ROLE INFORMATION PROPAGATION IN ACCESS SWITCHES

    公开(公告)号:US20230318961A1

    公开(公告)日:2023-10-05

    申请号:US17712342

    申请日:2022-04-04

    CPC classification number: H04L45/02 H04L12/4641 H04L63/105 H04L63/08 H04L45/04

    Abstract: In an example, a switch may receive an authentication request from a host associated with a first wireless access point (WAP) connected to the switch. The switch acts as a VXLAN Tunnel Endpoint (VTEP) in a Border Gateway Protocol (BGP) Ethernet Virtual Private Network (EVPN) based Virtual Extensible Local Area Network (VXLAN). The switch forwards the authentication request to an authentication server and on successful authentication of the host, may associate a role information with the host based on an authentication response from the authentication server. Further, the switch may create a BGP extended community field carrying the role identifier indicative of network policies to be implemented for the host and attach the BGP extended community field with a route advertisement. The switch then sends the route advertisement to another switch. The another switch is configured as a peer VTEP in the VXLAN. The switch and the another switch is configured in a single Virtual Local Area Network (VLAN).

    Method and system for dynamically activating virtual networks in a distributed tunnel fabric

    公开(公告)号:US11671282B2

    公开(公告)日:2023-06-06

    申请号:US17328485

    申请日:2021-05-24

    CPC classification number: H04L12/4641 H04L12/4633

    Abstract: A system for dynamically activating a virtual network is provided. During operation, the system can operate a switch as a tunnel endpoint of a tunnel in conjunction with a remote switch. The tunnel can facilitate a virtual private network (VPN) spanning the switch and the remote switch. The system can maintain an inactive state for a virtual local area network (VLAN) and a corresponding tunnel network identifier identifying the VLAN for the tunnel. If a notification indicating the activation of the VLAN at a downstream switch is received by the switch, the system can activate the VLAN at the switch. The system can then activate the tunnel network identifier in a routing process of the VPN, thereby enabling sharing of a media access control (MAC) address associated with the VLAN via the tunnel.

    POLICY ENFORCEMENT ON MULTI-DESTINATION PACKETS IN A DISTRIBUTED TUNNEL FABRIC

    公开(公告)号:US20230069306A1

    公开(公告)日:2023-03-02

    申请号:US17411875

    申请日:2021-08-25

    Abstract: A system for policy management in a switch is provided. During operation, the system can generate, from a first policy defined for the switch, a second policy. The first policy can indicate whether a type of traffic is allowed from a source role to a destination role via an overlay tunnel. The second policy can indicate a plurality of destination roles that are allowed to receive multi-destination packets of the type of traffic from the source role via the overlay tunnel. Upon identifying a host associated with a role at a port of the switch, the system can determine whether the role belongs to the plurality of destination roles based on the second policy. If the role belongs to the plurality of allowed destination roles, the system can allow the port to forward a multi-destination packet, which is received via the overlay tunnel and associated with the type of traffic.

    METHOD AND SYSTEM FOR DYNAMICALLY ACTIVATING VIRTUAL NETWORKS IN A DISTRIBUTED TUNNEL FABRIC

    公开(公告)号:US20220376950A1

    公开(公告)日:2022-11-24

    申请号:US17328485

    申请日:2021-05-24

    Abstract: A system for dynamically activating a virtual network is provided. During operation, the system can operate a switch as a tunnel endpoint of a tunnel in conjunction with a remote switch. The tunnel can facilitate a virtual private network (VPN) spanning the switch and the remote switch. The system can maintain an inactive state for a virtual local area network (VLAN) and a corresponding tunnel network identifier identifying the VLAN for the tunnel. If a notification indicating the activation of the VLAN at a downstream switch is received by the switch, the system can activate the VLAN at the switch. The system can then activate the tunnel network identifier in a routing process of the VPN, thereby enabling sharing of a media access control (MAC) address associated with the VLAN via the tunnel.

    MANAGING A SECOND RING LINK FAILURE IN A MULTI-RING ETHERNET NETWORK

    公开(公告)号:US20210328829A1

    公开(公告)日:2021-10-21

    申请号:US17221807

    申请日:2021-04-04

    Abstract: Examples disclosed herein relate to managing a second ring link failure in a multi-ring Ethernet network. In an example, an inter-connection network node in a multi-ring Ethernet network comprising a major ring and a sub-ring may propagate a signal failure (SF) event, received in response to a second ring link failure in the major ring, to one or more nodes in the sub-ring. In response to receiving the SF event, a Ring Protection Link (RPL) on the sub-ring may be unlocked to allow network traffic through the RPL and avoid loop formation on the multi-ring Ethernet network. The sub-ring may be moved to the ring protection switching state; including performing a filtering database (FDB) flush at every node on the multi-ring Ethernet network whereby all MAC addresses and related port associations for traffic forwarding are cleared from the FDB.

    NETWORK BASED SERVICE DISCOVERY VIA UNICAST MESSAGES

    公开(公告)号:US20180131775A1

    公开(公告)日:2018-05-10

    申请号:US15566947

    申请日:2015-06-18

    Abstract: In one example, a system is described which includes an underlay network including a mapping server and a mapping database, an overlay network including VTEPs, at least one peripheral device, and at least one client device connected to the at least one peripheral device via the VTEPs. Further, each VTEP includes a traffic optimization module. A first VTEP receives a first service advertisement from a first peripheral device offering the first service and registers service advertisement information with the mapping database, a second VTEP connected to a first client device queries the mapping database to discover the first peripheral device via a unicast message, retrieves the service advertisement information from the mapping database upon a successful query, and sends the retrieved service advertisement information to the first client device, and the first client device selects the first peripheral device offering the first service using the service advertisement information.

Patent Agency Ranking