Metric based dynamic virtual private network (VPN) tunnel between branch gateway devices

    公开(公告)号:US11595231B2

    公开(公告)日:2023-02-28

    申请号:US17237256

    申请日:2021-04-22

    Abstract: Example implementation relates to a method for establishing a dynamic VPN tunnel between branch gateway devices based on metric data. A branch orchestrator receives metric data from VPNC device. The metric data includes data center bandwidth and processor utilization of the VPNC device. The metric data is derived from the traffic being routed via the VPNC device. When the metric data associated with traffic between a first branch gateway device and a second branch gateway device is above a Service Level Agreement (SLA), a dynamic branch to branch VPN tunnel is established to route the traffic between the first branch gateway device and the second branch gateway device. The VPN tunnel between the branch gateways can be teared when the load at the VPNC device reduces.

    SYSTEM AND METHOD OF ESTABLISHING SEAMLESS REMOTE ACCESS VIRTUAL PRIVATE NETWORK CONNECTIONS

    公开(公告)号:US20220321401A1

    公开(公告)日:2022-10-06

    申请号:US17333381

    申请日:2021-05-28

    Abstract: A system and a method of establishing seamless remote access VPN connections are described. For establishment of a VPN connection for a user device, a cluster leader of a cluster of controllers identifies an active controller and a standby controller, based on network load of each controller of the cluster of controllers. An active VPN connection is established between the user device and the active controller and a standby VPN connection is established between the user device and the standby controller. The standby VPN connection is utilized in place of the active VPN connection during failover of the active controller. Because information of an active session is regularly shared by the active controller to the standby controller, the standby controller can seamlessly resume the active session during failover of the active controller.

    DYNAMIC VOICE OVER INTERNET PROTOCOL PROXY FOR NETWORK BANDWIDTH OPTIMIZATION

    公开(公告)号:US20220070229A1

    公开(公告)日:2022-03-03

    申请号:US17223779

    申请日:2021-04-06

    Abstract: Examples include receiving, from a VoIP server, identification information of the virtual meeting and information of a plurality of client devices participating in the virtual meeting, associating each client device of the plurality of client devices to a network device in a set of network devices based on the identification information of the virtual meeting and capabilities of the set of network devices, and creating a proxy agent in each network device in the set. The proxy agent is configured to receive, from the VoIP server, VoIP streaming data of the virtual meeting. Additionally, examples include, configuring the proxy agent to replicate and transmit the VoIP streaming data to the plurality of client devices.

    Intelligent upgrades for network devices

    公开(公告)号:US10778519B2

    公开(公告)日:2020-09-15

    申请号:US16113070

    申请日:2018-08-27

    Abstract: An example of a system may include a controller to monitor network parameters in a wireless local area network (WLAN), the controller may include a processing resource and a memory resource including instructions executable by the processing resource to analyze network parameters in the WLAN over a period of time, determine a threshold for the network parameters, determine a plurality of time intervals based on an upgrade to be applied to the WLAN, identify when the network parameters of the WLAN are below the determined threshold, and initiate the upgrade to the WLAN when the network parameters are below the determined threshold where the upgrade is performed during one of the plurality of time intervals.

    Network Link Failure Detection
    17.
    发明申请

    公开(公告)号:US20200099577A1

    公开(公告)日:2020-03-26

    申请号:US16142085

    申请日:2018-09-26

    Abstract: Some examples relate to detecting network link failure. In an example, a determination may be made at a first network device on a network regarding an average round-trip delay time (RTD) between the first network device and a second network device over a given time interval during a given period of time. Then, for the given time interval, a keepalive packet may be sent from the first network device to the second network device at the average RTD of the given time interval for a keepalive time. In response to a determination, by the first network device that there is no acknowledgement of the keepalive packet from the second network device during the keepalive time, a network link between the first network device and the second network device may be identified as failed.

    Precaching precursor keys within a roaming domain of client devices

    公开(公告)号:US11778467B2

    公开(公告)日:2023-10-03

    申请号:US17513868

    申请日:2021-10-28

    CPC classification number: H04W12/069 H04W8/12 H04W12/088

    Abstract: Examples relate to seamless roaming across subnets. In an example, a system receives an indication that a client device has been authenticated at a first network device of a network. The system receives precursor keys and identification information of the client device, as generated from the authentication of the client device. The system determines second clusters, which are within a roaming domain of the cluster or the client device. The system receives one or more second precursor keys corresponding to the second clusters and distributes the second precursor keys to the corresponding second clusters. The system determines to create one or more tunnels among the second clusters and the cluster and provisions the tunnels to transmit data through the tunnels.

Patent Agency Ranking