Mechanisms for solving an IP fragmentation overlapping issue in L2VPN using multiple IP addresses in GRE headers

    公开(公告)号:US10771429B1

    公开(公告)日:2020-09-08

    申请号:US16366776

    申请日:2019-03-27

    Applicant: VMware, Inc.

    Abstract: In an embodiment, a computer-implemented method for using multiple IP addresses in GRE IP headers to prevent IPID fragmentation overlapping in L2VPN networks is disclosed. In an embodiment, the method comprises: receiving, by an edge service gateway, a packet that requires fragmentating; determining whether the gateway is configured to prevent IPID fragmentation overlapping; and in response to determining that the gateway is configured to prevent IPID fragmentation overlapping, creating a plurality of packet fragments of the packet. A packet fragment comprises a GRE IP header, additional headers, and a portion of the packet. The GRE IP header stores an IPID generated for the packet in an IPID field, a source private IP address in a source IP address field, and a destination private IP address in a destination IP address field. The source private IP address, the destination private IP address and the IPID collectively form a packet identifier of the packet.

    Dynamic rekeying of IPSec security associations

    公开(公告)号:US11770389B2

    公开(公告)日:2023-09-26

    申请号:US17012235

    申请日:2020-09-04

    Applicant: VMWARE, INC.

    Abstract: Certain embodiments described herein are relate to a method for dynamically rekeying a security association. The method includes establishing, by a destination tunnel endpoint (TEP), an in-bound security association with a source TEP, with a first security parameter index (SPI) value, for encrypting data packets communicated between the source TEP and the destination TEP. The method further includes rekeying, by the destination TEP, the in-bound security association, the rekeying including generating a second SPI value for replacing the first SPI value based on a trigger event relating to at least one of a real-time security score of the in-bound security association, a number of security associations assigned to a compute resource that the in-bound security resource is assigned to, an amount of load managed by the compute resource that the in-bound security resource is assigned to, and an indication received from an administrator.

    HANDLING MULTIPATH IPSEC IN NAT ENVIRONMENT

    公开(公告)号:US20230118718A1

    公开(公告)日:2023-04-20

    申请号:US17962419

    申请日:2022-10-07

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method for establishing a virtual private network (VPN) session between a first gateway router located at a first site and a second gateway router located at a second site. The VPN session for exchanging packets along multiple paths between the first and second sites. The method is performed at the second gateway router located at the second site. The method determines whether any intermediate network address translation (NAT) device processes packets on the multiple paths between the first and second sites during the VPN session. Upon determining that no NAT device processes packets on the multiple paths between the first and second sites, the method builds a source port pool at the second site for sending probe packets during the VPN session (1) to identify the multiple paths and (2) to collect metrics associated with each of the identified paths. Upon determining that a NAT device processes packets on the multiple paths between the first and second sites, the method uses destination port identifiers used in probe packets sent by the first gateway at the first site as source port identifiers for sending probe packets during the VPN session (1) to identify the multiple paths and (2) to collect metrics associated with each of the identified paths.

    MANAGING EDGE GATEWAY SELECTION USING EXCHANGED HASH INFORMATION

    公开(公告)号:US20230036071A1

    公开(公告)日:2023-02-02

    申请号:US17507822

    申请日:2021-10-22

    Applicant: VMWARE, INC.

    Abstract: Described herein are systems, methods, and software to select edge gateways for communications based on exchanged hash information. In one implementation, a first gateway may receive hash information associated with second gateways, wherein the hash information is used to select a gateway of the second gateways to communicate a packet. The first gateway further receives a packet. hashes addressing in the packet to select a destination gateway of the second gateways for the packet. The first gateway further encapsulates the packet and communicates the encapsulated packet to the selected destination gateway.

    EDGE NODE WITH DATAPATH SPLIT BETWEEN PODS

    公开(公告)号:US20230028922A1

    公开(公告)日:2023-01-26

    申请号:US17384211

    申请日:2021-07-23

    Applicant: VMware, Inc.

    Abstract: Some embodiments of the invention provide a system for implementing multiple logical routers. The system includes a Kubernetes cluster that includes multiple nodes, with each node executing a set of pods. The set of pods include a first pod for performing a first set of data message processing operations for the multiple logical routers and at least one respective separate pod for each respective logical router of the multiple logical routers. Each respective pod is for performing a respective second set of data message processing operations for the respective logical router.

    MANAGING TUNNEL INTERFACE SELECTION BETWEEN GATEWAYS IN A COMPUTING ENVIRONMENT

    公开(公告)号:US20230024885A1

    公开(公告)日:2023-01-26

    申请号:US17502081

    申请日:2021-10-15

    Applicant: VMWARE, INC.

    Abstract: Described herein are systems, methods, and software to manage the selection of an edge gateway or edge for processing a packet. In one implementation, a first edge may receive a packet and hash addressing information in the packet to select a second edge to process the packet. The first edge may further forward the packet to the second edge, permitting the second edge to process the packet. Once processed, the second edge may forward the packet to a destination host computing system and notify the host computing system to use the second edge for response packets directed at a source internet protocol (IP) address in the packet.

    IPSEC PROCESSING ON MULTI-CORE SYSTEMS

    公开(公告)号:US20220394017A1

    公开(公告)日:2022-12-08

    申请号:US17570366

    申请日:2022-01-06

    Applicant: VMware, Inc.

    Abstract: Some embodiments provide a method that receives an encapsulated packet for a virtual private network (VPN) session. The encapsulated packet incluides (i) a set of flow identifiers of a network traffic flow that includes a user datagram protocol (UDP) port number and (ii) a payload encrypted according to a security association (SA). The method hashes the set of flow identifiers of the network traffic flow to select a processor core from a plurality of processor cores. The method uses the selected processor core to decrypt the payload in the encapsulated packet according to the SA.

    Packet handling based on multiprocessor architecture configuration

    公开(公告)号:US11340932B2

    公开(公告)日:2022-05-24

    申请号:US16751193

    申请日:2020-01-23

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for packet handling based on a multiprocessor architecture configuration are provided. One example method may comprise: in response to receiving a first ingress packet that requires processing by a first virtual central processing unit (VCPU) running on the first node, steering the first ingress packet towards a first receive (RX) queue and performing local memory access on the first node to access the first ingress packet from the first RX queue. The method may also comprise: in response to receiving a second ingress packet that requires processing by a second VCPU running on the second node, steering the second ingress packet towards a second RX queue and performing local memory access on the second node to access the second ingress packet from the second RX queue.

    Memory leak detection
    50.
    发明授权

    公开(公告)号:US11307923B2

    公开(公告)日:2022-04-19

    申请号:US16520318

    申请日:2019-07-23

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for memory leak detection. One example may comprise: identifying a set of memory buffers that are available for storing packet information that requires processing by the network device; a first subset that includes one or more first memory buffers that are unallocated, and a second subset that includes one or more second memory buffers that are allocated and storing packet information that is being processed by the network device. The method may also comprise: performing a comparison between (a) the set of memory buffers and (b) the first subset and the second subset; and based on the comparison, identifying a third subset that includes one or more third memory buffers, being leaked memory buffers, that are storing packet information that is no longer being processed by the network device.

Patent Agency Ranking