Patent classifications
H04L12/4641
METHODS AND APPARATUS TO IMPLEMENT A VIRTUAL PRIVATE NETWORK WITH PROBE FOR NETWORK CONNECTIVITY
Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed. An example non-transitory computer readable storage medium is disclosed comprising instructions which, when executed, cause a machine to at least, in response to a first instruction from an operating system to establish a network tunnel, transmit a probe request to a server; and in response to not receiving, from the server, a probe response to the probe request, report that the network tunnel has been established to prevent the operating system from transmitting subsequent instructions to establish the network connection until a response to a probe request is received.
DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS
Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.
VXLAN ACCESS AUTHENTICATION METHOD AND VTEP DEVICE
A VXLAN access authentication method includes: An authentication point device receives a VXLAN authentication packet, where the VXLAN authentication packet is a VXLAN packet. The VXLAN authentication packet includes a VXLAN header and an authentication request sent by a terminal, the VXLAN header includes a first VNI, and the authentication request includes an authentication credential. The authentication point device obtains permission of the terminal or a second VNI based on the authentication credential. The permission of the terminal corresponds to the second VNI. The authentication point device sends the permission of the terminal or the second VNI to a control point device, where the control point device is a device that encapsulates the authentication request into the VXLAN authentication packet. In this application, VXLAN access authentication is performed on an overlay network, so that configuration complexity can be reduced when a VXLAN access authentication mode is modified or created.
TRANSPARENT TCP CONNECTION TUNNELING WITH IP PACKET FILTERING
Described embodiments provide systems and methods for tunneling data packets to a server. A computing device can include a processor and a network interface. The processor is configured to execute a network service, a local application, and a virtual private network (VPN) application. The network service can receive a packet from the local application for transmission via a VPN tunnel, the packet comprising a source address of the computing device and a source port associated with the local application. The network service can determine that the packet matches a first tunnel filter. The network service can encapsulate, responsive to the determination that the packet matches the first tunnel filter, the packet with the header comprising a localhost destination address and a destination port associated with the VPN application. The network service can provide the encapsulated packet to the VPN application.
Systems and methods for extending application-aware routing to improve site encryption throughput performance
In one embodiment, a method includes establishing, by an identity agent installed on a device, a connection to a browser installed on the device and generating, by the identity agent, first device information, a public key, and a private key. The method also includes communicating, by the identity agent, the first device information and the public key to an authentication service and receiving, by the identity agent, a unique identifier from the authentication service. The method further includes generating, by the identity agent, a first signature of the first device information and communicating, by the identity agent, the first signature, the first device information, and the unique identifier to the browser.
Systems and methods for convergence of network traffic after an interruption of a network device's link
Systems and methods are provided herein for a mechanism for faster convergence of network traffic after a network device's link is interrupted by leveraging the withdrawal of the ethernet virtual private network (EVPN) auto discovery (AD) route. This may be accomplished by a first device checking an ethernet segment identifier (ESI) status flag before generating an entry in the first device's forwarding table, where the entry is based on an IP route for a host received by a second network device. In response to receiving a withdrawal of an EVPN AD route from the second device, the first device may update the ESI status flag to indicate that the host on the ethernet segment (ES) is reachable only via the third device and update the entry that was based on the IP route for the host received by the second network device to prevent sending traffic to the host via the second device.
System for managing and controlling mesh virtual private network and method associated therewith
A system for managing and controlling a mesh VPN includes a management computing platform, a control computing platform, teleworker computing subsystems, and an office computing subsystem. The management computing platform provides deployment and management services to an organization for operation of a mesh VPN in a WAN in accordance with a service profile. The mesh VPN includes a hub node and a plurality of end nodes. Each end node communicates with the VPN hub node and with other end nodes via peer-to-peer paths. The control computing platform is the hub node and provide a control service for operation of the mesh VPN based on the service profile. The teleworker and office computing subsystems are end nodes. Various methods for operation of the computing platforms and subsystems in the mesh VPN are also provided.
Techniques for extending a cellular quality of service bearer through an enterprise fabric
Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.
Coordinating inter-region operations in provider network environments
Methods and apparatus for coordinating inter-region operations in provider networks. An inter-region coordinator (IRC) operates asynchronously to the control planes of regional networks to coordinate inter-region operations. The IRC in a region may include one or more IRC servers. To perform inter-region operations, the servers may implement a local-remote-local method in which a server invokes an API in the local region to get work, sends the work to a control plane of a remote region, receives a response from the remote region, and informs the control plane in the local region of the status of the work.
Systems and methods for device communication
Embodiments include a device comprising an interface module for interfacing with proprietary legacy systems. The interface module comprises a data interface for interfacing with a processing component of the legacy system, where the processing component uses a proprietary protocol for processing data of the legacy system. The interface module includes a protocol module that comprises a protocol corresponding to the proprietary protocol of the legacy system, and the interface module uses the protocol to exchange data with the processing component. The interface module includes a communication device that communicates with a remote system via a wireless channel. The interface module controls communications that include passing commands from the remote system to the legacy system, and passing event data of the legacy system to the remote system.