Isolation VLAN for layer two access networks
    8.
    发明授权
    Isolation VLAN for layer two access networks 有权
    第二层接入网络的隔离VLAN

    公开(公告)号:US08875233B2

    公开(公告)日:2014-10-28

    申请号:US13361433

    申请日:2012-01-30

    IPC分类号: G06F15/16 H04L29/06 H04L29/12

    摘要: In general, techniques are described for providing an isolation virtual local area network (VLAN) for layer two access networks. A server comprising an interface and a control unit may implement the techniques. The interface receives a message that initiates a request for a layer three (L3) network address for use by a client device via an isolation virtual local area network (VLAN) that supports transmitting data from a network device to the server, where the network device is intermediately positioned between the client device and the server. The message includes a layer two (L2) address associated with the client device. The control unit determines whether to allow the client device to access the network and assigns the L3 network address to the client device based on the determination.

    摘要翻译: 通常,描述了为第二层接入网络提供隔离虚拟局域网(VLAN)的技术。 包括接口和控制单元的服务器可以实现这些技术。 该接口接收消息,该消息通过支持从网络设备向服务器发送数据的隔离虚拟局域网(VLAN),向客户端设备发起对第三层(L3)网络地址的请求供其使用,网络设备 位于客户端设备和服务器之间。 消息包括与客户端设备相关联的第二层(L2)地址。 控制单元确定是否允许客户端设备访问网络,并且基于该确定将L3网络地址分配给客户端设备。

    SECURE DHCP PROCESSING FOR LAYER TWO ACCESS NETWORKS
    10.
    发明申请
    SECURE DHCP PROCESSING FOR LAYER TWO ACCESS NETWORKS 有权
    安全的两个访问网络的DHCP处理

    公开(公告)号:US20110030032A1

    公开(公告)日:2011-02-03

    申请号:US12512239

    申请日:2009-07-30

    IPC分类号: H04L29/06

    摘要: In general, this disclosure describes network security techniques that may accommodate legitimate movement of a subscriber device while preventing MAC collisions that may result from configuration errors or MAC spoofing attempts. MAC spoofing may result in packets directed to one subscriber device being sent instead to another subscriber device. By modifying an access node or a Dynamic Host Configuration Protocol (DHCP) server to allow only authorized subscriber devices on the access network, layer two collisions (“MAC collisions”) may be prevented.

    摘要翻译: 通常,本公开描述了可以适应订户设备的合法移动的网络安全技术,同时防止可能由配置错误或MAC欺骗尝试引起的MAC冲突。 MAC欺骗可能导致指向一个用户设备的分组被发送到另一用户设备。 通过修改接入节点或动态主机配置协议(DHCP)服务器,仅允许接入网络上的授权用户设备,可以防止第二层冲突(“MAC冲突”)。