Method for energy efficient configuration of ports of a logical communication channel
    1.
    发明授权
    Method for energy efficient configuration of ports of a logical communication channel 有权
    能够高效配置逻辑通信信道端口的方法

    公开(公告)号:US08665748B2

    公开(公告)日:2014-03-04

    申请号:US12753755

    申请日:2010-04-02

    IPC分类号: H04L12/26

    摘要: A method for energy efficient configuration of a physical port of a plurality of physical ports of a network device is described herein. One or more physical ports of the plurality of physical ports may be aggregated to a logical port in a logical communication channel between the network device and another device. A configuration of the one or more physical ports is determined. The configuration includes one or more parameters which are monitored. The physical port of the plurality of physical ports is selected and a configuration state of the selected physical port is modified upon detection of an event based on the one or more parameters. The modified configuration state is one of an active port state, an active port state with a limited bandwidth utilization rate, and a standby port state. The selected port is reconfigured according to the modified configuration state.

    摘要翻译: 本文描述了一种用于网络设备的多个物理端口的物理端口的能量效率配置的方法。 可以将多个物理端口中的一个或多个物理端口聚合到网络设备和另一设备之间的逻辑通信信道中的逻辑端口。 确定一个或多个物理端口的配置。 该配置包括被监视的一个或多个参数。 选择多个物理端口的物理端口,并且基于一个或多个参数检测到事件来修改所选择的物理端口的配置状态。 修改后的配置状态为活动端口状态,带宽利用率有限的活动端口状态和备用端口状态之一。 所选端口根据修改后的配置状态进行重新配置。

    METHOD FOR APPLYING A HOST SECURITY SERVICE TO A NETWORK
    2.
    发明申请
    METHOD FOR APPLYING A HOST SECURITY SERVICE TO A NETWORK 有权
    将网络安全服务应用于网络的方法

    公开(公告)号:US20130031621A1

    公开(公告)日:2013-01-31

    申请号:US13640399

    申请日:2010-04-12

    IPC分类号: G06F21/20

    摘要: A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device.

    摘要翻译: 这里描述了一种将主机安全服务应用于网络的方法。 网络可以包括主机设备和网络设备。 网络设备可以接收基于安全性的过滤的请求。 该请求包括限制主机设备和网络设备之间流量的过滤参数。 确定过滤参数是否与初始过滤配置冲突。 过滤参数可以应用于通过网络设备的流量。

    Implementing a host security service by delegating enforcement to a network device
    3.
    发明授权
    Implementing a host security service by delegating enforcement to a network device 有权
    通过将强制委派给网络设备来实现主机安全服务

    公开(公告)号:US08904514B2

    公开(公告)日:2014-12-02

    申请号:US13640399

    申请日:2010-04-12

    IPC分类号: H04L29/06 G06F17/30

    摘要: A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device.

    摘要翻译: 这里描述了一种将主机安全服务应用于网络的方法。 网络可以包括主机设备和网络设备。 网络设备可以接收基于安全性的过滤的请求。 该请求包括限制主机设备和网络设备之间流量的过滤参数。 确定过滤参数是否与初始过滤配置冲突。 过滤参数可以应用于通过网络设备的流量。

    MANAGING ACCESS TO A NETWORK
    4.
    发明申请
    MANAGING ACCESS TO A NETWORK 有权
    管理对网络的访问

    公开(公告)号:US20140165162A1

    公开(公告)日:2014-06-12

    申请号:US14237096

    申请日:2011-08-26

    IPC分类号: H04L29/06

    摘要: In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.

    摘要翻译: 在管理对网络的访问的方法中,基于MAC的认证操作在确定是否授予用户设备对网络的访问时被实现。 此外,响应于用户被拒绝通过基于MAC的认证操作的访问并被列为活动网络用户的目录中的有效用户,用户能够将用户设备自注册到授权用户的数据库中。 此外,监视活动网络用户的目录以修改与活动网络用户的目录中列出的用户有关的信息,并且响应于确定与至少一个用户列出的用户信息的确定来修改授权用户的数据库 影响授权用户数据库的活跃网络用户目录已被修改。

    Managing access to a network
    6.
    发明授权
    Managing access to a network 有权
    管理对网络的访问

    公开(公告)号:US09584497B2

    公开(公告)日:2017-02-28

    申请号:US14237096

    申请日:2011-08-26

    IPC分类号: G06F15/16 H04L29/06 H04L12/24

    摘要: In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.

    摘要翻译: 在管理对网络的访问的方法中,基于MAC的认证操作在确定是否授予用户设备对网络的访问时被实现。 此外,响应于用户被拒绝通过基于MAC的认证操作的访问并被列为活动网络用户的目录中的有效用户,用户能够将用户设备自注册到授权用户的数据库中。 此外,监视活动网络用户的目录以修改与活动网络用户的目录中列出的用户有关的信息,并且响应于确定与至少一个用户列出的用户信息的确定来修改授权用户的数据库 影响授权用户数据库的活跃网络用户目录已被修改。

    AUTHENTICATION METHODS AND DEVICES
    8.
    发明申请
    AUTHENTICATION METHODS AND DEVICES 审中-公开
    认证方法和设备

    公开(公告)号:US20110107394A1

    公开(公告)日:2011-05-05

    申请号:US12609624

    申请日:2009-10-30

    IPC分类号: G06F17/00

    CPC分类号: H04L63/1458

    摘要: Embodiments of the device have a plurality of authentication slots for authenticating users, a port configured to receive an authentication request from a user, a memory, a queue maintained in the memory, and a processing engine configured to monitor the port and the authentication slots such that if an authentication request from a user is received and no authentication slots are available, an identifier associated with the user is enqueued on the queue, and wherein if one of the authentication slots is or becomes available and the queue is not empty, an identifier is dequeued from the queue and the associated user is authenticated using one of the available authentication slots.

    摘要翻译: 该装置的实施例具有用于认证用户的多个认证时隙,被配置为从用户接收认证请求的端口,存储器,保存在存储器中的队列,以及处理引擎,被配置为监视端口和认证时隙, 如果接收到来自用户的认证请求并且没有认证时隙可用,则与该用户相关联的标识符在队列中排队,并且其中如果一个认证时隙是或可用且队列不为空,则标识符 从队列中出队,并使用可用的认证时隙之一对相关联的用户进行身份验证。