-
公开(公告)号:US20200082086A1
公开(公告)日:2020-03-12
申请号:US15883038
申请日:2018-01-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Yashavantha NAGARAJU , Nitin Singla , Norbert H. Vicente , Praveen Ramesh Ganjam
Abstract: A software image download security method may include storing an authentic cryptographic hash for an authentic software image at an authentication server, receiving, at the authentication server from a client network device, a candidate cryptographic hash for a candidate software image for which a download request has been received by the client network device, comparing, at the authentication server, the candidate cryptographic hash to the authentic cryptographic hash, and transmitting a result of the comparing to the client network device, wherein the client network device is to not download the candidate software image in response to the candidate cryptographic hash not matching the authentic cryptographic hash.
-
公开(公告)号:US20190068738A1
公开(公告)日:2019-02-28
申请号:US16113473
申请日:2018-08-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Praveen Ramesh Ganjam , Yashavantha Nagaraju , Vinod Muraleedharan
Abstract: On one example in accordance with the present disclosure, a system may include a processor and a memory storing end of life information. The end of life information may indicate a date when the network device will no longer be supported. The memory may comprise instructions executable by the processor to determine, based on the end of life information, that an end of life threshold has been reached and to generate a notification that the end of life threshold has been reached, wherein the notification includes the date when the network device will no longer be supported. The memory may also comprise instructions executable by the processor to broadcast the notification on a network accessible by the network device.
-
公开(公告)号:US20190394143A1
公开(公告)日:2019-12-26
申请号:US16013570
申请日:2018-06-20
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Sunitha Ayyappan , Praveen Ramesh Ganjam , Yashavantha Nagaraju
IPC: H04L12/947 , H04L12/46 , H04L12/26 , H04L12/24
Abstract: In some examples, a system determines whether data of a device that communicates with a switch is to be subjected to further inspection based on a data pattern derived based on the data. In response to determining that the data of the device is not to be subjected to the further inspection, the system causes forwarding, based on forwarding information accessible by the switch, of the data along a path to a recipient. In response to determining that the data of the device is to be subjected to the further inspection, the system causes forwarding of the data by the switch to a controller that applies the further inspection.
-
4.
公开(公告)号:US11277407B2
公开(公告)日:2022-03-15
申请号:US16112669
申请日:2018-08-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Yashavantha Nagaraju , Nitin Singla , Praveen Ramesh Ganjam , Kunal Deshpande
IPC: H04L29/06 , H04L29/08 , H04W4/70 , H04L29/12 , H04L67/12 , H04L69/28 , H04L101/622 , H04L61/103
Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.
-
5.
公开(公告)号:US20190089704A1
公开(公告)日:2019-03-21
申请号:US16112669
申请日:2018-08-25
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Yashavantha Nagaraju , Nitin Singla , Praveen Ramesh Ganjam , Kunal Deshpande
Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.
-
公开(公告)号:US10768992B2
公开(公告)日:2020-09-08
申请号:US15865972
申请日:2018-01-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Dhanesh Kumar Shanmuga Sundaram , Supreeth Sathyanarayana , Praveen Ramesh Ganjam , Yashavantha Nagaraju
Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.
-
公开(公告)号:US20190213047A1
公开(公告)日:2019-07-11
申请号:US15865972
申请日:2018-01-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Dhanesh Kumar Shanmuga Sundaram , Supreeth Sathyanarayana , Praveen Ramesh Ganjam , Yashavantha Nagaraju
Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.
-
-
-
-
-
-