Abstract:
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state information in a local session state data store, the load balancer contains a shared hash algorithm, and the computing device contains a connection state manager containing a network session state data store. The computing device includes a topology manager recording connectivity changes of the intrusion prevention systems and accordingly adjusting the shared hash algorithm for the recorded connectivity changes. Using the shared hash algorithm and routing information, a hash value is assigned to received strings. Strings are forwarded an intrusion prevention system based on assigned hash value and processed using stored session state information within the local session state data store and the network session state data store.
Abstract:
A method of locating one or more endpoint connectors of a network cable wherein the network cable includes a first endpoint connector and a second endpoint connector comprises: one or more processors capturing an incoming packet carrying therein a specific identifier, wherein the specific identifier is a specific bit string that has been predefined to trigger an activation of one or more indicating devices located on one or more endpoint connectors on the network cable; determining that the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet carries therein the specific identifier, triggering an activation of a first indicating device indicative of a location of the first endpoint connector.
Abstract:
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state information in a local session state data store, the load balancer contains a shared hash algorithm, and the computing device contains a connection state manager containing a network session state data store. The computing device includes a topology manager recording connectivity changes of the intrusion prevention systems and accordingly adjusting the shared hash algorithm for the recorded connectivity changes. Using the shared hash algorithm and routing information, a hash value is assigned to received strings. Strings are forwarded an intrusion prevention system based on assigned hash value and processed using stored session state information within the local session state data store and the network session state data store.
Abstract:
A method of locating one or more endpoint connectors of a network cable wherein the network cable includes a first endpoint connector and a second endpoint connector comprises: one or more processors capturing an incoming packet carrying therein a specific identifier, wherein the specific identifier is a specific bit string that has been predefined to trigger an activation of one or more indicating devices located on one or more endpoint connectors on the network cable; determining that the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet carries therein the specific identifier, triggering an activation of a first indicating device indicative of a location of the first endpoint connector.
Abstract:
A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.
Abstract:
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state information in a local session state data store, the load balancer contains a shared hash algorithm, and the computing device contains a connection state manager containing a network session state data store. The computing device includes a topology manager recording connectivity changes of the intrusion prevention systems and accordingly adjusting the shared hash algorithm for the recorded connectivity changes. Using the shared hash algorithm and routing information, a hash value is assigned to received strings. Strings are forwarded an intrusion prevention system based on assigned hash value and processed using stored session state information within the local session state data store and the network session state data store.
Abstract:
A security appliance system routing strings of data packets in a high availability environment. The security appliance system contains a plurality of intrusion prevention systems connected to a load balancer and a computing device. Each intrusion prevention system contains stored session state information in a local session state data store, the load balancer contains a shared hash algorithm, and the computing device contains a connection state manager containing a network session state data store. The computing device includes a topology manager recording connectivity changes of the intrusion prevention systems and accordingly adjusting the shared hash algorithm for the recorded connectivity changes. Using the shared hash algorithm and routing information, a hash value is assigned to received strings. Strings are forwarded an intrusion prevention system based on assigned hash value and processed using stored session state information within the local session state data store and the network session state data store.
Abstract:
A method of locating endpoint connectors of a network cable comprises: capturing an incoming packet carrying therein a specific identifier from an echo request instruction; determining whether the incoming packet carries therein the specific identifier; and in response to determining that the incoming packet received carries therein the specific identifier, triggering an indicating device indicative of locations of endpoint connectors of a network cable.