Continuing a media access control security (MACSEC) key agreement (MKA) session upon a network device becoming temporarily unavailable

    公开(公告)号:US12041052B2

    公开(公告)日:2024-07-16

    申请号:US18327408

    申请日:2023-06-01

    CPC classification number: H04L63/10 H04L63/065

    Abstract: A network device may communicate with another network device via a media access control security (MACsec) key agreement (MKA) communication link, wherein an MKA session has been established between the network device and the other network device. The network device may determine that the other network device is unavailable. The network device may cause, based on determining that the other network device is unavailable, an MKA state of the network device to be placed in a paused state. The network device may receive, after causing the MKA state of the network device to be placed in the paused state, a packet from the other network device via the MKA communication link. The network device may determine, based on the packet, that the MKA session has not ended. The network device may continue, based on the MKA session having not ended, the MKA session by reactivating the MKA state.

    PAUSING A MEDIA ACCESS CONTROL SECURITY (MACSEC) KEY AGREEMENT (MKA) PROTOCOL OF AN MKA SESSION USING A FAST HEARTBEAT SESSION

    公开(公告)号:US20230079217A1

    公开(公告)日:2023-03-16

    申请号:US18057781

    申请日:2022-11-22

    Abstract: A network device may establish a media access control security (MACsec) key agreement (MKA) session with another network device via a MACsec communication link; establish a fast heartbeat session via the MACsec communication link, between a first packet processing engine of the network device and a second packet processing engine of the other network device, where the fast heartbeat session is to permit the first packet processing engine and the second packet processing engine to exchange fast heartbeat messages via the fast heartbeat session and the MACsec communication link; place an MKA protocol of the MKA session in a pause state until the first packet processing engine detects a rekey event; determine that a key for the MKA session is to be regenerated based on detection of the rekey event; and perform an action based on the rekey event for the MKA session.

    Continuing a media access control security (MACsec) key agreement (MKA) session upon a network device becoming temporarily unavailable

    公开(公告)号:US11711367B2

    公开(公告)日:2023-07-25

    申请号:US16824028

    申请日:2020-03-19

    CPC classification number: H04L63/10 H04L63/065

    Abstract: A network device may communicate with another network device via a media access control security (MACsec) key agreement (MKA) communication link, wherein an MKA session has been established between the network device and the other network device. The network device may determine that the other network device is unavailable. The network device may cause, based on determining that the other network device is unavailable, an MKA state of the network device to be placed in a paused state. The network device may receive, after causing the MKA state of the network device to be placed in the paused state, a packet from the other network device via the MKA communication link. The network device may determine, based on the packet, that the MKA session has not ended. The network device may continue, based on the MKA session having not ended, the MKA session by reactivating the MKA state.

    Securing end-to-end virtual machine traffic

    公开(公告)号:US10469461B1

    公开(公告)日:2019-11-05

    申请号:US15730356

    申请日:2017-10-11

    Abstract: A device may receive a packet from a first endpoint that is destined for a second endpoint. The first endpoint may be hosted on the device. The device may determine whether a secure session exists between the first endpoint and the second endpoint. The secure session may permit encrypted traffic to be exchanged between the first endpoint and the second endpoint. The device may process the packet using a set of rules after determining whether the secure session exists between the first endpoint and the second endpoint. The device may encrypt the packet using security information associated with the secure session after determining that the secure session exists, or establishing the secure session when the secure session does not exist. The device may provide the packet toward the second endpoint after encrypting the packet.

    Pausing a media access control security (MACsec) key agreement (MKA) protocol of an MKA session using a fast heartbeat session

    公开(公告)号:US11539513B1

    公开(公告)日:2022-12-27

    申请号:US15891089

    申请日:2018-02-07

    Abstract: A network device may establish a media access control security (MACsec) key agreement (MKA) session with another network device via a MACsec communication link; establish a fast heartbeat session via the MACsec communication link, between a first packet processing engine of the network device and a second packet processing engine of the other network device, where the fast heartbeat session is to permit the first packet processing engine and the second packet processing engine to exchange fast heartbeat messages via the fast heartbeat session and the MACsec communication link; place an MKA protocol of the MKA session in a pause state until the first packet processing engine detects a rekey event; determine that a key for the MKA session is to be regenerated based on detection of the rekey event; and perform an action based on the rekey event for the MKA session.

    Securing end-to-end virtual machine traffic

    公开(公告)号:US11115391B2

    公开(公告)日:2021-09-07

    申请号:US16668807

    申请日:2019-10-30

    Abstract: A device may receive a packet from a first endpoint that is destined for a second endpoint. The first endpoint may be hosted on the device. The device may determine whether a secure session exists between the first endpoint and the second endpoint. The secure session may permit encrypted traffic to be exchanged between the first endpoint and the second endpoint. The device may process the packet using a set of rules after determining whether the secure session exists between the first endpoint and the second endpoint. The device may encrypt the packet using security information associated with the secure session after determining that the secure session exists, or establishing the secure session when the secure session does not exist. The device may provide the packet toward the second endpoint after encrypting the packet.

Patent Agency Ranking