SOFTWARE IMAGE DOWNLOAD SECURITY
    1.
    发明申请

    公开(公告)号:US20200082086A1

    公开(公告)日:2020-03-12

    申请号:US15883038

    申请日:2018-01-29

    Abstract: A software image download security method may include storing an authentic cryptographic hash for an authentic software image at an authentication server, receiving, at the authentication server from a client network device, a candidate cryptographic hash for a candidate software image for which a download request has been received by the client network device, comparing, at the authentication server, the candidate cryptographic hash to the authentic cryptographic hash, and transmitting a result of the comparing to the client network device, wherein the client network device is to not download the candidate software image in response to the candidate cryptographic hash not matching the authentic cryptographic hash.

    EOL NOTIFICATION GENERATION
    2.
    发明申请

    公开(公告)号:US20190068738A1

    公开(公告)日:2019-02-28

    申请号:US16113473

    申请日:2018-08-27

    Abstract: On one example in accordance with the present disclosure, a system may include a processor and a memory storing end of life information. The end of life information may indicate a date when the network device will no longer be supported. The memory may comprise instructions executable by the processor to determine, based on the end of life information, that an end of life threshold has been reached and to generate a notification that the end of life threshold has been reached, wherein the notification includes the date when the network device will no longer be supported. The memory may also comprise instructions executable by the processor to broadcast the notification on a network accessible by the network device.

    FORWARDING DATA BASED ON DATA PATTERNS
    3.
    发明申请

    公开(公告)号:US20190394143A1

    公开(公告)日:2019-12-26

    申请号:US16013570

    申请日:2018-06-20

    Abstract: In some examples, a system determines whether data of a device that communicates with a switch is to be subjected to further inspection based on a data pattern derived based on the data. In response to determining that the data of the device is not to be subjected to the further inspection, the system causes forwarding, based on forwarding information accessible by the switch, of the data along a path to a recipient. In response to determining that the data of the device is to be subjected to the further inspection, the system causes forwarding of the data by the switch to a controller that applies the further inspection.

    Disabling MAC Address Aging Time for an Internet of Things (IoT) Device on a Network Switch

    公开(公告)号:US20190089704A1

    公开(公告)日:2019-03-21

    申请号:US16112669

    申请日:2018-08-25

    Abstract: Examples described relate to disabling of MAC address aging time for an IoT device on a network switch. In an example, in response to a device joining a network, a network switch in the network may determine a media access control (MAC) address of the device. The network switch may then send the MAC address to an authentication server. In response, the network switch may receive a Vendor Specific Attribute (VSA) associated with the MAC address from the authentication server. The VSA indicates that the MAC address relates to an IoT device. Based on the VSA, the network switch may recognize the MAC address of the device as a MAC address of the IoT device. In response to recognizing, the network switch may disable MAC address aging time for the MAC address of the IoT device on the network switch.

    Provisioning a new network device in a stack

    公开(公告)号:US10768992B2

    公开(公告)日:2020-09-08

    申请号:US15865972

    申请日:2018-01-09

    Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.

    Provisioning a Network Device in a Stack
    7.
    发明申请

    公开(公告)号:US20190213047A1

    公开(公告)日:2019-07-11

    申请号:US15865972

    申请日:2018-01-09

    Abstract: Examples disclosed herein relate to provisioning a network device in a stack. In an example, a master network device in a stack may detect a new network device in the stack. In response to detecting, master network device may determine whether a member network device of the stack is missing. In response to determining that the member network device of the stack is missing, master network device may identify each active adjacent member of the member network device. The master network device may determine whether each active adjacent member of the member network device has detected the new network device in the stack. In response to determining that each active adjacent member of the member network device has detected the new network device in the stack, master network device may provision the new network device with a member ID of the member network device to the stack.

Patent Agency Ranking