Group based multicast in networks
    111.
    发明授权

    公开(公告)号:US10069762B1

    公开(公告)日:2018-09-04

    申请号:US15446802

    申请日:2017-03-01

    Abstract: Group based multicasts may be provided. First, a request may be received. The request may comprise a receiver tag, a request source identifier, and a request multicast group identifier. Next, a source tag corresponding to the request source identifier may be obtained and then it may be determined that a group corresponding to the receiver tag is allowed to access content from a source corresponding to the obtained source tag. In response to determining that the group corresponding to the receiver tag is allowed to access content from the source corresponding to the obtained source tag, content may be received from the source at a multicast group corresponding to the request multicast group identifier. The content may then be forwarded to a receiver corresponding to the request.

    NETWORK AUTHORIZATION IN WEB-BASED OR SINGLE SIGN-ON AUTHENTICATION ENVIRONMENTS

    公开(公告)号:US20180176218A1

    公开(公告)日:2018-06-21

    申请号:US15384365

    申请日:2016-12-20

    Abstract: Systems and methods for network authorization are described herein. An example method can include receiving a user credential from a host device connected to a network, authenticating the user credential, and in response to authenticating the user credential, determining an authorization policy associated with the host device. The method can also include polling a network overlay control plane of the network to obtain a network location information associated with the host device, identifying at least one network device of the network using the network location information, and transmitting the authorization policy to the at least one network device.

    Path optimization in multi-node virtual switch with orphan ports
    115.
    发明授权
    Path optimization in multi-node virtual switch with orphan ports 有权
    具有孤立端口的多节点虚拟交换机中的路径优化

    公开(公告)号:US09219687B2

    公开(公告)日:2015-12-22

    申请号:US13839159

    申请日:2013-03-15

    CPC classification number: H04L47/12 H04L45/66 H04L49/70

    Abstract: Embodiments provide techniques for optimizing paths in a network environment with a virtual network device that includes a first physical network device and a second physical network device, connected using a virtual network device layer link. Embodiments receive a first data packet belonging to a first data flow, at the first physical network device, from the second physical network device, over the virtual network device layer link. An adjacent network device from which the second physical network device received the first data packet is determined. Embodiments also determine one or more links connecting the first physical network device and the adjacent network device. A network message is transmitted to the adjacent network device, where the adjacent network device is configured to transmit subsequent data packets from the first data flow to the virtual network device, using only the determined one or more links, responsive to receiving the network message.

    Abstract translation: 实施例提供了利用包括使用虚拟网络设备层链路连接的第一物理网络设备和第二物理网络设备的虚拟网络设备来优化网络环境中的路径的技术。 实施例通过虚拟网络设备层链路从第二物理网络设备接收属于第一物理网络设备的第一数据流的第一数据包。 确定第二物理网络设备从其接收到第一数据分组的相邻网络设备。 实施例还确定连接第一物理网络设备和相邻网络设备的一个或多个链路。 将网络消息发送到相邻网络设备,其中相邻网络设备被配置为仅响应于接收到该网络消息而使用所确定的一个或多个链路,将后续数据分组从第一数据流发送到虚拟网络设备。

    SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKS

    公开(公告)号:US20250039144A1

    公开(公告)日:2025-01-30

    申请号:US18919222

    申请日:2024-10-17

    Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.

    Service chaining in fabric networks
    118.
    发明授权

    公开(公告)号:US12170614B2

    公开(公告)日:2024-12-17

    申请号:US18545931

    申请日:2023-12-19

    Abstract: Techniques are described herein for service chaining in fabric networks such that hardware resources can be preserved without service nodes needing additional capabilities. The techniques may include storing a first configuration associated with a first VRF instance of a service forwarding node that is connected to a first service of a service chain sequence. The first configuration may indicate an identifier and a type associated with a second service of the service chain sequence where traffic is to be sent after the first service. Additionally, the techniques may also include storing a second configuration associated with a second VRF instance of the service forwarding node that is connected to the second service. The second configuration may indicate that the second service is a last service of the service chain sequence. When traffic is received at the service forwarding node, the service forwarding node can determine whether the traffic is pre-service traffic or post-service traffic.

    SECURITY POLICY ENFORCEMENT FOR RESOURCES IN BRIDGE MODE

    公开(公告)号:US20240396945A1

    公开(公告)日:2024-11-28

    申请号:US18791151

    申请日:2024-07-31

    Abstract: Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.

Patent Agency Ranking