Abstract:
Techniques for configuring a virtual network device are provided. Embodiments identify a network device profile specifying a virtual link teaming domain. Upon receiving a network message advertising the virtual link teaming domain from a peer network device of the two or more network devices, on a plurality of links of the first network device, the plurality of links are teamed, based on the virtual link teaming domain, to create a first link bundle. Embodiments advertise a virtual link teaming identifier to a neighboring network device of the first network device. Here, the neighboring network device is configured to use the virtual link teaming identifier to bundle links between the neighboring network device and the virtual network device.
Abstract:
Techniques for configuring a virtual network device are provided. Embodiments identify a network device profile specifying a virtual link teaming domain. Upon receiving a network message advertising the virtual link teaming domain from a peer network device of the two or more network devices, on a plurality of links of the first network device, the plurality of links are teamed, based on the virtual link teaming domain, to create a first link bundle. Embodiments advertise a virtual link teaming identifier to a neighboring network device of the first network device. Here, the neighboring network device is configured to use the virtual link teaming identifier to bundle links between the neighboring network device and the virtual network device.
Abstract:
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation request is received. It is determined that a master key can not be obtained from another cryptographic node in the data center. A master key is generated. The master key is included in a key hierarchy used to encrypt a data center key object, the data center key object corresponding to a data block maintained in a storage area network (SAN), where the data center key object includes a unique identifier, an encrypted key, and a wrapper unique identifier. The master key is split into N shares, with M shares required to recreate the master key, wherein M is less than N. The N shares are distributed to different entities.
Abstract:
A method of one example embodiment includes receiving at a first network element a packet from a host local to the first network element destined for a remote host; determining that a subnet of the remote host is not instantiated on the first network element; originating a discovery request to discover the remote host, wherein the discovery request is originated in a Virtual Routing Forwarding instance (“VRF”) and identifies the subnet to which the remote host belongs; and broadcasting the discovery request to network elements comprising the VRF. The method may further include, upon receipt of the discovery request, determining whether the identified subnet is configured locally on the second network element and if not, dropping the discovery request; otherwise, rewriting the discovery request to include to an anycast IP address of the remote host's subnet and forwarding the rewritten request.
Abstract:
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation request is received. It is determined that a master key can not be obtained from another cryptographic node in the data center. A master key is generated. The master key is included in a key hierarchy used to encrypt a data center key object, the data center key object corresponding to a data block maintained in a storage area network (SAN), where the data center key object includes a unique identifier, an encrypted key, and a wrapper unique identifier. The master key is split into N shares, with M shares required to recreate the master key, wherein M is less than N. The N shares are distributed to different entities.