摘要:
An edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device.
摘要:
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
摘要:
A method is provided that includes receiving a communication from a trusted device indicating that a device to be provisioned has been added to the network; obtaining identifying information of the device to be provisioned; accessing a stored configuration for the device based on the identifying information; and transmitting the configuration to the device for provisioning. Alternatively, a computer-readable medium is provided that stores instructions to perform a method to transmit a discovery communication to a trusted device, receive a communication originating at an administrative device including a configuration; and provision the device via reboot with the configuration. Alternatively, an apparatus is provided including a table of provisioning configurations, the table including a configuration for a device to be provisioned in a network and a provisioning module to retrieve the configuration of the device stored in the table of provisioning configurations based on identifying information received from a discovery communication.
摘要:
A method and system for monitoring a characteristic relating to real-time network health are described. The method includes detecting a functionality attribute of a service application accessed with a server of the network. Networking devices of the network are interrogated in relation to an operational status thereof. The real-time network health characteristic is inferred from the functionality attribute and/or the operational status detected.
摘要:
A method and system for monitoring a characteristic relating to real-time network health are described. The method includes detecting a functionality attribute of a service application accessed with a server of the network. Networking devices of the network are interrogated in relation to an operational status thereof. The real-time network health characteristic is inferred from the functionality attribute and/or the operational status detected.
摘要:
In some embodiments, in a registration process where a user device is registering for access to a network, a public/private key pair may be generated based on a media access control (MAC) address of a user device. The generated public/private key pair may be transmitted to the user device for future access to the network. In some embodiments, where a user device is requesting access to a network, a MAC address embedded in a public key may be utilized to determine whether access to the network should be granted.
摘要:
Example embodiments disclosed herein relate to authentication based on Media Access Control (MAC) addresses. A network security device receives one or more client identity databases from one or more edge network devices. The client identity databases include MAC addresses of clients and secondary identification information for each of the clients. The network security device determines that a client device has been connected to one of the edge devices. A security action is performed based on whether the MAC address and respective secondary identification information of one of the clients matches the MAC address and respective secondary identification information of the connected client device.
摘要:
Connection profiles are created and stored. The connection profiles are for connections for sources to connect to a network. The connection profiles identify network attributes for the connections and each connection profile includes a status of available or subscribed. A connection profile is assigned to a requested connection for a source. The network attributes for the assigned connection are sent to an edge switch for the source to configure the edge switch to accept traffic for the source.
摘要:
Connections for sources to connect to a network are managed by storing connection profiles identifying network attributes for the connections. Each connection profile includes a status of available or subscribed. Requests for connections are received. If a stored connection profile is available that matches the request, the connection for the matching connection profile is assigned to the source.
摘要:
Within a network, which includes hubs and bridges, the relative location of a first device with respect to a subset of hubs on the network is determined. In response to an instruction, the first device broadcasts a multicast packet. The multicast packet crosses bridges and is processed only by hubs. When a hub receives the multicast packet from the first device, the hub records a first port of the hub over which the second device received the multicast packet. The subset of hubs may then be interrogated to determine over which port of each of the subset of hubs the multicast packet was received.