摘要:
A method for energy efficient configuration of a physical port of a plurality of physical ports of a network device is described herein. One or more physical ports of the plurality of physical ports may be aggregated to a logical port in a logical communication channel between the network device and another device. A configuration of the one or more physical ports is determined. The configuration includes one or more parameters which are monitored. The physical port of the plurality of physical ports is selected and a configuration state of the selected physical port is modified upon detection of an event based on the one or more parameters. The modified configuration state is one of an active port state, an active port state with a limited bandwidth utilization rate, and a standby port state. The selected port is reconfigured according to the modified configuration state.
摘要:
A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device.
摘要:
A method for applying a host security service to a network is described herein. The network may include a host device and a network device. The network device may receive a request for security-based filtering. The request includes filtering parameters that restrict traffic between the host device and the network device. It is determined whether the filtering parameters conflict with an initial filtering configuration. The filtering parameters may be applied to traffic through the network device.
摘要:
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
摘要:
A method of reducing power consumption in a network. A first network device powers down or reduces the port speed of a port if said port is blocked by a loop mitigation protocol.
摘要:
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
摘要:
A method of reducing power consumption in a network. A first network device powers down or reduces the port speed of a port if said port is blocked by a loop mitigation protocol.
摘要:
Embodiments of the device have a plurality of authentication slots for authenticating users, a port configured to receive an authentication request from a user, a memory, a queue maintained in the memory, and a processing engine configured to monitor the port and the authentication slots such that if an authentication request from a user is received and no authentication slots are available, an identifier associated with the user is enqueued on the queue, and wherein if one of the authentication slots is or becomes available and the queue is not empty, an identifier is dequeued from the queue and the associated user is authenticated using one of the available authentication slots.