Wireless client onboarding and segmentation

    公开(公告)号:US11140043B2

    公开(公告)日:2021-10-05

    申请号:US16576387

    申请日:2019-09-19

    Abstract: A method is provided in a wireless local area network controller in a wireless communication network. The wireless communication network includes one or more virtual networks identified with virtual network IDs, VNIDs. A request is received from a wireless client to onboard onto the network and the wireless client is mapped to an onboarding VNID. The onboarding VNID is associated with an onboarding virtual network that does not require an authentication of the wireless client. An Internet Protocol address assignment is forwarded to the wireless client. The wireless client is remapped from the onboarding VNID to the destination VNID after authenticating the wireless client. The wireless client maintains the assigned IP address after moving from the onboarding VNID to the destination VNID. Access to the wireless client on a virtual network identified by the destination VNID is provided via the assigned IP address.

    SAMPLED DETERMINISTIC FINITE AUTOMATA FOR DEEP PACKET INSPECTION
    57.
    发明申请
    SAMPLED DETERMINISTIC FINITE AUTOMATA FOR DEEP PACKET INSPECTION 有权
    用于深层包装检查的采样确定性有限自动机

    公开(公告)号:US20150172159A1

    公开(公告)日:2015-06-18

    申请号:US14109590

    申请日:2013-12-17

    CPC classification number: H04L63/1408 G06F9/4498

    Abstract: In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite automata (DFA) to identify matches between a set of regular expressions and the text. The sampled DFA is created with the regular expressions sampled at a sampling rate calculated for the regular expressions using operations including selecting a minimum sampling rate from sampling rates computed for each of the regular expressions based on a minimum length of the text that can match the regular expression. An apparatus and logic are also disclosed herein.

    Abstract translation: 在一个实施例中,一种方法包括在网络设备处接收的分组中对文本进行采样,并使用采样的确定性有限自动机(DFA)分析采样的文本,以识别一组正则表达式和文本之间的匹配。 采用采样的DFA进行创建,其中采用以正则表达式计算的采样率采样的正则表达式,其中包括从基于最大长度的文本中选择最小采样率,该采样率基于每个正则表达式计算的采样率, 表达。 本文还公开了一种装置和逻辑。

    Systems and Methods to Dynamically Reprovision Network Devices in a Predefined Area

    公开(公告)号:US20250039040A1

    公开(公告)日:2025-01-30

    申请号:US18623438

    申请日:2024-04-01

    Abstract: A system and a method to dynamically reprovision network devices may include a first network device configured to reprovision a second network device in accordance with a specific location of the second network device in a predefined area. The first network device may be configured to sense the second device at the specific location in the predefined area, identify reprovisioning parameters associated with the specific location, and provide the reprovisioning parameters to the second network device. In turn, the second network device may be configured to perform one or more roles associated with the specific location in the predefined area based at least in part upon information in the reprovisioning parameters.

    Identifying rogue wireless devices using MAC address rotation techniques

    公开(公告)号:US12192770B2

    公开(公告)日:2025-01-07

    申请号:US17731689

    申请日:2022-04-28

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

Patent Agency Ranking