ROUTE SELECTION USING CUMULATIVE COST
    41.
    发明申请

    公开(公告)号:US20200099608A1

    公开(公告)日:2020-03-26

    申请号:US16536028

    申请日:2019-08-08

    Abstract: Examples include determining a first hop for a preferred route from a networking device to a destination device, calculating a cumulative cost for the preferred route based on a cost of the first hop and an original cost of the preferred route, determining whether a secondary route is available, and, in response to a determination that the secondary route is available, determining a first hop in the secondary route. Examples also include determining a cost of the first hop in the secondary route, determining a new route from the networking device to the destination computing device based on the cumulative cost of the preferred route and the cost of the first hop in the secondary route, and entering the new route into a forwarding data structure of the networking device.

    Establishing a network fault detection session

    公开(公告)号:US10541904B2

    公开(公告)日:2020-01-21

    申请号:US15659908

    申请日:2017-07-26

    Abstract: Examples relate to establishing a network fault detection session. In one example, a routing device may receive a request to initiate a bidirectional forwarding detection (BFD) session with a second routing device; transmit a first echo frame to the second routing device; receive a first response frame; determine that a response time does not meet a response time threshold; in response to the determination, determine that a BFD failure threshold has not been met; after the determination that the BFD failure threshold has not been met, transmit a second echo frame to the second routing device; receive a second response frame; determine whether a second response time meets the BFD response time threshold; and in response to determining that the second response time meets the BFD response time threshold, provide a notification that a BFD session has been established between the routing device and the second routing device.

    MACsec for encrypting tunnel data packets
    43.
    发明申请

    公开(公告)号:US20190173860A1

    公开(公告)日:2019-06-06

    申请号:US15833807

    申请日:2017-12-06

    Abstract: Examples disclosed herein relate to use of MACsec to encrypt tunnel data packets. In an example, a MACsec capable device may receive a data packet from a host device for tunneling to a controller. MACsec capable device may encapsulate the data packet with an encapsulation header to generate an encapsulated data packet. The encapsulation header may comprise a destination MAC address reserved for the controller. MACsec capable device may direct the encapsulated data packet to a MACsec engine. MACsec engine may encrypt the encapsulated data packet with the encryption key to generate an encrypted data packet. MACsec capable device may encapsulate the encrypted data packet with a first GRE header. MACsec capable device may send the encrypted data packet with the first GRE header to the controller via a GRE tunnel.

    ESTABLISHING A NETWORK FAULT DETECTION SESSION

    公开(公告)号:US20180167262A1

    公开(公告)日:2018-06-14

    申请号:US15659908

    申请日:2017-07-26

    Abstract: Examples relate to establishing a network fault detection session. In one example, a routing device may receive a request to initiate a bidirectional forwarding detection (BFD) session with a second routing device; transmit a first echo frame to the second routing device; receive a first response frame; determine that a response time does not meet a response time threshold; in response to the determination, determine that a BFD failure threshold has not been met; after the determination that the BFD failure threshold has not been met, transmit a second echo frame to the second routing device; receive a second response frame; determine whether a second response time meets the BFD response time threshold; and in response to determining that the second response time meets the BFD response time threshold, provide a notification that a BFD session has been established between the routing device and the second routing device.

    Service discovery across tunnel endpoints in overlays

    公开(公告)号:US12284056B2

    公开(公告)日:2025-04-22

    申请号:US18067813

    申请日:2022-12-19

    Abstract: In an example, a network device may receive, from a client device, a multicast query for a service advertised by a host device connected to another network device. The network device is configured as a first Virtual tunnel endpoint (VTEP) and the other network device is configured as a second VTEP in an overlay network. The network device may determine whether a host name, of the host device, corresponding to the service name in the multicast query is present in a resource record. In response to determining that the host name is present in the resource record, the network device may identify, from the resource record, an overlay network path corresponding to the host name. The network device may encapsulate the multicast query based on an overlay encapsulation protocol implemented at the first VTEP and route, the encapsulated multicast query, via the overlay network path, to the host device.

    APPLYING A GROUP BASED POLICY TO NETWORK TRAFFIC FROM A CLIENT

    公开(公告)号:US20240283798A1

    公开(公告)日:2024-08-22

    申请号:US18315269

    申请日:2023-05-10

    CPC classification number: H04L63/104 H04L63/102 H04L63/30

    Abstract: Some examples relate to a proxy service on a network device for applying a group based policy (GBP) to network traffic from a client. In an example, a proxy service on a network device is used to intercept a network access request message, pertaining to a client, from an access device. The proxy service forwards the network access request message to an authentication server. The server responds by sending a network access response message to the access device. The proxy service intercepts the network access response message from the authentication server and obtains the role information of the client from the network access response message. In response to receiving network traffic from the client, the proxy service identifies a GBP corresponding to the role information of the client and applies the GBP to the network traffic from the client.

    SERVICE DISCOVERY ACROSS TUNNEL ENDPOINTS IN OVERLAYS

    公开(公告)号:US20240205048A1

    公开(公告)日:2024-06-20

    申请号:US18067813

    申请日:2022-12-19

    CPC classification number: H04L12/4633 H04L12/185 H04L45/26 H04L45/66

    Abstract: In an example, a network device may receive, from a client device, a multicast query for a service advertised by a host device connected to another network device. The network device is configured as a first Virtual tunnel endpoint (VTEP) and the other network device is configured as a second VTEP in an overlay network. The network device may determine whether a host name, of the host device, corresponding to the service name in the multicast query is present in a resource record. In response to determining that the host name is present in the resource record, the network device may identify, from the resource record, an overlay network path corresponding to the host name. The network device may encapsulate the multicast query based on an overlay encapsulation protocol implemented at the first VTEP and route, the encapsulated multicast query, via the overlay network path, to the host device.

    EFFICIENT TRAFFIC REDIRECTION FOR AN MCLAG FOR CONTROLLED UNAVAILABILITY EVENTS

    公开(公告)号:US20230327981A1

    公开(公告)日:2023-10-12

    申请号:US17719138

    申请日:2022-04-12

    CPC classification number: H04L45/245 H04L45/42 H04L45/22 H04L45/123

    Abstract: A system for facilitating traffic redirection for a multi-chassis link aggregation group (MCLAG) is provided. During operation, the system can participate in an MCLAG using a first interface of a first switch. The MCLAG can also include a second interface of a second switch. Based on predetermined unavailability for the first switch, the system can determine a sequence of applications for a plurality of traffic forwarding configurations. A respective configuration can facilitate loop prevention for traffic forwarded via the MCLAG. The system can then apply the plurality of configurations to the first switch based on the sequence of applications to redirect unicast traffic from the first switch to the second switch. Here, applying a respective configuration can include programming corresponding switch hardware with the configuration. Subsequently, the system can perform a set of operations on the first switch that triggers the predetermined unavailability.

Patent Agency Ranking