Ordered stack formation with reduced manual intervention

    公开(公告)号:US11805183B2

    公开(公告)日:2023-10-31

    申请号:US17482152

    申请日:2021-09-22

    CPC classification number: H04L67/51 H04L45/583

    Abstract: A member switch of multiple connected switches receives a stack-discovery packet from a first coupled switch and, in response, generates and transmits a stack-discovery-response packet to the first coupled switch to allow the member switch to be discovered. The member switch receives stack-configuration information from a stack-control node and forwards the stack-discovery packet to a second coupled switch to facilitate discovery of the second coupled switch. The first coupled switch, the member switch, and the second coupled switch are coupled to each other according to a predetermined order, thereby facilitating an ordered discovery of the multiple connected switches. In response to receiving, from the stack-control node, a control packet, the member switch reboots based on the received stack-configuration information. The stack-configuration information comprises a stack-member identifier allocated, based on the predetermined order, by the stack-control mode to the member switch, thereby facilitating formation of an ordered stack.

    Centralized database based multicast converging

    公开(公告)号:US10742431B2

    公开(公告)日:2020-08-11

    申请号:US16118833

    申请日:2018-08-31

    Abstract: Examples herein are directed to centralized database based multicast converging. For instance, in various examples centralized database based multicast converging can include starting a restart timer having a value greater than a time to validate stored entries in a centralized database, sending data packets at least to hosts on the network corresponding to the stored entries in the centralized database to maintain service to the hosts while the restart timer is running, sending query packets to validate a host corresponding to an entry of the stored entries in the centralized database, and responsive to the restart timer expiring, sending data packets to a converged group of hosts including at least the validated host.

    MACsec for encrypting tunnel data packets
    13.
    发明申请

    公开(公告)号:US20190173860A1

    公开(公告)日:2019-06-06

    申请号:US15833807

    申请日:2017-12-06

    Abstract: Examples disclosed herein relate to use of MACsec to encrypt tunnel data packets. In an example, a MACsec capable device may receive a data packet from a host device for tunneling to a controller. MACsec capable device may encapsulate the data packet with an encapsulation header to generate an encapsulated data packet. The encapsulation header may comprise a destination MAC address reserved for the controller. MACsec capable device may direct the encapsulated data packet to a MACsec engine. MACsec engine may encrypt the encapsulated data packet with the encryption key to generate an encrypted data packet. MACsec capable device may encapsulate the encrypted data packet with a first GRE header. MACsec capable device may send the encrypted data packet with the first GRE header to the controller via a GRE tunnel.

    IDENTIFYING LOOP-ORIGINATION POINTS IN AN OVERLAY NETWORK

    公开(公告)号:US20250112855A1

    公开(公告)日:2025-04-03

    申请号:US18480361

    申请日:2023-10-03

    Abstract: A network management system (NMS) for provisioning and managing an overlay network is provided. During operation, the NMS can determine that a loop associated with a media access control (MAC) address is detected in the network. The NMS can probe a first switch in the loop by instructing the first switch to observe the MAC address for a predetermined period. The NMS can receive a first message indicating a first set of ports of the first switch observing the MAC address. The NMS can probe an upstream switch reachable via each of the first set of ports by instructing the upstream switch to observe the MAC address for the predetermined period. Here, observing the MAC address at an upstream port of the upstream switch causes further upstream probing. Based on probing the switches in the loop, the NMS can determine one or more loop origination points (LOPs) for the loop.

    ORDERED STACK FORMATION WITH REDUCED MANUAL INTERVENTION

    公开(公告)号:US20230092836A1

    公开(公告)日:2023-03-23

    申请号:US17482152

    申请日:2021-09-22

    Abstract: A member switch of multiple connected switches receives a stack-discovery packet from a first coupled switch and, in response, generates and transmits a stack-discovery-response packet to the first coupled switch to allow the member switch to be discovered. The member switch receives stack-configuration information from a stack-control node and forwards the stack-discovery packet to a second coupled switch to facilitate discovery of the second coupled switch. The first coupled switch, the member switch, and the second coupled switch are coupled to each other according to a predetermined order, thereby facilitating an ordered discovery of the multiple connected switches. In response to receiving, from the stack-control node, a control packet, the member switch reboots based on the received stack-configuration information. The stack-configuration information comprises a stack-member identifier allocated, based on the predetermined order, by the stack-control mode to the member switch, thereby facilitating formation of an ordered stack.

    MACsec for encrypting tunnel data packets

    公开(公告)号:US10708245B2

    公开(公告)日:2020-07-07

    申请号:US15833807

    申请日:2017-12-06

    Abstract: Examples disclosed herein relate to use of MACsec to encrypt tunnel data packets. In an example, a MACsec capable device may receive a data packet from a host device for tunneling to a controller. MACsec capable device may encapsulate the data packet with an encapsulation header to generate an encapsulated data packet. The encapsulation header may comprise a destination MAC address reserved for the controller. MACsec capable device may direct the encapsulated data packet to a MACsec engine. MACsec engine may encrypt the encapsulated data packet with the encryption key to generate an encrypted data packet. MACsec capable device may encapsulate the encrypted data packet with a first GRE header. MACsec capable device may send the encrypted data packet with the first GRE header to the controller via a GRE tunnel.

    FAILOVER IN A MEDIA ACCESS CONTROL SECURITY CAPABALE DEVICE

    公开(公告)号:US20190386824A1

    公开(公告)日:2019-12-19

    申请号:US16007594

    申请日:2018-06-13

    Abstract: Examples disclosed herein relate to providing a failover in a MACsec capable device. In an example, a determination may be made on a Media Access Control (MAC) Security (MACsec) capable device, whether a primary management engine that manages a protocol related to MACsec standard on the MACsec capable device has failed. In response to a determination that the primary management engine has failed, a secondary management engine in the MACsec capable device may create a Connectivity Association (CA) between the MACsec capable device and a peer MACsec capable device by performing an IEEE 802.1X re-authentication with the peer MACsec capable device within MACsec Key Agreement (MKA) lifetime. The MKA lifetime may refer to a period during which no MACsec Key Agreement Protocol Data Unit (MKPDU) is received by the peer MACsec capable device from the MACsec capable device.

Patent Agency Ranking