Abstract:
An access point (AP) operates in a network of APs, each configured with a distinct IP address with which to communicate with a wide area network (WAN), and each configured to connect wirelessly with wireless client devices seeking access to the WAN via the each AP. The AP derives, based on the distinct IP address, a standalone pool of IP addresses for assignment to wireless client devices, such that the IP addresses do not overlap with IP addresses of any other standalone pool of IP addresses derived by any other of the APs; The AP operates in a standalone mode to: receive from wireless client devices connecting with the AP respective requests for IP addresses for use by the wireless client devices; and responsive to each request, dynamically assign to the wireless client device that sent the request a respective IP address from the standalone pool of IP addresses.
Abstract:
An access point (AP) operates in a network of APs, each configured with a distinct IP address with which to communicate with a wide area network (WAN), and each configured to connect wirelessly with wireless client devices seeking access to the WAN via the each AP. The AP derives, based on the distinct IP address, a standalone pool of IP addresses for assignment to wireless client devices, such that the IP addresses do not overlap with IP addresses of any other standalone pool of IP addresses derived by any other of the APs; The AP operates in a standalone mode to: receive from wireless client devices connecting with the AP respective requests for IP addresses for use by the wireless client devices; and responsive to each request, dynamically assign to the wireless client device that sent the request a respective IP address from the standalone pool of IP addresses.
Abstract:
Multi-destination frames in a network fabric may be carried in IP multicast packets. As such, the network fabric may us IP multicast technique such as a PIM protocol for handling the multi-destination frames. To provide redundancy, the system administrator can use phantom rendezvous points (RPs) that include multiple physical RPs where one of the RPs serves as a primary RP and the other RPs serve as secondary RPs (e.g., backup RPs). Instead of the system administrator manually configuring the phantom RPs, the RPs are automatically configured. To do so, the system administrator may use a GUI to provide multicast groups allocated for the multi-destination traffic, the number of desired phantom RPs (or physical RPs), and the desired RP redundancy. Based on these parameters, a data center manager generates one or more templates that automatically configure the network devices in the fabric as they are booted.
Abstract:
A method is provided in one example embodiment and includes acquiring at a local network element information regarding a remote network element via a control protocol distribution method and refraining from instantiating the remote VTEP for the remote network element on the local network element until unicast traffic from the local network element to the remote network element via an overlay network has begun. The method may further include detecting unicast traffic from the local network element to the remote network element and subsequent to the detecting, instantiating the remote VTEP for the remote network element on the local network element. Some embodiments may include detecting cessation of the unicast traffic from the local network element to the remote network element and subsequent to the detecting cessation, uninstantiating the remote VTEP for the remote network element from the local network element.
Abstract:
Coexistence and migration of legacy and VXLAN networks may be provided. A first anchor leaf switch and a second anchor leaf switch may detect that they can reach each other over a Virtual Extensible Local Area Network (VXLAN) overlay layer 2 network. In response to detecting that they can reach each other over the VXLAN, the second anchor leaf switch may block VLANs mapped to the VXLAN's VXLAN Network Identifier (VNI) on the second anchor leaf switch's ports connecting to spine routers. In addition, the first anchor leaf switch and the second anchor leaf switch may detect that they can reach each other over a physical layer 2 network. In response to detecting that they can reach each other over a physical layer 2 network, the second anchor leaf switch may block Virtual Extensible Local Area Network (VXLAN) segments at the second anchor leaf switch.
Abstract:
Coexistence and migration of legacy and VXLAN networks may be provided. A first anchor leaf switch and a second anchor leaf switch may detect that they can reach each other over a Virtual Extensible Local Area Network (VXLAN) overlay layer 2 network. In response to detecting that they can reach each other over the VXLAN, the second anchor leaf switch may block VLANs mapped to the VXLAN's VXLAN Network Identifier (VNI) on the second anchor leaf switch's ports connecting to spine routers. In addition, the first anchor leaf switch and the second anchor leaf switch may detect that they can reach each other over a physical layer 2 network. In response to detecting that they can reach each other over a physical layer 2 network, the second anchor leaf switch may block Virtual Extensible Local Area Network (VXLAN) segments at the second anchor leaf switch.
Abstract:
A method is provided in one example embodiment and includes acquiring at a local network element information regarding a remote network element via a control protocol distribution method and refraining from instantiating the remote VTEP for the remote network element on the local network element until unicast traffic from the local network element to the remote network element via an overlay network has begun. The method may further include detecting unicast traffic from the local network element to the remote network element and subsequent to the detecting, instantiating the remote VTEP for the remote network element on the local network element. Some embodiments may include detecting cessation of the unicast traffic from the local network element to the remote network element and subsequent to the detecting cessation, uninstantiating the remote VTEP for the remote network element from the local network element.