby reducing service interruption time and improving overall network stability
Although static routing in combination with BFD significantly improves the reliability and response speed of the network, it remains a challenge for network administrators to intuitively, accurately, and timely monitor network state changes. Traditional monitoring methods require an administrator to log on to each switch or router to see the state of BFD, which is inefficient and difficult to implement for efficient management of large-scale networks. Furthermore, as the size and complexity of networks increases, it becomes increasingly impractical to manually check the BFD status of each device.
In view of this, it is desirable to provide a static route change scheme based on BFDTrap event triggering to trigger the operation of querying BFD state information and binding static route change information based on BFD Trap event, so as to avoid the problems of frequently querying the switch, and being unable to discover BFD state change and binding static route change in time.
Disclosure of Invention
To address at least one or more of the technical problems mentioned above, the present application proposes, in various aspects, monitoring static route changes based on BFD Trap event triggers.
In a first aspect, the application provides a method for monitoring static route change based on BFD Trap event triggering, which comprises the steps of establishing SNMP connection between a server side and a switch configured with BFD, wherein BFD is bound with the static route, monitoring BFD Trap event from the switch, checking BFD state and checking change information of the static route bound with BFD when the BFD Trap event is monitored, and pushing the BFD state and the change information of the static route to a client side for display.
In some embodiments, in listening for BFD Trap events from the switch, the steps of configuring an SNMP listening service to listen for SNMP Trap events, parsing SNMPTrap the OID identifier in the event, and acquiring the BFD Trap event based on SNMPTrap the OID identifier in the event are performed.
In some embodiments, in configuring an SNMP listening service to listen for SNMP Trap events, the steps of creating a transport map instance at a server side and binding an IP address of the server with a designated port, initializing the SNMP instance and associating it with the transport map instance, starting the transport map to listen for the designated port to receive SNMP data packets, creating CommandResponder an interface and registering it with the SNMP instance, decoding the received SNMP data packets as SNMPTrap events by the transport map and sending to the registered CommandResponder interface by a message distributor.
In some embodiments, the designated port is set according to a type of transport map instance.
In some embodiments, when the transport map instance is a UDP-based transport map instance, the designated port is a UDP 162 port.
In some embodiments, in resolving the OID identifier in the SNMP Trap event, the OID identifier in the SNMPTrap event is resolved through the CommandResponder interface.
In some embodiments, in acquiring a BFD Trap event based on an OID identifier in an SNMP Trap event, the SNMPTrap event is considered as a BFD Trap event when the OID identifier in the SNMP Trap event matches an OID identifier associated with a BFD state change.
In some embodiments, before the change information of the BFD state and the static route is pushed to the client for visual presentation, the client establishes a WebSocket connection with the server through handshake.
In some embodiments, in the process of pushing the change information of the BFD state and the static route to the client for visual presentation, the server pushes the change information of the BFD state and the static route to a webpage of the client, and the webpage of the client renders the change information of the BFD state and the static route and displays the rendered information through the client.
In a second aspect, the application provides a system for monitoring static route change based on BFD Trap event triggering, which monitors static route change by adopting the method for monitoring static route change based on BFD Trap event triggering according to any embodiment of the first aspect, wherein the system comprises a server side, a switch configured with BFD and a client side, SNMP connection is established between the server side and the switch configured with BFD, the client side establishes connection with the server side, wherein BFD is bound with the static route, the server side monitors BFD Trap event from the switch, checks BFD state when the BFD Trap event is monitored, checks change information of the static route bound with BFD, and pushes the BFD state and the change information of the static route to the client side for display.
By monitoring the static route change scheme based on BFD Trap event triggering provided by the embodiment of the application, the BFD Trap event triggers the operation of inquiring the BFD state information and the static route change information bound by the BFD Trap event by monitoring the BFD Trap event from the switch, so that the problems that the switch is frequently inquired, the BFD state change and the static route change bound cannot be found in time can be avoided. Meanwhile, the change information of the BFD state and the static route is pushed to the client for display, so that the situation that a user frequently refreshes a webpage to request a related network state is avoided, the BFD state change and the static route binding change situation can be presented in an intuitive and concise mode, and network management staff can conveniently master the network state change situation in time.
Drawings
The above, as well as additional purposes, features, and advantages of exemplary embodiments of the present application will become readily apparent from the following detailed description when read in conjunction with the accompanying drawings. In the drawings, embodiments of the application are illustrated by way of example and not by way of limitation, and like reference numerals refer to similar or corresponding parts and in which:
FIG. 1 illustrates an exemplary flow chart of a method of monitoring static route changes based on BFD Trap event triggering in accordance with an embodiment of the present application;
FIG. 2 illustrates an exemplary flow chart of listening for BFD Trap events from a switch in accordance with an embodiment of the present application;
FIG. 3 illustrates an exemplary flow chart for configuring an SNMP listening service to listen for SNMP Trap events in accordance with an embodiment of the present application;
Fig. 4 shows an exemplary block diagram of a system for monitoring static route changes based on BFD Trap event triggers in accordance with an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and in the claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification and claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the term "and/or" as used in the present specification and claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Specific embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 illustrates an exemplary flow chart of a BFD Trap event trigger based system 100 for monitoring static route changes in accordance with an embodiment of the present application.
As shown in fig. 1, in step S110, an SNMP connection between a server side and a switch configured with BFD is established, where the BFD is bound to a static route.
Specifically, bidirectional forwarding detection (Bidirectional Forwarding Detection, BFD) is a network detection mechanism that is used to quickly detect, monitor, and control the forwarding connectivity status of links or IP routes in a network. BFD establishes a session on two network devices to detect a bidirectional forwarding path between the network devices to serve an upper layer application. And after the session is established, the BFD message is periodically and rapidly sent, if the BFD message is not received in the detection time, the bidirectional forwarding path is considered to be failed, and the served upper layer application is notified to carry out corresponding processing. By configuring BFD on the switch, connectivity of a line interconnected with the switch can be monitored, so that network fault detection speed can be increased, and the network fault detection device can be closely cooperated with other network components to jointly ensure quality and reliability of network service.
In the embodiment of the present application, various prior art techniques may be used in the process of establishing the SNMP connection between the server side and the switch configured with BFD, and the present application is not limited herein. For example, a community word of SNMP, SNMPv2c, and a mix library are first configured on the switch, and then SNMP connections of servers to the switch are established using an org.snmp4j.
In the prior art, in order to improve reliability, links are often arranged in a network in a redundant manner, a plurality of static routes are configured at a routing layer, and each static route is given different priority. When the high priority link is broken, the route is switched to the low priority route, so that the network quickly resumes connectivity. However, in the actual use process, because the static route cannot sense the interruption of the link, in the case of the interruption of the link, the static route is not switched according to the configured priority. Therefore, a BFD session needs to be configured to detect connectivity of the link, so as to implement BFD and static route binding.
After step S110 is performed, in step S120, the BFD Trap event from the switch is monitored.
In an embodiment of the present application, a specific process of listening for BFD Trap events from the foregoing switch may refer to fig. 2.
Figure 2 illustrates an exemplary flow chart of listening for BFD Trap events from a switch in accordance with an embodiment of the present application.
As shown in fig. 2, in step S210, an SNMP listening service is configured to listen for SNMP Trap events. In step S220, the OID identifier in the SNMP Trap event is parsed. In step S230, a BFD Trap event is acquired based on the OID identifier in the SNMPTrap event.
In an embodiment of the present application, a specific process of configuring an SNMP listening service to listen for SNMP Trap events may refer to fig. 3.
Fig. 3 shows an exemplary flow chart for configuring an SNMP snoop service to snoop SNMP Trap events in accordance with an embodiment of the present application.
As shown in fig. 3, in step S310, a transmission map instance is created at the server side, and the IP address of the server and the designated port are bound. In step S320, an SNMP instance is initialized and associated with the transport map instance. In step S330, the transmission map is started to listen to the designated port to receive SNMP packets. In step S340, a CommandResponder interface is created and registered with the SNMP instance. In step S350, the transmission map decodes the received SNMP packet into an SNMP Trap event and sends it to the registered CommandResponder interface through the message dispatcher.
In the embodiment of the present application, the aforementioned designated port is set according to the type of the transmission map instance. When the transmission mapping instance is a UDP-based transmission mapping instance, the aforementioned designated port is a UDP 162 port, and the UDP 162 port is a standard port number of SNMPTrap messages, which can be used to receive notification or warning information from the switch. Where the transmission map instance is of another type, the designated port may be another port, which is not limited herein.
In the embodiment of the application, the same SNMP version as the SNMP version of the switch is selected when the SNMP instance is initialized, so that the compatibility with the SNMP version of the switch is ensured.
In an embodiment of the present application, SNMP instances support GET, SET, GETNEXT, GETBULK, etc., multiple operation types, allowing administrators to query device status, modify configuration parameters, and obtain batch data.
In the embodiment of the application, by initializing the SNMP instance and associating the SNMP instance with the transmission mapping instance, a communication bridge between the server side and the switch can be established, so that the server side can send a request to the switch through the SNMP protocol and receive a response and/or Trap message from the switch.
In SNMP, the CommandResponder interface is a critical component for handling received requests, reports and notification PDUs (protocol data units). The CommandResponder interface processes the incoming PDU using the processPdu method and marks the event as processed. Wherein the incoming PDUs include Trap-like PDUs, i.e., commandResponder interface can handle SNMPTrap events.
In an embodiment of the present application, by creating CommandResponder interfaces and registering them with SNMP instances, the server side can listen to and process Trap messages from the switch. Whenever a new Trap message arrives, the processPdu method is called, allowing the developer to write logic to process the messages.
In the embodiment of the application, in the process of analyzing the OID identifier in the SNMP Trap event, the OID identifier in the SNMPTrap event is analyzed through a CommandResponder interface.
In the embodiment of the application, in the process of acquiring the BFD Trap event based on the OID identifier in the SNMP Trap event, the SNMPTrap event is taken as the BFD Trap event when the OID identifier in the SNMP Trap event is matched with the OID identifier related to the BFD state change.
In some embodiments of the present application, in matching the OID identifier in the SNMP Trap event with the OID identifier associated with the BFD state change, a wild card matching method may be used to match the OID identifier in the SNMPTrap event with the OID identifier associated with the BFD state change. In other embodiments of the present application, in the process of matching the OID identifier in the SNMP Trap event with the OID identifier related to the BFD state change, other methods than the wild card matching method may be used to match the OID identifier in the SNMP Trap event with the OID identifier related to the BFD state change.
In the embodiment of the application, when the OID identifier in the SNMP Trap event is matched with the OID identifier corresponding to the BFD session Down event or the OID identifier corresponding to the BFD session Up event, the SNMP Trap event is used as the BFD Trap event. Specifically, the OID identifier corresponding to the BFD session Down event is 1.3..3.1, the OID identifier corresponding to the BFD session Up event is 1.3..3.2, and when the OID identifier in the SNMP Trap event matches 1.3..3.1 or 1.3..3.2, the above SNMPTrap event is regarded as the BFD Trap event.
By matching the OID identifier in SNMPTrap events with the OID identifier associated with the BFD state change, the Trap events can be accurately classified, ensuring that only those traps that truly represent BFD state changes will be processed as BFD Trap events.
After step S120 is performed, in step S130, upon monitoring the BFD Trap event, the BFD state is checked, and change information of the static route bound to BFD is checked.
Specifically, only when the BFD session state of the link in the network is UP, the static route bound with BFD is effective, otherwise, the static route is invalid. In order to timely detect the change condition of the static route, the change condition of the static route table needs to be checked immediately when the BFD state changes. Therefore, after monitoring BFD Trap events, the bound static route information is checked while checking the BFD state, and then the acquired information is returned to the user so as to timely grasp the change condition of the network state.
After step S130 is performed, in step S140, the change information of the BFD state and the static route is pushed to the client for display.
In the embodiment of the application, before the change information of the BFD state and the static route is pushed to the client for display, the client establishes WebSocket connection with the server through handshake.
Specifically, in the process that the client establishes a WebSocket connection with the server through handshake, the client first needs to send an HTTP/1.1GET request to the server, which is called handshake request. Some specific header fields are included in the request to indicate that the client wishes to upgrade to the WebSocket protocol. After the server receives the handshake request, it checks whether the request meets the requirements of WebSocket protocol, and decides whether to accept the connection request. If the server agrees to establish a WebSocket connection, it will return an HTTP response with a state code of 101 (SWITCHING PROTOCOLS), meaning that the server has understood the client's request and agreed to complete it using a different protocol. After receiving the handshake response of the server, the client verifies the corresponding field in the handshake response. The client calculates its expected value according to the same algorithm and compares it with the same field received from the server as the corresponding field. If the two are equal, the handshake is considered successful, the WebSocket protocol can be used for communication continuously, and if the two are equal, the handshake fails, and the connection is closed.
In the embodiment of the application, in the process of pushing the change information of the BFD state and the static route to the client for visual presentation, firstly, the server pushes the change information of the BFD state and the static route to the webpage of the client. And then, the client webpage renders the change information of the BFD state and the static route, and displays the rendered information through the client.
In some embodiments of the application, the client web page employs a web page. In other embodiments of the present application, the client web page may also employ other web pages other than web pages, and the present application is not limited in this regard.
In some embodiments of the present application, in the process of rendering the change information of the BFD state and the static route by the client webpage, the BFD-UI component library may be used to render the change information of the BFD state and the static route. When the BFD state changes (e.g., from Up to Down), the corresponding UI update logic should be triggered to reflect the latest BFD state. For the change of the static route, the latest route configuration information can be displayed at the client according to the change condition of the routing table. In other embodiments of the present application, in the process of rendering the change information of the BFD state and the static route by the client web page, other component libraries outside the BFD-UI component library may be used to render the change information of the BFD state and the static route.
By comprehensively monitoring the static route change scheme based on BFD Trap event triggering provided by the embodiment of the application, the BFD Trap event triggers the operation of inquiring the BFD state information and the static route change information bound by the BFD Trap event by monitoring the BFD Trap event from the switch, so that the problems that the switch is frequently inquired, and the BFD state change and the static route change bound cannot be found in time can be avoided. Meanwhile, the change information of the BFD state and the static route is pushed to the client for display, so that the situation that a user frequently refreshes a webpage to request a related network state is avoided, the BFD state change and the static route binding change situation can be presented in an intuitive and concise mode, and network management staff can conveniently master the network state change situation in time.
The embodiment of the application also provides a system for monitoring the static route change based on BFD Trap event trigger, which can adopt the method 100 for monitoring the static route change based on BFD Trap event trigger to monitor the static route change based on BFD Trap event trigger, and can also adopt other systems for monitoring the static route change based on BFD Trap event trigger to monitor the static route change based on BFD Trap event trigger.
Fig. 4 is an exemplary block diagram of a system for monitoring static route changes based on BFD Trap event triggers in accordance with an embodiment of the present application.
As shown in fig. 4, the system 400 includes a server side 410, a BFD-configured switch 420, and a client side 430.
Specifically, an SNMP connection is established between the server side 410 and the BFD-configured switch 420, and the client side 430 is bound to the server side 410, wherein the BFD is static route. More specifically, the client 430 connects with the server 410 through WebSocket.
Specifically, the server 410 listens for a BFD Trap event from the switch 420 configured with BFD, and when the BFD Trap event is heard, checks the BFD state, and checks the change information of the static route bound to BFD, and pushes the BFD state and the change information of the static route to the client 430 for display.
When the system 400 performs the BFD Trap event-based monitoring of the static route change by using the BFD Trap event-based monitoring system 100, the server 410 performs the steps S110-S140. For specific implementation, reference is made to the foregoing, and details are not repeated here.
While various embodiments of the present application have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous modifications, changes, and substitutions will occur to those skilled in the art without departing from the spirit and scope of the application. It should be understood that various alternatives to the embodiments of the application described herein may be employed in practicing the application. The appended claims are intended to define the scope of the application and are therefore to cover all equivalents or alternatives falling within the scope of these claims.

Claims (10)

Translated fromChinese
1.一种基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,包括:1. A method for monitoring static route changes based on BFD Trap event triggering, comprising:建立服务器端与配置了BFD的交换机之间的SNMP连接,其中,所述BFD与静态路由绑定;Establishing an SNMP connection between the server and a switch configured with BFD, wherein the BFD is bound to a static route;监听来自所述交换机的BFD Trap事件;Monitor BFD Trap events from the switch;在监听到BFD Trap事件时,检查BFD状态,并查看与BFD绑定的静态路由的变化信息;When a BFD Trap event is detected, check the BFD status and the change information of the static routes bound to BFD.将所述BFD状态和静态路由的变化信息推送到客户端进行显示。The BFD status and static route change information are pushed to the client for display.2.根据权利要求1所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在监听来自所述交换机的BFD Trap事件的过程中,执行以下步骤:2. The method for monitoring static route changes based on BFD Trap event triggering according to claim 1, characterized in that, in the process of monitoring the BFD Trap event from the switch, the following steps are performed:配置SNMP监听服务以监听SNMPTrap事件;Configure the SNMP monitoring service to monitor SNMPTrap events;解析SNMPTrap事件中的OID标识符;Parse the OID identifier in the SNMPTrap event;基于SNMPTrap事件中的OID标识符获取BFD Trap事件。Get BFD Trap events based on the OID identifier in the SNMP Trap event.3.根据权利要求2所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在配置SNMP监听服务以监听SNMP Trap事件的过程中,执行以下步骤:3. The method for monitoring static route changes based on BFD Trap event triggering according to claim 2 is characterized in that, in the process of configuring the SNMP monitoring service to monitor the SNMP Trap event, the following steps are performed:在服务器端创建传输映射实例,并绑定服务器的IP地址和指定端口;Create a transport mapping instance on the server side and bind the server's IP address and specified port;初始化SNMP实例,并将其与传输映射实例进行关联;Initialize the SNMP instance and associate it with the transport mapping instance;启动传输映射以监听指定端口来接收SNMP数据包;Start the transport mapping to listen on the specified port to receive SNMP packets;创建CommandResponder接口,并将其注册到SNMP实例;Create a CommandResponder interface and register it with the SNMP instance;传输映射将接收到的SNMP数据包解码为SNMPTrap事件,并通过消息分发器发送给已注册的CommandResponder接口。The transport mapping decodes the received SNMP packets into SNMPTrap events and sends them to the registered CommandResponder interface through the message distributor.4.根据权利要求3所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,所述指定端口根据传输映射实例的类型设置。4. The method for monitoring static route changes based on BFD Trap event triggering according to claim 3 is characterized in that the designated port is set according to the type of transmission mapping instance.5.根据权利要求4所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在传输映射实例为基于UDP的传输映射实例时,所述指定端口为UDP 162端口。5. The method for monitoring static route changes based on BFD Trap event triggering according to claim 4 is characterized in that when the transmission mapping instance is a UDP-based transmission mapping instance, the designated port is UDP port 162.6.根据权利要求3所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在解析SNMP Trap事件中的OID标识符过程中,通过CommandResponder接口解析SNMPTrap事件中的OID标识符。6. The method for monitoring static route changes based on BFD Trap event triggering according to claim 3 is characterized in that, in the process of parsing the OID identifier in the SNMP Trap event, the OID identifier in the SNMP Trap event is parsed through the CommandResponder interface.7.根据权利要求2所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在基于SNMP Trap事件中的OID标识符获取BFD Trap事件的过程中,在SNMP Trap事件中的OID标识符和与BFD状态变化相关的OID标识符匹配时,将所述SNMP Trap事件作为BFDTrap事件。7. The method for monitoring static route changes based on BFD Trap event triggering according to claim 2 is characterized in that, in the process of obtaining BFD Trap events based on the OID identifier in the SNMP Trap event, when the OID identifier in the SNMP Trap event matches the OID identifier related to the BFD state change, the SNMP Trap event is used as the BFDTrap event.8.根据权利要求1所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在将所述BFD状态和静态路由的变化信息推送到客户端进行可视化呈现之前,客户端通过握手建立与服务器端的WebSocket连接。8. According to the method for monitoring static route changes based on BFD Trap event triggering according to claim 1, it is characterized in that before pushing the BFD status and static route change information to the client for visual presentation, the client establishes a WebSocket connection with the server through a handshake.9.根据权利要求8所述的基于BFD Trap事件触发监测静态路由变化的方法,其特征在于,在将所述BFD状态和静态路由的变化信息推送至客户端进行可视化呈现的过程中,执行以下步骤:9. The method for monitoring static route changes based on BFD Trap event triggering according to claim 8 is characterized in that, in the process of pushing the BFD status and static route change information to the client for visual presentation, the following steps are performed:服务器端将所述BFD状态和静态路由的变化信息推送至客户端网页;The server pushes the BFD status and static route change information to the client webpage;客户端网页对BFD状态和静态路由的变化信息进行渲染,并将渲染后的信息通过客户端进行显示。The client webpage renders the BFD status and static route change information, and displays the rendered information through the client.10.一种基于BFD Trap事件触发监测静态路由变化的系统,其特征在于,采用如权利要求1-9任一项所述的基于BFD Trap事件触发监测静态路由变化的方法监测静态路由变化,所述系统包括服务器端、配置了BFD的交换机和客户端;10. A system for monitoring static route changes based on BFD Trap event triggering, characterized in that the method for monitoring static route changes based on BFD Trap event triggering as described in any one of claims 1 to 9 is used to monitor static route changes, and the system includes a server, a switch configured with BFD, and a client;服务器端与配置了BFD的交换机之间建立SNMP连接,客户端与服务器端建立连接,其中,所述BFD与静态路由绑定;An SNMP connection is established between the server and the switch configured with BFD, and a connection is established between the client and the server, wherein the BFD is bound to a static route;服务器端监听来自所述交换机的BFD Trap事件,在监听到BFD Trap事件时,检查BFD状态,并查看与BFD绑定的静态路由的变化信息,以及将所述BFD状态和静态路由的变化信息推送到所述客户端进行显示。The server monitors the BFD Trap event from the switch, and when the BFD Trap event is monitored, checks the BFD state, checks the change information of the static route bound to the BFD, and pushes the BFD state and the change information of the static route to the client for display.
CN202510269024.5A2025-03-072025-03-07 A method and system for monitoring static routing changes based on BFD Trap event triggeringPendingCN120110875A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510269024.5ACN120110875A (en)2025-03-072025-03-07 A method and system for monitoring static routing changes based on BFD Trap event triggering

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510269024.5ACN120110875A (en)2025-03-072025-03-07 A method and system for monitoring static routing changes based on BFD Trap event triggering

Publications (1)

Publication NumberPublication Date
CN120110875Atrue CN120110875A (en)2025-06-06

Family

ID=95883641

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510269024.5APendingCN120110875A (en)2025-03-072025-03-07 A method and system for monitoring static routing changes based on BFD Trap event triggering

Country Status (1)

CountryLink
CN (1)CN120110875A (en)

Similar Documents

PublicationPublication DateTitle
CN108965123B (en) A link switching method and network communication system
CN105024855B (en)Distributed type assemblies manage system and method
CN109344014B (en)Main/standby switching method and device and communication equipment
US7995483B1 (en)Simultaneously testing connectivity to multiple remote maintenance endpoints of the same maintenance association
EP1955506B1 (en)Methods, systems, and computer program products for session initiation protocol (sip) fast switchover
TWI740210B (en)Method for terminal device management and server
WO2008148334A1 (en)Method, system and apparatus thereof for detecting abnormal receipt of message
US11115266B2 (en)Priority based selection of time services
WO2015143810A1 (en)Node fault detection method and apparatus
CN112291116A (en)Link fault detection method and device and network equipment
JP2012054622A (en)Network system, management server and oam test management method
US10805195B2 (en)Network operational flaw detection using metrics
WO2024087692A1 (en)Device management method, and devices, system and storage medium
CN114553867A (en)Cloud-native cross-cloud network monitoring method and device and storage medium
JP5018969B2 (en) COMMUNICATION CONTROL PROGRAM, COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL SYSTEM, AND COMMUNICATION CONTROL METHOD
US20040028048A1 (en)Host management method and packet transmission method in network switch
US9100302B2 (en)Methods and systems for monitoring multicast availability
CN105281929A (en)Service network port state detection and fault tolerance device and method thereof
CN120110875A (en) A method and system for monitoring static routing changes based on BFD Trap event triggering
CN116366490A (en)Backbone network link state monitoring method and system
CN106708881A (en)Interaction method and device based on network file system
CN103595629A (en)Rapid gateway switching method and device for hosts in IRDP (ICMP Router Discovery Protocol) network
CiscoSystem Error Messages
CiscoSystem Error Messages
CiscoSystem Error Messages

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp