摘要:
In certain embodiments, a key is received, wherein a value is capable of being generated from the key and an input string corresponding to a packet. Intermediary values are computed based on substrings of the key and substrings of the input string. The intermediary values are stored in a data structure, wherein the stored intermediary values are capable of being used to generate the value.
摘要:
Apparatus and systems, as well as methods and articles, may operate to control a security state associated with one or more network node(s) using a master heuristic policy enforcement module associated with a network firewall, and to selectively re-direct first packets to the network firewall from a remotely manageable network controller located within the network node(s) based upon the security state.
摘要:
In certain embodiments, a key is received, wherein a value is capable of being generated from the key and an input string corresponding to a packet. Intermediary values are computed based on substrings of the key and substrings of the input string. The intermediary values are stored in a data structure, wherein the stored intermediary values are capable of being used to generate the value.
摘要:
Apparatus, system, and method having a first memory to receive a parameter associated with a second operating system protocol stack; and a first operating system protocol stack to be configured with parameter. The system includes a communication medium and a manageability module. The method includes monitoring content of messages communicated between a host client computer and a server computer over a network, inspecting the content of the messages for protocol parameters, providing the protocol parameters to a manageability module associated with the host client computer, and configuring a second operating system protocol stack associated with the manageability module to match a first operating system protocol stack associated with the host client computer.
摘要:
In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of dynamically modifiable passwords on a pattern wake list, each of the dynamically modifiable passwords being based, at least in part, on a seed value
摘要:
Apparatus, system, and method having a first memory to receive a parameter associated with a second operating system protocol stack; and a first operating system protocol stack to be configured with said parameter. The system includes a communication medium and a manageability module. The method includes monitoring content of messages communicated between a host client computer and a server computer over a network, inspecting the content of the messages for protocol parameters, providing the protocol parameters to a manageability module associated with the host client computer, and configuring a second operating system protocol stack associated with the manageability module to match a first operating system protocol stack associated with the host client computer.
摘要:
Apparatus, system, and method having a first memory to receive a parameter associated with a second operating system protocol stack; and a first operating system protocol stack to be configured with said parameter. The system includes a communication medium and a manageability module. The method includes monitoring content of messages communicated between a host client computer and a server computer over a network, inspecting the content of the messages for protocol parameters, providing the protocol parameters to a manageability module associated with the host client computer, and configuring a second operating system protocol stack associated with the manageability module to match a first operating system protocol stack associated with the host client computer.
摘要:
In an embodiment, a method is provided. The method of this embodiment provides receiving a packet having a wake-up pattern, and waking up if the wake-up pattern corresponds to one of a number of dynamically modifiable passwords on a pattern wake list, each of the dynamically modifiable passwords being based, at least in part, on a seed value.
摘要:
A capability of a device may be registered to an adapter. This capability may characterize the device in terms of tasks performing abilities that may be available or associated therewith. When a packet of data including a task to be handled is received at the adapter, based on the capability registered earlier for the device, the adapter may determine whether to assign the task to the device. An indication, such as packet processing information may be derived from the packet to assist in distribution of the task. By comparing the indication with the capability, the task may be offloaded to the device based on the comparison. Using the device for a networked device, in one embodiment, one or more network communication tasks associated with data communications may be distributed and optionally performed within an adapter. In this way, the networked device may be spared of undertaking network communication tasks that are conventionally performed within the networked device.
摘要:
A provisioning method and mechanism for computer systems having embedded network devices. After an initial boot-up of a computer platform, an out-of-band (OOB) controller automatically connects to a corporate DHCP (Dynamic Host Configuration Protocol) server to obtain an IP (Internet Protocol) address and a domain name in which the computer platform is running. The domain name is concatenated with a pre-defined host name to obtain a FQDN (Fully Qualified Domain Name) for a provisioning server. The OOB controller then establishes a TCP connection to the provisioning server. A server certificate chain received from the provisioning server is validated. An attempt to login to the provisioning server is made. If corporate security policy dictates granting access to the computer platform, then provisioning configuration data is received over a secure and encrypted channel.