Abstract:
A monitoring apparatus holds extracted information including: extracted data from first communication between a proxy and a first network and from second communication between the proxy and a second network; and reception times of a target data, wherein the extracted data includes kinds of communication, sources and destinations of the target data in the first communication, and the sources in the second network and the destinations in the first network after the target data is relayed by the proxy in the second communication, the monitoring apparatus: for first extracted data of first kind of communication in the first communication, acquires second extracted data in the second communication whose reception time is coincidental time zone of the reception time of the first extracted data; and determines whether communication using the target data from which the acquired second extracted data is extracted is included in a series of end-to-end communication.
Abstract:
A packet relay apparatus, which is configured to transmit from a mirror port a mirror packet copied from one of a packet to be received and a packet to be transmitted, the packet relay apparatus comprising: a packet receiving module configured to receive a packet from an input port; a security judgment module configured to judge whether or not the packet is possibly one of an attack and an attack sign; a mirror processing module configured to generate, when it is judged that the packet is possibly one of an attack and an attack sign, a replica of the packet as the mirror packet; and a transmitting module configured to transmit the mirror packet from the mirror port.
Abstract:
A transfer device includes: first and second ports connected to L3 and L2 networks, respectively; a storage unit that stores data processing information which brings a MAC address of a communication device in the L2 network into correspondence with information regarding processing of data, and address information which brings an IP address of the communication device in the L2 network into correspondence with the MAC address thereof; and a transfer unit that, upon receiving data addressed to the communication device in the L2 network through the first port, searches the address information with an IP address in the data to acquire a MAC address corresponding to the IP address, searches the data processing information with the acquired MAC address, and depending on a search result, controls whether to transfer the data through the first port based on information regarding processing of data corresponding to the acquired MAC address.
Abstract:
A network device is configured to: detect a virtual network that is unable to relay communication as a failed virtual network; identify, as a failed virtual network identifier, a virtual network identifier assigned to a combination of the failed virtual network and a physical port through which communication of the failed virtual network pass, based on mapping information; identify a first virtual tunnel end point that relays communication of the failed virtual network; identify a second virtual tunnel end point of another network device that communicates with the first virtual tunnel end point based on the tunnel information; and send, to the second virtual tunnel end point, a clear request including the failed virtual network identifier and an IP address of the first virtual tunnel end point, and the clear request being used for clearing a MAC address used in Layer 2 protocol.
Abstract:
A virtual tunnel endpoint that makes a communication of a specific tenant is separated from virtual tunnel endpoints that make communications of the other tenants. A forwarding route from the virtual tunnel endpoint that makes a communication of the specific tenant is separated from a forwarding route from the virtual tunnel endpoints that make communications of the other tenants. Accordingly, a communication of the specific tenant is forwarded with priority.
Abstract:
Network switching arrangements including: setting an operation mode of a target switching block to a operation mode that is different from an operation mode of a first switching block while the first switching block is handling a switching process, the target switching block being one switching block selected from second switching blocks; performing a switchover process including starting the switching process using the target switching block instead of the first switching block, after completion of setting the operation mode of the target switching block; and copying the switching information held by the first switching block to the target switching block, prior to starting the switching process using the target switching block, after completion of setting the operation mode of the target switching block.
Abstract:
A system manager sets a port connected to a specific device (for example, a router device) among a plurality of ports of a switch device as a reliable port. If a packet is received in the reliable port, the switch device manages an IP address and a MAC address of the router device by a reliable port information table. When a packet is received from a port not set as the reliable port, the switch device refers to the reliable port information table. At this time, when the received packet is an address resolution packet having impersonated a router device, the switch device discards the packet without transmitting the packet, thereby preventing a cyber attack on a terminal.
Abstract:
The communication apparatus includes: a first circuit board unit including, on a front surface of the communication apparatus, a port for transmitting and receiving data to and from the network; a second circuit board unit including a plurality of first connectors connected to at least one of the first circuit board units, a second connector being capable of accommodating at least a bandwidth accommodated by the plurality of first circuit board units, and being connected, via a cable, to the other communication apparatus of a standby system; and a cross bar switch for selectively outputting data to the first connectors or the second connector as a data output destination, and a ventilation control unit for controlling a flow of air flowing between each of the first circuit board unit and the second circuit board unit, and outside of the communication apparatus.
Abstract:
A Provider Edge PE3 replicates a received packet and relays these to virtual circuits VC1, VC2 respectively, and Provider Edges PE2, PE2 respectively receive the packets from the virtual circuits VC1, VC2, whereupon the Provider Edges PE2, PE2, on the basis of an agreement between them, decide to handle the received packets such that one of the first edges relays the packet to a Customer Edge CE1 for forwarding to a Host A, while the other edge discards the packet without relaying it to the Customer Edge CE1.
Abstract:
To detect a failure in each processor core appropriately. It is provided a network apparatus for transferring a packet, comprising: a control unit; and a network processor including a plurality of processor cores, each configured to perform a process of transferring a packet input over a network. The control unit being configured to: transmit a packet to the network processor; acquire a packet processing status of each of the plurality of processor cores; and monitor a status of the each of the plurality of processor cores based on the acquired packet processing status.