摘要:
Techniques are described which facilitate multi-destination forwarding in a Layer 2 Multipath (L2MP) network which includes an emulated switch. The emulated switch may correspond to two or more underlying peer link switches in the L2MP network, in which each of the peer link switches is linked to a Classical Ethernet (CE) switch over a virtual port channel (vPC). Traffic received by one of the peer link switches over the vPC is automatically forwarded to the other peer link switch (or switches). Multi-destination frames originating from the L2MP network addressed to hosts within the CE network are sent over only one of the peer link switches.
摘要:
A method and apparatus for secure storage of data by using redundant keys is provided. The method includes encrypting a data set by using a master key, which can be encrypted by different sync keys. Sync keys can be generated by different supervisor cards. Thereafter, the encrypted master key and the encrypted data set can be stored in a memory. Further, credentials stored in one of the supervisor cards can be encrypted and transferred to other supervisor cards, to provide redundancy of supervisor cards.
摘要:
An example method is provided and includes receiving a data message from a first virtual local area network; determining at an edge switch-router of a Layer-2 network whether the message should be routed; and routing the message in the Layer-2 network at the edge switch-router if the message should be routed. The method also includes switching the message at the edge switch-router if the message should not be routed.
摘要:
Methods and apparatus are provided for authenticating an iSCSI initiator connected to a fiber channel storage area network. An iSCSI initiator performs an authentication exchange with a fiber channel target such as a fiber channel host or disk array through one or more fiber channel switches. Authentication information such as password information no longer is required at fiber channel switches and can instead be aggregated at fiber channel targets.
摘要:
In one embodiment, a method includes assigning at a switch in a layer 2 multipath network, costs to a link in the network, each of the link costs associated with a different graph for forwarding traffic in the network, transmitting the link costs to other switches in the layer 2 multipath network, and receiving and forwarding traffic according to one of the graphs. An apparatus is also disclosed.
摘要:
In one embodiment, apparatus and methods for a rekey process are disclosed. In certain rekey embodiments, when a key-generation protocol exchange is executed, instead of generating a single new security relationship, such as a Security Association or SA, a multiple set (e.g., 10) of new security relationships (e.g., SAs) are generated. An authorized device can then individually use these security relationships (e.g., SAs) as needed to securely communicate with each other. For example, a set of SAs can be efficiently programmed into an 802.1ae protocol ASIC for handling transmitted and received data packets. In the description herein, embodiments of the invention are described with respect to SA's, and this “SA” term is generally defined as any type of security relation that can be formed to allow a particular node to securely transmit packets or frames to another receiving node.
摘要:
An example method is provided and includes receiving a data message from a first virtual local area network; determining at an edge switch-router of a Layer-2 network whether the message should be routed; and routing the message in the Layer-2 network at the edge switch-router if the message should be routed. The method also includes switching the message at the edge switch-router if the message should not be routed.
摘要:
Techniques are described which facilitate multi-destination forwarding in a Layer 2 Multipath (L2MP) network which includes an emulated switch. The emulated switch may correspond to two or more underlying peer link switches in the L2MP network, in which each of the peer link switches is linked to a Classical Ethernet (CE) switch over a virtual port channel (vPC). Traffic received by one of the peer link switches over the vPC is automatically forwarded to the other peer link switch (or switches). Multi-destination frames originating from the L2MP network addressed to hosts within the CE network are sent over only one of the peer link switches.
摘要:
Techniques are provided for two peer edge switches in an edge switch cluster of a first data center site to actively provide traffic flow redundancy in an active-active configuration and provide multi-homing support over an overlay transport virtualization (OTV) protocol. Information is stored indicating a media access control (MAC) address of at least one endpoint device at the first site. An edge switch in the edge switch cluster at the first site sends via an OTV protocol a Layer-3 message that is configured to advertise the MAC address of the at least one endpoint at the first site to enable at least one edge switch at a second site to perform multipath routing to the endpoint device at the first site based on each of the edge switches in the edge switch cluster at the first site.
摘要:
A method measures a resident delay for each port in a node in a network and a peer delay between each pair of neighbor nodes in the network. From these resident delays and peer delays, latency between each pair of neighbor nodes in the network is determined. The method includes weighting a route for a data packet going through the nodes in the network using the determined latencies. Each node includes a switch having switchable connections and is configured by a controller to send probe packets from an output port to a port in a neighbor node. The packet may include a time stamp and an identifier.