Port isolation for restricting traffic flow on layer 2 switches

    公开(公告)号:US20060262798A1

    公开(公告)日:2006-11-23

    申请号:US11494084

    申请日:2006-07-26

    IPC分类号: H04L12/56

    摘要: This invention provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair. A forwarding map generator generates a forwarding map which is responsive to a destination address of a data packet. The method for isolating ports on a layer 2 switch comprises configuring each of the ports on the layer 2 switch as a protected port or a non-protected port. A destination address on an data packet is matched with a physical address on said layer 2 switch and a forwarding map is generated for the data packet based upon the destination address on the data packet. The data packet is then sent to the plurality of ports pursuant to the forwarding map generated based upon whether the ingress port was configured as a protected or nonprotected port.

    Port isolation for restricting traffic flow on layer 2 switches
    23.
    发明授权
    Port isolation for restricting traffic flow on layer 2 switches 有权
    用于限制第2层交换机上的流量的端口隔离

    公开(公告)号:US07095741B1

    公开(公告)日:2006-08-22

    申请号:US09745280

    申请日:2000-12-20

    IPC分类号: H04L12/28 H04L9/00

    摘要: This invention provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair. A forwarding map generator generates a forwarding map which is responsive to a destination address of a data packet. The method for isolating ports on a layer 2 switch comprises configuring each of the ports on the layer 2 switch as a protected port or a non-protected port. A destination address on an data packet is matched with a physical address on said layer 2 switch and a forwarding map is generated for the data packet based upon the destination address on the data packet. The data packet is then sent to the plurality of ports pursuant to the forwarding map generated based upon whether the ingress port was configured as a protected or nonprotected port.

    摘要翻译: 本发明提供了隔离同一VLAN上第2层交换机上端口的装置和方法,以限制流量。 该装置包括具有所述多个端口的开关,每个端口被配置为受保护端口或非保护端口。 地址表存储器存储具有目的地地址和端口号对的地址表。 转发地图生成器生成响应于数据分组的目的地地址的转发映射。 用于隔离第2层交换机端口的方法包括将第2层交换机上的每个端口配置为受保护端口或非保护端口。 数据分组上的目的地地址与所述第二层交换机上的物理地址相匹配,并且基于数据分组上的目的地址为数据分组生成转发映射。 然后根据基于入口端口是否配置为受保护端口或非保护端口生成的转发映射,将数据包发送到多个端口。

    Port isolation for restricting traffic flow on layer 2 switches
    24.
    发明授权
    Port isolation for restricting traffic flow on layer 2 switches 有权
    用于限制第2层交换机上的流量的端口隔离

    公开(公告)号:US07881296B2

    公开(公告)日:2011-02-01

    申请号:US11494084

    申请日:2006-07-26

    IPC分类号: H04L12/28

    摘要: This invention provides for an apparatus and method to isolate ports on layer 2 switches on the same VLAN to restrict traffic flow. The apparatus comprises a switch having said plurality of ports, each port configured as a protected port or a non-protected port. An address table memory stores an address table having a destination address and port number pair. A forwarding map generator generates a forwarding map which is responsive to a destination address of a data packet. The method for isolating ports on a layer 2 switch comprises configuring each of the ports on the layer 2 switch as a protected port or a non-protected port. A destination address on an data packet is matched with a physical address on said layer 2 switch and a forwarding map is generated for the data packet based upon the destination address on the data packet. The data packet is then sent to the plurality of ports pursuant to the forwarding map generated based upon whether the ingress port was configured as a protected or nonprotected port.

    摘要翻译: 本发明提供了隔离同一VLAN上第2层交换机上端口的装置和方法,以限制流量。 该装置包括具有所述多个端口的开关,每个端口被配置为受保护端口或非保护端口。 地址表存储器存储具有目的地地址和端口号对的地址表。 转发地图生成器生成响应于数据分组的目的地地址的转发映射。 用于隔离第2层交换机端口的方法包括将第2层交换机上的每个端口配置为受保护端口或非保护端口。 数据分组上的目的地地址与所述第二层交换机上的物理地址相匹配,并且基于数据分组上的目的地址为数据分组生成转发映射。 然后根据基于入口端口是否配置为受保护端口或非保护端口生成的转发映射,将数据包发送到多个端口。

    Enhanced multicast VLAN registration
    25.
    发明授权
    Enhanced multicast VLAN registration 有权
    增强组播VLAN注册

    公开(公告)号:US07590120B2

    公开(公告)日:2009-09-15

    申请号:US11283269

    申请日:2005-11-18

    IPC分类号: H04L12/56

    摘要: A method and apparatus utilized in layer 2 access switches of an Ethernet ring-based network to bridge multicast packets between a multicast VLAN and a selected VLAN coupled to a VLAN trunk port of the layer 2 access switch. The duplication of multicast streams over the ring technology is avoided while maintaining isolation between subscribers.

    摘要翻译: 一种在以太网环网的二层接入交换机中使用的方法和装置,用于跨组播VLAN和耦合到第二层接入交换机的VLAN中继端口的选定VLAN之间的组播数据包。 避免在环形技术上重复组播流,同时保持用户之间的隔离。

    N-PORT ID VIRTUALIZATION (NPIV) PROXY MODULE, NPIV PROXY SWITCHING SYSTEM AND METHODS
    27.
    发明申请
    N-PORT ID VIRTUALIZATION (NPIV) PROXY MODULE, NPIV PROXY SWITCHING SYSTEM AND METHODS 有权
    N端口ID虚拟化(NPIV)代理模块,NPIV代理切换系统和方法

    公开(公告)号:US20080313724A1

    公开(公告)日:2008-12-18

    申请号:US11762575

    申请日:2007-06-13

    IPC分类号: H04L9/32

    CPC分类号: H04L49/357 H04L49/70

    摘要: Embodiments of an N-Port ID virtualization (NPIV) proxy module, NPIV proxy switching system, and methods are generally described herein. Other embodiments may be described and claimed. In some embodiments, login requests are distributed over a plurality of available N-ports to allow servers to be functionally coupled to F-ports of a plurality of fiber-channel (FC) switches. Fiber-channel identifiers (FCIDs) are assigned to the servers in response to the logon requests to provide single end-host operations for each of the servers.

    摘要翻译: 这里通常描述N端口ID虚拟化(NPIV)代理模块,NPIV代理交换系统和方法的实施例。 可以描述和要求保护其他实施例。 在一些实施例中,登录请求分布在多个可用N端口上,以允许服务器功能地耦合到多个光纤信道(FC)交换机的F端口。 光纤通道标识符(FCID)被分配给服务器以响应登录请求,为每个服务器提供单个终端主机操作。

    Method and apparatus for locating rogue access point switch ports in a wireless network
    29.
    发明授权
    Method and apparatus for locating rogue access point switch ports in a wireless network 有权
    用于定位无线网络中的流氓接入点交换机端口的方法和装置

    公开(公告)号:US07370362B2

    公开(公告)日:2008-05-06

    申请号:US11073317

    申请日:2005-03-03

    IPC分类号: G06F11/00 G06F12/16

    摘要: Methods and apparatus are disclosed for locating and disabling the switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access point is connected, and ultimately disable the switch port to which the rogue access point is connected.

    摘要翻译: 公开了用于定位和禁用流氓无线接入点的交换机端口的方法和装置。 在一个实施例中,网络管理设备被配置为检测被管理无线网络上的恶意接入点的存在。 一旦检测到,管理设备然后可以指示诸如扫描AP的特殊客户端与流氓接入点关联,并通过流氓接入点将发现分组发送到网络管理设备。 因此,网络管理装置在接收到发现分组时可以确定恶意接入点连接到由所述网络设备管理的网络。 然后,网络设备可以利用包含在发现分组中的信息来定位与恶意接入点连接的交换机端口,并且最终禁用与恶意接入点连接的交换机端口。

    System and method for implementing multiple ring networks using a common link
    30.
    发明申请
    System and method for implementing multiple ring networks using a common link 有权
    使用公共链路实现多个环网的系统和方法

    公开(公告)号:US20070047472A1

    公开(公告)日:2007-03-01

    申请号:US11218886

    申请日:2005-09-02

    IPC分类号: H04L12/28 H04L12/56

    摘要: Various systems and methods for implementing virtual ports within ring networks are disclosed. For example, one method involves allocating a logical port that corresponds to a first port and a second port and instantiating a spanning tree protocol instance. The first port and the second port are both assigned to a first ring network. The spanning tree protocol instance selectively blocks the logical port; however, the spanning tree protocol instance is unable to block the first port independently of blocking the second port. Events (e.g., link failures and recoveries) that occur within the ring network are communicated to spanning tree by transitioning the state of the logical port in response to receiving a ring protocol control packet. The spanning tree protocol instance initiates a bridge protocol data unit (BPDU) exchange from the logical port in response to a transition in the state of the logical port.

    摘要翻译: 公开了用于在环网内实现虚拟端口的各种系统和方法。 例如,一种方法包括分配对应于第一端口和第二端口的逻辑端口并实例化生成树协议实例。 第一个端口和第二个端口都分配给第一个环网。 生成树协议实例选择性地阻止逻辑端口; 但是,生成树协议实例无法阻止第一个端口,而是阻止第二个端口。 响应于接收到环形协议控制分组,通过转换逻辑端口的状态来将发生在环网内的事件(例如,链路故障和恢复)传送到生成树。 生成树协议实例响应于逻辑端口状态的转换,从逻辑端口发起桥协议数据单元(BPDU)交换。