Patent classifications
H04L12/46
METHODS AND SYSTEM FOR FORWARDING PACKETS THROUGH A VIRTUAL PRIVATE NETWORK
The present invention discloses methods and systems for forward packets received from a SSID at a wireless access point to a VPN. The SSID and VPN are associated. The VPN is created according to a VPN profile. When the VPN is established, the SSID is enabled. When the VPN is not established, the SSID is disabled.
ELECTRONIC DEVICE
The present disclosure relates to an electronic device that efficiently configures a network for controlling another electronic device, and the electronic device includes a communication interface; an input interface configured to receive a control command for another electronic device; and a controller configured to control another electronic device in a different manner according to whether connected to the same network as another electronic device.
VEHICLE-MOUNTED UPDATE DEVICE, PROGRAM, AND PROGRAM UPDATE METHOD
Provided is a vehicle-mounted update device for acquiring an update program transmitted from an external server located outside a vehicle, and performing processing for updating a program of a vehicle-mounted ECU mounted in the vehicle, the vehicle-mounted update device including a control unit for controlling transmission of the update program, and a plurality of communication units to which the vehicle-mounted ECU is connected, and when acquiring the update program, the control unit acquires information regarding a communication unit to which a vehicle-mounted ECU to be updated is connected from the external server, and outputs the update program from the communication unit to which the vehicle-mounted ECU to be updated is connected, based on the acquired information regarding the communication unit to which the vehicle-mounted ECU to be updated is connected.
DERIVING PROXY STABILITY WITHOUT NETWORK INSPECTION
Disclosed are systems and methods for a software development architecture enabling users to locally test and develop software, using a multitude of remote devices of their choice. The user can choose the remote devices, including the hardware and software on the remote device. The operator of the architecture can provide error analysis, without substantively inspecting the user's software calls and sensitive data. In some embodiments, traffic routing data is used to detect the source and type of a test session error, without inspecting the payload in the traffic.
APPARATUS AND METHOD FOR ESTABLISHING AND MAINTAINING A DS-LITE TUNNEL
An electronic apparatus for establishing a Dual-Stack Lite (DS-lite) tunnel is provided. The apparatus sends a request for an Internet Protocol (IP) address of a Domain Name System (DNS) server and a domain name of an Address Family Transition Router (AFTR) server to a Dynamic Host Configuration Protocol (DHCP) server using an IP address of the DHCP server, receives the IP address of the DNS server and the domain name of the AFTR server from the DHCP server in response to the request, sends a DNS query including the domain name of the AFTR server to the DNS server using the IP address of the DNS server. In response to the DNS query being successful, the apparatus receives an IP address of the AFTR server from the DNS server, and establishes the DS-lite tunnel between the apparatus and the AFTR server using the IP address of the AFTR server.
APPARATUS AND METHOD FOR ESTABLISHING AND MAINTAINING A DS-LITE TUNNEL
An electronic apparatus for establishing a Dual-Stack Lite (DS-lite) tunnel is provided. The apparatus sends a request for an Internet Protocol (IP) address of a Domain Name System (DNS) server and a domain name of an Address Family Transition Router (AFTR) server to a Dynamic Host Configuration Protocol (DHCP) server using an IP address of the DHCP server, receives the IP address of the DNS server and the domain name of the AFTR server from the DHCP server in response to the request, sends a DNS query including the domain name of the AFTR server to the DNS server using the IP address of the DNS server. In response to the DNS query being successful, the apparatus receives an IP address of the AFTR server from the DNS server, and establishes the DS-lite tunnel between the apparatus and the AFTR server using the IP address of the AFTR server.
Remote access service inspector
A method, system, and computer program product for providing protected remote access from a remote access client to a remote access server over a computer network through a plurality of inspections. A remote access configuration file is created for the remote access client. A digital hash of the configuration file is then generated. The digital hash is compared with a configuration file stored at a predefined web location. If the comparison results in a match between the digital hash and the stored configuration file, a digital hash comparison is performed between an encrypted remote access configuration file and an encrypted configuration file stored at the predefined web location. If the plurality of inspections are passed, the remote access client is released from a quarantine state and a virtual private network (VPN) connection to the remote access server is established.
Database protocol for exchanging forwarding state with hardware switches
Some embodiments provide a set of one or more network controllers that communicates with a wide range of devices, ranging from switches to appliances such as firewalls, load balancers, etc. The set of network controllers communicates with such devices to connect them to its managed virtual networks. The set of network controllers can define each virtual network through software switches and/or software appliances. To extend the control beyond software network elements, some embodiments implement a database server on each dedicated hardware. The set of network controllers accesses the database server to send management data. The hardware then translates the management data to connect to a managed virtual network.
Database protocol for exchanging forwarding state with hardware switches
Some embodiments provide a set of one or more network controllers that communicates with a wide range of devices, ranging from switches to appliances such as firewalls, load balancers, etc. The set of network controllers communicates with such devices to connect them to its managed virtual networks. The set of network controllers can define each virtual network through software switches and/or software appliances. To extend the control beyond software network elements, some embodiments implement a database server on each dedicated hardware. The set of network controllers accesses the database server to send management data. The hardware then translates the management data to connect to a managed virtual network.
Automatic setup of failure detection sessions
For a network with host machines that are hosting virtual machines, a method for facilitating BUM (broadcast, unknown unicast, and multicast) traffic between a hardware switch (e.g., ToR switch) and the host machines is provided. The network has a set of host machines configured as a cluster of replicators for replicating BUM traffic from the hardware switch to the host machines. A set of network controllers establishes failure-detection tunnels for links between the hardware switch and the replicator cluster. The replicator cluster informs the set of controllers of a change in the membership of the replicator cluster to initiate an update to the active failure-detection sessions. The set of network controllers communicates with the replicator cluster and a ToR switch to establish bidirectional forwarding detection (BFD) sessions between one or more replicator nodes in the replicator cluster and the ToR switch.