-
公开(公告)号:US10560550B1
公开(公告)日:2020-02-11
申请号:US15483542
申请日:2017-04-10
Applicant: Juniper Networks, Inc.
Inventor: Qilin Xue , Weibin Chen , Subbiah Kandasamy , Weimin Ji , Zheng Chang
Abstract: A first network device may establish connectivity with a second network device. The first network device may determine information that identifies a cluster identifier based on establishing connectivity with the second network device. The first network device may compare a first software version of the first network device and a second software version of the second network device. The first network device may selectively obtain and install a system image of the second network device based on comparing the first software version and the second software version. The first network device may receive, from the second network device, configuration information and user session information based on selectively obtaining the system image. The first network device and the second network device may form a high-availability cluster.
-
公开(公告)号:US11706193B2
公开(公告)日:2023-07-18
申请号:US17397848
申请日:2021-08-09
Applicant: Juniper Networks, Inc.
Inventor: Weimin Ji , John E. Drake , Jeffrey M. Haas
IPC: G06F9/00 , G06F15/16 , G06F17/00 , H04L9/40 , H04L41/0668
CPC classification number: H04L63/0209 , H04L41/0668
Abstract: Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.
-
公开(公告)号:US20230037516A1
公开(公告)日:2023-02-09
申请号:US17397848
申请日:2021-08-09
Applicant: Juniper Networks, Inc.
Inventor: Weimin Ji , John E. Drake , Jeffrey M. Haas
Abstract: Example security systems for use between at least one upstream router and at least one downstream router, are described. A group or pool of security devices can be used to provide stateful security to bidirectional packet flows between upstream and downstream routers. The packets of the bidirectional flows are forwarded to particular security devices based on a consistent hash ring process. For a given flow, bidirectional state information is synchronized among some, but not all, of the security devices. The security devices among which such bidirectional flow state information is shared are determined using the same consistent hash ring process.
-
-