摘要:
A routing table lookup algorithm is described that, for a first outbound packet, performs a first route lookup into the routing table with a first search key that includes the first packet's destination address and a first network interface identifier, and, for a second outbound packet, performs a second route lookup into the routing table with a second search key that includes the second outbound packet's destination address but does not include any network interface identifier.
摘要:
A method is described that involves, in view of a first default entry for a first subnet that is reachable through a first network service, where the first default entry has a numeric destination value, and in view of a second default entry for a second subnet that is reachable through a second network service, wherein the second default entry has the numeric destination value, sorting the first and second default entries by deciding that the first network service is ranked higher than the second network service. The method further involves configuring the first default entry within a routing table to have the numeric destination and not an interface component within the first default entry's search term, and, configuring the second default entry within the routing table to have the numeric destination and the second network service's interface component within the second default entry's search term.
摘要:
A method is described that involves associating an outbound packet with a first network interface and constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function where the routing function identifies the outbound packet's next hop address. The method also involves transmitting the outbound packet to a node identified by the next hop address from the first network interface.
摘要:
A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating.
摘要:
One embodiment of the present invention provides a system that wakes up a sleeping target system located on a target LAN (Local Area Network) from a remote system located on a remote LAN. Note that, since the sleeping target system is in a sleep state, it receives packets of a lower-layer protocol which cannot be used by the remote system to directly send packets to the sleeping target system. During operation, the remote system creates a wake-up packet. The remote system then uses a second protocol to send the wake-up packet to a relay agent located on the target LAN. Note that using the upper-layer protocol enables the remote system to communicate with the relay agent even though they are on different LANs. Upon receiving the first wake-up packet, the relay agent uses the lower-layer protocol to send a second wake-up packet to the sleeping target system, which causes the sleeping target system to wake up. Recall that the remote system cannot use the lower-layer protocol to send a wake-up packet directly to the sleeping target system because the remote system and the sleeping target system are on different LANs. The remote system overcomes this limitation by first sending a wake-up packet to the relay agent using the upper-layer protocol, which causes the relay agent to send another wake-up packet to the sleeping target system using the lower-layer protocol.
摘要:
A method is described that involves associating an outbound packet with a first network interface and constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function where the routing function identifies the outbound packet's next hop address. The method also involves transmitting the outbound packet to a node identified by the next hop address from the first network interface.
摘要:
A method for configuring a device includes receiving a first configuration profile comprising a first configuration and a first certificate and a second certificate, verifying the first configuration profile with the first certificate, receiving a user input indicating to accept the first configuration profile, configuring the device according to the first configuration, receiving a second configuration profile comprising a second configuration, verifying the second configuration profile with the second certificate and updating the device according to the second configuration, wherein the user is unaware of the updating.
摘要:
A method is described that involves associating an outbound packet with a first network interface and constructing a search key from an identifier of the first network interface and the outbound packet's destination address. The method further entails submitting the search key to a routing function where the routing function identifies the outbound packet's next hop address. The method also involves transmitting the outbound packet to a node identified by the next hop address from the first network interface.
摘要:
Systems and methods relating to managing network addresses. In one implementation, a method is provided. The method includes sending a first request to use a particular network address, sending one or more second requests for respective hardware addresses corresponding to network addresses of one or more network address leases. When a hardware address corresponding to a particular network address lease is received in response to one of the one or more second requests and an acknowledgement of the first request to use the network address is not received determining whether the network address identified by the lease is the same as the network address in the first request, and when the network address is not the same, sending a third request to use the identified network address corresponding to the lease.
摘要:
Systems and methods relating to managing network addresses. In one implementation, a method is provided. The method includes sending a first request to use a particular network address, sending one or more second requests for respective hardware addresses corresponding to network addresses of one or more network address leases. When a hardware address corresponding to a particular network address lease is received in response to one of the one or more second requests and an acknowledgement of the first request to use the network address is not received determining whether the network address identified by the lease is the same as the network address in the first request, and when the network address is not the same, sending a third request to use the identified network address corresponding to the lease.