Group Based Encryption in Enterprise Fabric Architectures

    公开(公告)号:US20180367302A1

    公开(公告)日:2018-12-20

    申请号:US15968189

    申请日:2018-05-01

    CPC classification number: H04L9/30 H04L9/0841 H04L9/085 H04L9/0866

    Abstract: In accordance with various implementations, a method is performed at a source node of a fabric network coupled to a plurality of hosts respectively associated with a plurality of group identifiers. The method includes generating a source public key based on a source private key, a source group identifier of the plurality of group identifiers, and a destination group identifier of the plurality of group identifiers. The method includes sending, from the source node coupled to at least one host associated with the source group identifier to a destination node coupled to at least one host associated with the destination group identifier, the source public key. The method includes receiving, at the source node from the destination node, a destination public key based on a destination private key, the source group identifier, and the destination group identifier. The method further includes generating a shared secret based on the destination public key and the source private key.

    IDENTITY-BASED POLICY IMPLEMENTATION IN NETWORK ADDRESS TRANSLATION (NAT) ENVIRONMENTS

    公开(公告)号:US20180255017A1

    公开(公告)日:2018-09-06

    申请号:US15447291

    申请日:2017-03-02

    Abstract: A policy server correlates information from several messages associated with a client device to implement an identity-based network access policy. The policy server receives a first message from a network element connected to the client device. The first message requests an identity-based policy for the client device, and includes a first network address. The policy server receives a second message from an identity server. The second message includes information indicating an identity role and a second network address. The policy server receives a third message from a NAT device. The third message includes a NAT mapping that correlates the first network address with the second network address. After the policy server determines the identity-based policy based on a combination of the first message, the second message, and the third message, the policy server implements the identity-based policy in the network element.

    Group Based Multicast in Networks
    73.
    发明申请

    公开(公告)号:US20180255002A1

    公开(公告)日:2018-09-06

    申请号:US15446802

    申请日:2017-03-01

    CPC classification number: H04L49/201 H04W72/121 H04W74/002

    Abstract: Group based multicasts may be provided. First, a request may be received. The request may comprise a receiver tag, a request source identifier, and a request multicast group identifier. Next, a source tag corresponding to the request source identifier may be obtained and then it may be determined that a group corresponding to the receiver tag is allowed to access content from a source corresponding to the obtained source tag. In response to determining that the group corresponding to the receiver tag is allowed to access content from the source corresponding to the obtained source tag, content may be received from the source at a multicast group corresponding to the request multicast group identifier. The content may then be forwarded to a receiver corresponding to the request.

    Trace Feature Across the Network (Depth & Breadth)-Wise
    75.
    发明申请
    Trace Feature Across the Network (Depth & Breadth)-Wise 有权
    网络上的跟踪功能(深度和宽度)-Wise

    公开(公告)号:US20160269266A1

    公开(公告)日:2016-09-15

    申请号:US14656840

    申请日:2015-03-13

    CPC classification number: H04L43/16 H04L41/0853 H04L43/04 H04L43/10

    Abstract: A feature trace capability may be provided for features including, but not limited to, automatic quality of service (auto QoS), power over Ethernet (PoE), and fabric compatibility. A network command may be implemented with the capability to validate features across a network path or the network as a whole. The output of this network command may result in the display of details about supported features. Such a command may also result in a listing of what devices require upgrades to support any number of features of interest. Embodiments of the feature trace capability may be configured such that the query gets terminated once a final subnet (or endpoint) is reached. Alternatively, the feature trace capability may be configured such that the query gets terminated after a maximum hop count, or trace total (trace_ttl) is reached. Such a limit may prevent the continuous flooding of the network.

    Abstract translation: 可以为特征提供特征追踪功能,包括但不限于自动服务质量(自动QoS),以太网供电(PoE)和结构兼容性。 可以实现网络命令,其具有通过网络路径或网络整体验证特征的能力。 此网络命令的输出可能会显示关于支持的功能的详细信息。 这样的命令还可以列出什么设备需要升级来支持任何数量的感兴趣的特征。 可以配置特征跟踪能力的实施例,使得一旦达到最终子网(或端点),则查询终止。 或者,可以配置特征跟踪能力,使得在达到最大跳数或跟踪总数(trace_ttl)之后,查询终止。 这样的限制可以防止网络的连续洪泛。

    PATH OPTIMIZATION IN MULTI-NODE VIRTUAL SWITCH WITH ORPHAN PORTS
    76.
    发明申请
    PATH OPTIMIZATION IN MULTI-NODE VIRTUAL SWITCH WITH ORPHAN PORTS 有权
    多通道虚拟开关与ORPAN PORTS的路径优化

    公开(公告)号:US20140269329A1

    公开(公告)日:2014-09-18

    申请号:US13839159

    申请日:2013-03-15

    CPC classification number: H04L47/12 H04L45/66 H04L49/70

    Abstract: Embodiments provide techniques for optimizing paths in a network environment with a virtual network device that includes a first physical network device and a second physical network device, connected using a virtual network device layer link. Embodiments receive a first data packet belonging to a first data flow, at the first physical network device, from the second physical network device, over the virtual network device layer link. An adjacent network device from which the second physical network device received the first data packet is determined. Embodiments also determine one or more links connecting the first physical network device and the adjacent network device. A network message is transmitted to the adjacent network device, where the adjacent network device is configured to transmit subsequent data packets from the first data flow to the virtual network device, using only the determined one or more links, responsive to receiving the network message.

    Abstract translation: 实施例提供了利用包括使用虚拟网络设备层链路连接的第一物理网络设备和第二物理网络设备的虚拟网络设备来优化网络环境中的路径的技术。 实施例通过虚拟网络设备层链路从第二物理网络设备接收属于第一物理网络设备的第一数据流的第一数据包。 确定第二物理网络设备从其接收到第一数据分组的相邻网络设备。 实施例还确定连接第一物理网络设备和相邻网络设备的一个或多个链路。 将网络消息发送到相邻网络设备,其中相邻网络设备被配置为仅响应于接收到该网络消息而使用所确定的一个或多个链路,将后续数据分组从第一数据流发送到虚拟网络设备。

    DATA SOVEREIGNTY AND SERVICE INSERTION IN MULTISITE NETWORK FABRIC

    公开(公告)号:US20250126059A1

    公开(公告)日:2025-04-17

    申请号:US18984673

    申请日:2024-12-17

    Abstract: Techniques for a Software-Defined Networking (SDN) controller associated with a multisite network to implement jurisdictional data sovereignty polices in a multisite network, route network traffic flows between user sites and destination services over one or more provider sites, and/or perform a routing operation on the network traffic flow(s) based on the jurisdictional data sovereignty policies. The jurisdictional data sovereignty polices may be implemented using destination group tags (DGTs) and/or source group tags (SGTs). A secure access service edge (SASE) associated with the network controller may generate, store, and distribute the DGTs to provider sites and/or the SGTs to user sites. Based on the SGT and/or DGT associated with a network traffic flow, one or more services may be applied to the network traffic flow, and the network traffic flow may be routed through a particular region of a software-defined access (SDA) transit.

    Hierarchical provisioning of network devices

    公开(公告)号:US12212540B2

    公开(公告)日:2025-01-28

    申请号:US18513320

    申请日:2023-11-17

    Abstract: Automated techniques for converting network devices from a Layer 2 (L2) network into a Layer 3 (L3) network in a hierarchical manner are described herein. The network devices may be configured to boot such that their ports are in an initialization mode in which the ports are unable to transmit locally generated DHCP packets. When a network device detects that a neighbor (or “peer”) device has acquired an IP address or has been configured by a network controller, then the port on which the neighbor device is detected can then be transitioned from the initialization mode into a forwarding mode. In the forwarding mode, the port can be used to transmit packets to obtain an IP address. Thus, the network devices are converted from an L2 device to an L3 device in a hierarchical order such that upstream devices are discovered and converted into L3 devices before downstream devices.

    Cloud delivered access
    80.
    发明授权

    公开(公告)号:US12095765B2

    公开(公告)日:2024-09-17

    申请号:US18163351

    申请日:2023-02-02

    CPC classification number: H04L63/0876 H04L12/4641 H04L63/20

    Abstract: Cloud delivered access may be provided. A network device may provide a client device with a pre-authentication virtual network and a pre-authentication address. Next, a policy may be received in response to the client device authenticating. The client device may then be moved to a post-authentication virtual network based on the policy. A post-authentication address may then be obtained for the client device in response to moving the client device to a post-authentication virtual network. Traffic for the client device may then be translated to the post-authentication address.

Patent Agency Ranking