Abstract:
Authenticating a networking appliance attempting to attach to a network includes receiving at least one value associated with an identity of the networking appliance; receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with the identity of the networking appliance; and generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer. The method also includes returning the appliance certificate to the networking appliance; receiving a request from the networking appliance to attach to the network; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.
Abstract:
Authenticating a networking appliance attempting to attach to a network includes receiving a request from the networking appliance to attach to the network, wherein the request comprises credential data associated with the networking appliance and a certificate authority (CA) certificate associated with the computer; receiving at least one value associated with an identity of the networking appliance; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.
Abstract:
Authenticating a networking appliance attempting to attach to a network includes receiving a request from the networking appliance to attach to the network, wherein the request comprises credential data associated with the networking appliance and a certificate authority (CA) certificate associated with the computer; receiving at least one value associated with an identity of the networking appliance; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.
Abstract:
Generating PKI credentials for authenticating a networking appliance attempting to attach to a network includes: receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with an identity of the networking appliance; generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer; and returning the appliance certificate to the networking appliance.
Abstract:
Authenticating a networking appliance attempting to attach to a network includes receiving at least one value associated with an identity of the networking appliance; receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with the identity of the networking appliance; and generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer. The method also includes returning the appliance certificate to the networking appliance; receiving a request from the networking appliance to attach to the network; and authenticating the identity of the networking appliance based on both a) the at least one value associated with the identity of the networking appliance; and b) the appliance certificate.
Abstract:
Methods, systems and computer readable media for zero touch attachment of devices, such as Internet of Things (IoT) devices, to an SPB network are described.
Abstract:
Methods, systems and computer readable media for zero touch attachment of devices, such as Internet of Things (IoT) devices, to an SPB network are described.
Abstract:
Generating PKI credentials for authenticating a networking appliance attempting to attach to a network includes: receiving a certificate signing request (CSR) from the networking appliance, wherein the CSR comprises credential data associated with an identity of the networking appliance; generating an appliance certificate based on the credential data and a certificate authority (CA) certificate associated with the computer; and returning the appliance certificate to the networking appliance.
Abstract:
A POE powered network adapter incorporating OVS and FA capabilities includes one or more Ethernet ports. The device derives power from an external source over one of the Ethernet ports and delivers power over at least one other Ethernet port or ports to attached devices. Further, the device does not use a fan for cooling and uses an Open Flow compliant software based Datapath implementation. The OF compliant software based Datapath implementation is OVS. The device could also run proprietary vendor software. The device implements the Fabric Attach/Auto Attach (FA/AA) client/proxy capabilities. Additionally, embodiments include secure boot technologies to ensure that the only operational images that can be loaded on these device(s) are the ones that are approved by the vendor of the equipment. Additionally, coupling of the device to a specified device is supported wherein communication between said device and any other device is rejected.