MACsec for encrypting tunnel data packets
    41.
    发明申请

    公开(公告)号:US20190173860A1

    公开(公告)日:2019-06-06

    申请号:US15833807

    申请日:2017-12-06

    Abstract: Examples disclosed herein relate to use of MACsec to encrypt tunnel data packets. In an example, a MACsec capable device may receive a data packet from a host device for tunneling to a controller. MACsec capable device may encapsulate the data packet with an encapsulation header to generate an encapsulated data packet. The encapsulation header may comprise a destination MAC address reserved for the controller. MACsec capable device may direct the encapsulated data packet to a MACsec engine. MACsec engine may encrypt the encapsulated data packet with the encryption key to generate an encrypted data packet. MACsec capable device may encapsulate the encrypted data packet with a first GRE header. MACsec capable device may send the encrypted data packet with the first GRE header to the controller via a GRE tunnel.

    ESTABLISHING A NETWORK FAULT DETECTION SESSION

    公开(公告)号:US20180167262A1

    公开(公告)日:2018-06-14

    申请号:US15659908

    申请日:2017-07-26

    Abstract: Examples relate to establishing a network fault detection session. In one example, a routing device may receive a request to initiate a bidirectional forwarding detection (BFD) session with a second routing device; transmit a first echo frame to the second routing device; receive a first response frame; determine that a response time does not meet a response time threshold; in response to the determination, determine that a BFD failure threshold has not been met; after the determination that the BFD failure threshold has not been met, transmit a second echo frame to the second routing device; receive a second response frame; determine whether a second response time meets the BFD response time threshold; and in response to determining that the second response time meets the BFD response time threshold, provide a notification that a BFD session has been established between the routing device and the second routing device.

    APPLYING A GROUP BASED POLICY TO NETWORK TRAFFIC FROM A CLIENT

    公开(公告)号:US20240283798A1

    公开(公告)日:2024-08-22

    申请号:US18315269

    申请日:2023-05-10

    CPC classification number: H04L63/104 H04L63/102 H04L63/30

    Abstract: Some examples relate to a proxy service on a network device for applying a group based policy (GBP) to network traffic from a client. In an example, a proxy service on a network device is used to intercept a network access request message, pertaining to a client, from an access device. The proxy service forwards the network access request message to an authentication server. The server responds by sending a network access response message to the access device. The proxy service intercepts the network access response message from the authentication server and obtains the role information of the client from the network access response message. In response to receiving network traffic from the client, the proxy service identifies a GBP corresponding to the role information of the client and applies the GBP to the network traffic from the client.

    SERVICE DISCOVERY ACROSS TUNNEL ENDPOINTS IN OVERLAYS

    公开(公告)号:US20240205048A1

    公开(公告)日:2024-06-20

    申请号:US18067813

    申请日:2022-12-19

    CPC classification number: H04L12/4633 H04L12/185 H04L45/26 H04L45/66

    Abstract: In an example, a network device may receive, from a client device, a multicast query for a service advertised by a host device connected to another network device. The network device is configured as a first Virtual tunnel endpoint (VTEP) and the other network device is configured as a second VTEP in an overlay network. The network device may determine whether a host name, of the host device, corresponding to the service name in the multicast query is present in a resource record. In response to determining that the host name is present in the resource record, the network device may identify, from the resource record, an overlay network path corresponding to the host name. The network device may encapsulate the multicast query based on an overlay encapsulation protocol implemented at the first VTEP and route, the encapsulated multicast query, via the overlay network path, to the host device.

    EFFICIENT TRAFFIC REDIRECTION FOR AN MCLAG FOR CONTROLLED UNAVAILABILITY EVENTS

    公开(公告)号:US20230327981A1

    公开(公告)日:2023-10-12

    申请号:US17719138

    申请日:2022-04-12

    CPC classification number: H04L45/245 H04L45/42 H04L45/22 H04L45/123

    Abstract: A system for facilitating traffic redirection for a multi-chassis link aggregation group (MCLAG) is provided. During operation, the system can participate in an MCLAG using a first interface of a first switch. The MCLAG can also include a second interface of a second switch. Based on predetermined unavailability for the first switch, the system can determine a sequence of applications for a plurality of traffic forwarding configurations. A respective configuration can facilitate loop prevention for traffic forwarded via the MCLAG. The system can then apply the plurality of configurations to the first switch based on the sequence of applications to redirect unicast traffic from the first switch to the second switch. Here, applying a respective configuration can include programming corresponding switch hardware with the configuration. Subsequently, the system can perform a set of operations on the first switch that triggers the predetermined unavailability.

    ENABLING RESTRICTION ON TRANSMISSION OF DATA PACKETS AT INGRESS NETWORK DEVICE

    公开(公告)号:US20220417287A1

    公开(公告)日:2022-12-29

    申请号:US17409179

    申请日:2021-08-23

    Abstract: Examples disclosed herein relate to a method for defining an ingress access policy at an ingress network device based on instructions from an egress network device. The egress network device receives data packets directed to a first entity from a second entity connected to an ingress network device. Each data packet transmitted includes a source role tag corresponding to the second entity. At the egress network device, the data packets may be dropped based on the enforcement of an egress access policy. When the number of data packets that are being dropped increases beyond a pre-defined threshold, the egress network device transmits a command to the ingress network device instructing the ingress network device to create a restriction on the transmission of subsequent data packets. The command is transmitted in a Border Gateway Protocol (BGP) Flow Specification (FlowSpec) route.

Patent Agency Ranking