WO2004075509A1 - Method and apparatus for enforcing security groups for vlans - Google Patents
Method and apparatus for enforcing security groups for vlans Download PDFInfo
- Publication number
- WO2004075509A1 WO2004075509A1 PCT/US2004/002771 US2004002771W WO2004075509A1 WO 2004075509 A1 WO2004075509 A1 WO 2004075509A1 US 2004002771 W US2004002771 W US 2004002771W WO 2004075509 A1 WO2004075509 A1 WO 2004075509A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security group
- packet
- security
- tag
- field
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4645—Details on frame tagging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2004214281A AU2004214281B2 (en) | 2003-02-13 | 2004-01-30 | Method and apparatus for enforcing security groups for VLANs |
EP04707069.3A EP1593251B1 (en) | 2003-02-13 | 2004-01-30 | Method and apparatus for enforcing security groups for vlans |
CN200480004038.0A CN1748401B (en) | 2003-02-13 | 2004-01-30 | Method and apparatus for enforcing security groups for vlans |
CA2515510A CA2515510C (en) | 2003-02-13 | 2004-01-30 | Method and apparatus for enforcing security groups for vlans |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/367,341 | 2003-02-13 | ||
US10/367,341 US7567510B2 (en) | 2003-02-13 | 2003-02-13 | Security groups |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004075509A1 true WO2004075509A1 (en) | 2004-09-02 |
Family
ID=32849963
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/002771 WO2004075509A1 (en) | 2003-02-13 | 2004-01-30 | Method and apparatus for enforcing security groups for vlans |
Country Status (6)
Country | Link |
---|---|
US (2) | US7567510B2 (en) |
EP (1) | EP1593251B1 (en) |
CN (1) | CN1748401B (en) |
AU (1) | AU2004214281B2 (en) |
CA (1) | CA2515510C (en) |
WO (1) | WO2004075509A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2421398A (en) * | 2004-12-16 | 2006-06-21 | Samsung Electronics Co Ltd | Routing a VoIP call based on a service class of a subscriber |
US7716472B2 (en) | 2005-12-29 | 2010-05-11 | Bsecure Technologies, Inc. | Method and system for transparent bridging and bi-directional management of network data |
US7778999B1 (en) | 2003-01-24 | 2010-08-17 | Bsecure Technologies, Inc. | Systems and methods for multi-layered packet filtering and remote management of network devices |
WO2010132061A1 (en) | 2009-05-15 | 2010-11-18 | Hewlett-Packard Development Company, L. P. | A method and apparatus for policy enforcement using a tag |
US8091115B2 (en) | 2008-10-03 | 2012-01-03 | Microsoft Corporation | Device-side inline pattern matching and policy enforcement |
EP3706374B1 (en) | 2006-08-22 | 2022-08-24 | Mala Technologies Ltd. | Point-to-multipoint functionality in a bridged network |
Families Citing this family (107)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8910241B2 (en) | 2002-04-25 | 2014-12-09 | Citrix Systems, Inc. | Computer security system |
US7277546B2 (en) * | 2003-04-09 | 2007-10-02 | New Jersey Institute Of Technology | Methods and apparatus for multi-level dynamic security system |
US7523485B1 (en) | 2003-05-21 | 2009-04-21 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US7516487B1 (en) | 2003-05-21 | 2009-04-07 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US20040255154A1 (en) * | 2003-06-11 | 2004-12-16 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus |
US8862866B2 (en) | 2003-07-07 | 2014-10-14 | Certicom Corp. | Method and apparatus for providing an adaptable security level in an electronic communication |
US7447203B2 (en) | 2003-07-29 | 2008-11-04 | At&T Intellectual Property I, L.P. | Broadband access for virtual private networks |
US7876772B2 (en) * | 2003-08-01 | 2011-01-25 | Foundry Networks, Llc | System, method and apparatus for providing multiple access modes in a data communications network |
GB2406484B (en) * | 2003-08-19 | 2007-01-31 | Certicom Corp | Method and apparatus for synchronizing an adaptable security level in an electronic communication |
US7735114B2 (en) * | 2003-09-04 | 2010-06-08 | Foundry Networks, Inc. | Multiple tiered network security system, method and apparatus using dynamic user policy assignment |
US7530112B2 (en) * | 2003-09-10 | 2009-05-05 | Cisco Technology, Inc. | Method and apparatus for providing network security using role-based access control |
US7774833B1 (en) | 2003-09-23 | 2010-08-10 | Foundry Networks, Inc. | System and method for protecting CPU against remote access attacks |
US7451483B2 (en) * | 2003-10-09 | 2008-11-11 | International Business Machines Corporation | VLAN router with firewall supporting multiple security layers |
US7613195B2 (en) * | 2003-10-27 | 2009-11-03 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for managing computer networks |
US7836490B2 (en) * | 2003-10-29 | 2010-11-16 | Cisco Technology, Inc. | Method and apparatus for providing network security using security labeling |
US8528071B1 (en) | 2003-12-05 | 2013-09-03 | Foundry Networks, Llc | System and method for flexible authentication in a data communications network |
US20050177713A1 (en) * | 2004-02-05 | 2005-08-11 | Peter Sim | Multi-protocol network encryption system |
WO2005079539A2 (en) * | 2004-02-19 | 2005-09-01 | Ember Corporation | Dynamic identification of nodes in a network |
US7721324B1 (en) * | 2004-03-18 | 2010-05-18 | Oracle America, Inc. | Securing management operations in a communication fabric |
US7669244B2 (en) * | 2004-10-21 | 2010-02-23 | Cisco Technology, Inc. | Method and system for generating user group permission lists |
US7877796B2 (en) * | 2004-11-16 | 2011-01-25 | Cisco Technology, Inc. | Method and apparatus for best effort propagation of security group information |
US7721323B2 (en) * | 2004-11-23 | 2010-05-18 | Cisco Technology, Inc. | Method and system for including network security information in a frame |
US7886145B2 (en) | 2004-11-23 | 2011-02-08 | Cisco Technology, Inc. | Method and system for including security information with a packet |
US7827402B2 (en) | 2004-12-01 | 2010-11-02 | Cisco Technology, Inc. | Method and apparatus for ingress filtering using security group information |
US20090254658A1 (en) * | 2004-12-22 | 2009-10-08 | Matsushita Electric Industrial Co., Ltd. | Access control device, and access control method |
US7996894B1 (en) * | 2005-02-15 | 2011-08-09 | Sonicwall, Inc. | MAC address modification of otherwise locally bridged client devices to provide security |
CN101180828B (en) * | 2005-05-16 | 2012-12-05 | 艾利森电话股份有限公司 | Device and method for encrypting and transmitting data in combined network |
US8069270B1 (en) | 2005-09-06 | 2011-11-29 | Cisco Technology, Inc. | Accelerated tape backup restoration |
US8001610B1 (en) * | 2005-09-28 | 2011-08-16 | Juniper Networks, Inc. | Network defense system utilizing endpoint health indicators and user identity |
US8266431B2 (en) * | 2005-10-31 | 2012-09-11 | Cisco Technology, Inc. | Method and apparatus for performing encryption of data at rest at a port of a network device |
US7882538B1 (en) | 2006-02-02 | 2011-02-01 | Juniper Networks, Inc. | Local caching of endpoint security information |
US20070214502A1 (en) * | 2006-03-08 | 2007-09-13 | Mcalister Donald K | Technique for processing data packets in a communication network |
CN101496338B (en) | 2006-04-13 | 2013-08-21 | 塞尔蒂卡姆公司 | Method and apparatus for providing an adaptable security level in an electronic communication |
US7774837B2 (en) * | 2006-06-14 | 2010-08-10 | Cipheroptics, Inc. | Securing network traffic by distributing policies in a hierarchy over secure tunnels |
US20080222693A1 (en) * | 2006-08-08 | 2008-09-11 | Cipheroptics, Inc. | Multiple security groups with common keys on distributed networks |
US8082574B2 (en) * | 2006-08-11 | 2011-12-20 | Certes Networks, Inc. | Enforcing security groups in network of data processors |
US20080072281A1 (en) * | 2006-09-14 | 2008-03-20 | Willis Ronald B | Enterprise data protection management for providing secure communication in a network |
US20080072033A1 (en) * | 2006-09-19 | 2008-03-20 | Mcalister Donald | Re-encrypting policy enforcement point |
US8379638B2 (en) * | 2006-09-25 | 2013-02-19 | Certes Networks, Inc. | Security encapsulation of ethernet frames |
US8607301B2 (en) * | 2006-09-27 | 2013-12-10 | Certes Networks, Inc. | Deploying group VPNS and security groups over an end-to-end enterprise network |
US8284943B2 (en) * | 2006-09-27 | 2012-10-09 | Certes Networks, Inc. | IP encryption over resilient BGP/MPLS IP VPN |
US8104082B2 (en) * | 2006-09-29 | 2012-01-24 | Certes Networks, Inc. | Virtual security interface |
US8046820B2 (en) * | 2006-09-29 | 2011-10-25 | Certes Networks, Inc. | Transporting keys between security protocols |
US20080162922A1 (en) * | 2006-12-27 | 2008-07-03 | Swartz Troy A | Fragmenting security encapsulated ethernet frames |
US7864762B2 (en) * | 2007-02-14 | 2011-01-04 | Cipheroptics, Inc. | Ethernet encryption over resilient virtual private LAN services |
FR2918779B1 (en) * | 2007-07-10 | 2009-11-20 | Thales Sa | SECURE DATA SWITCH |
US7886335B1 (en) | 2007-07-12 | 2011-02-08 | Juniper Networks, Inc. | Reconciliation of multiple sets of network access control policies |
US7840708B2 (en) * | 2007-08-13 | 2010-11-23 | Cisco Technology, Inc. | Method and system for the assignment of security group information using a proxy |
US8516539B2 (en) | 2007-11-09 | 2013-08-20 | Citrix Systems, Inc | System and method for inferring access policies from access event records |
US8990910B2 (en) | 2007-11-13 | 2015-03-24 | Citrix Systems, Inc. | System and method using globally unique identities |
US9240945B2 (en) | 2008-03-19 | 2016-01-19 | Citrix Systems, Inc. | Access, priority and bandwidth management based on application identity |
US8943575B2 (en) * | 2008-04-30 | 2015-01-27 | Citrix Systems, Inc. | Method and system for policy simulation |
US8464074B1 (en) | 2008-05-30 | 2013-06-11 | Cisco Technology, Inc. | Storage media encryption with write acceleration |
WO2010000110A1 (en) * | 2008-07-03 | 2010-01-07 | 中兴通讯股份有限公司 | Synchronization, scheduling, network management and frequency assignment method of a layered wireless access system |
US8990573B2 (en) * | 2008-11-10 | 2015-03-24 | Citrix Systems, Inc. | System and method for using variable security tag location in network communications |
US8826366B2 (en) * | 2010-07-15 | 2014-09-02 | Tt Government Solutions, Inc. | Verifying access-control policies with arithmetic quantifier-free form constraints |
US8345692B2 (en) | 2010-04-27 | 2013-01-01 | Cisco Technology, Inc. | Virtual switching overlay for cloud computing |
EP2583211B1 (en) | 2010-06-15 | 2020-04-15 | Oracle International Corporation | Virtual computing infrastructure |
US10715457B2 (en) | 2010-06-15 | 2020-07-14 | Oracle International Corporation | Coordination of processes in cloud computing environments |
US9141831B2 (en) | 2010-07-08 | 2015-09-22 | Texas Instruments Incorporated | Scheduler, security context cache, packet processor, and authentication, encryption modules |
US8804504B1 (en) * | 2010-09-16 | 2014-08-12 | F5 Networks, Inc. | System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device |
CN103201982A (en) * | 2010-11-01 | 2013-07-10 | 惠普发展公司,有限责任合伙企业 | Managing MAC moves with secure port groups |
US9104672B2 (en) * | 2011-02-25 | 2015-08-11 | International Business Machines Corporation | Virtual security zones for data processing environments |
US8793358B1 (en) * | 2011-04-27 | 2014-07-29 | Juniper Networks, Inc. | Flexible packet processing for network devices |
CN102932382B (en) * | 2011-08-08 | 2018-03-23 | 中兴通讯股份有限公司 | Safe supply method and system, type of service acquisition methods on demand |
US8745384B2 (en) | 2011-08-11 | 2014-06-03 | Cisco Technology, Inc. | Security management in a group based environment |
KR101902016B1 (en) * | 2011-09-29 | 2018-10-01 | 한국전력공사 | Method and Apparatus for providing security service |
WO2013119841A1 (en) | 2012-02-10 | 2013-08-15 | Nimbula, Inc. | Cloud computing services framework |
US8989188B2 (en) * | 2012-05-10 | 2015-03-24 | Cisco Technology, Inc. | Preventing leaks among private virtual local area network ports due to configuration changes in a headless mode |
US20130305344A1 (en) * | 2012-05-14 | 2013-11-14 | Alcatel-Lucent India Limited | Enterprise network services over distributed clouds |
US9619545B2 (en) | 2013-06-28 | 2017-04-11 | Oracle International Corporation | Naïve, client-side sharding with online addition of shards |
CN103384251B (en) * | 2013-07-16 | 2016-02-03 | 中国人民解放军信息工程大学 | The secure network construction method capable of being combined of many hierarchically secure services and device thereof |
US9692833B2 (en) * | 2013-07-26 | 2017-06-27 | Empire Technology Development Llc | Device and session identification |
US9792622B2 (en) * | 2013-09-05 | 2017-10-17 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Communicating device data prior to establishing wireless power connection |
CN104580011B (en) * | 2013-10-23 | 2017-12-15 | 新华三技术有限公司 | A kind of data forwarding device and method |
CN104579695B (en) * | 2013-10-23 | 2018-07-20 | 新华三技术有限公司 | A kind of data forwarding device and method |
CN104639512B (en) * | 2013-11-14 | 2018-08-21 | 华为技术有限公司 | Network security method and equipment |
TWI555391B (en) * | 2014-01-15 | 2016-10-21 | 昆盈企業股份有限公司 | Electric device remote control system and signal conversion device thereof, and control method for signal conversion device |
US9548897B2 (en) | 2014-01-17 | 2017-01-17 | Amazon Technologies, Inc. | Network entity registry for network entity handles included in network traffic policies enforced for a provider network |
US9838424B2 (en) * | 2014-03-20 | 2017-12-05 | Microsoft Technology Licensing, Llc | Techniques to provide network security through just-in-time provisioned accounts |
US10356651B2 (en) | 2014-07-17 | 2019-07-16 | Cirrent, Inc. | Controlled connection of a wireless device to a network |
US10834592B2 (en) | 2014-07-17 | 2020-11-10 | Cirrent, Inc. | Securing credential distribution |
US9942756B2 (en) * | 2014-07-17 | 2018-04-10 | Cirrent, Inc. | Securing credential distribution |
JP2016082521A (en) * | 2014-10-21 | 2016-05-16 | 富士通株式会社 | Information processor and information processing method |
US9998434B2 (en) * | 2015-01-26 | 2018-06-12 | Listat Ltd. | Secure dynamic communication network and protocol |
US11277390B2 (en) | 2015-01-26 | 2022-03-15 | Listat Ltd. | Decentralized cybersecure privacy network for cloud communication, computing and global e-commerce |
US11627639B2 (en) * | 2015-01-26 | 2023-04-11 | Ievgen Verzun | Methods and apparatus for HyperSecure last mile communication |
US9553885B2 (en) | 2015-06-08 | 2017-01-24 | Illusive Networks Ltd. | System and method for creation, deployment and management of augmented attacker map |
US10382484B2 (en) | 2015-06-08 | 2019-08-13 | Illusive Networks Ltd. | Detecting attackers who target containerized clusters |
US9755939B2 (en) * | 2015-06-26 | 2017-09-05 | Cisco Technology, Inc. | Network wide source group tag binding propagation |
CN106549793B (en) | 2015-09-23 | 2020-08-07 | 华为技术有限公司 | Flow control method and device |
US10333897B2 (en) * | 2015-10-23 | 2019-06-25 | Attala Systems Corporation | Distributed firewalls and virtual network services using network packets with security tags |
US11290425B2 (en) * | 2016-02-01 | 2022-03-29 | Airwatch Llc | Configuring network security based on device management characteristics |
CA3062272A1 (en) * | 2017-04-03 | 2018-10-11 | Listat Ltd. | Methods and apparatus for hypersecure last mile communication |
US10958622B2 (en) | 2018-01-10 | 2021-03-23 | Cisco Technology, Inc. | Hierarchical security group identifiers |
US11057776B2 (en) * | 2018-01-11 | 2021-07-06 | Mediatek Inc. | Device identifying method, identifying device, and device pairing method |
US10333976B1 (en) | 2018-07-23 | 2019-06-25 | Illusive Networks Ltd. | Open source intelligence deceptions |
US10404747B1 (en) | 2018-07-24 | 2019-09-03 | Illusive Networks Ltd. | Detecting malicious activity by using endemic network hosts as decoys |
US10382483B1 (en) | 2018-08-02 | 2019-08-13 | Illusive Networks Ltd. | User-customized deceptions and their deployment in networks |
US10333977B1 (en) | 2018-08-23 | 2019-06-25 | Illusive Networks Ltd. | Deceiving an attacker who is harvesting credentials |
US10432665B1 (en) | 2018-09-03 | 2019-10-01 | Illusive Networks Ltd. | Creating, managing and deploying deceptions on mobile devices |
US11805104B2 (en) * | 2018-12-14 | 2023-10-31 | Battelle Memorial Institute | Computing system operational methods and apparatus |
US10764177B2 (en) * | 2019-01-21 | 2020-09-01 | Mellanox Technologies Tlv Ltd. | Efficient implementation of complex network segmentation |
US11336694B2 (en) * | 2019-08-05 | 2022-05-17 | Cisco Technology, Inc. | Scalable security policy architecture with segregated forwarding and security plane and hierarchical classes |
US11516184B2 (en) | 2019-09-05 | 2022-11-29 | Cisco Technology, Inc. | Firewall service insertion across secure fabric preserving security group tags end to end with dual homed firewall |
US11647019B2 (en) * | 2019-10-16 | 2023-05-09 | Cisco Technology, Inc. | Systems and methods for providing security orchestration for trusted traffic segmentation on untrusted devices |
CN111131039B (en) * | 2019-12-16 | 2022-03-25 | 新华三大数据技术有限公司 | Message forwarding control method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742604A (en) | 1996-03-28 | 1998-04-21 | Cisco Systems, Inc. | Interswitch link mechanism for connecting high-performance network switches |
US5978378A (en) | 1997-09-11 | 1999-11-02 | 3Com Corporation | Method and apparatus for VLAN support |
WO1999056436A1 (en) | 1998-04-27 | 1999-11-04 | Internap Network Services Corporation | Establishing connectivity in networks |
WO2000078004A2 (en) | 1999-06-10 | 2000-12-21 | Alcatel Internetworking, Inc. | Policy based network architecture |
WO2002019585A1 (en) | 2000-08-31 | 2002-03-07 | Verizon Communications Inc. | Methods, apparatus and data structures for segmenting customers using at least a portion of a layer 2 address header or bits in the place of layer 2 address header |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6035405A (en) * | 1997-12-22 | 2000-03-07 | Nortel Networks Corporation | Secure virtual LANs |
US7092389B2 (en) * | 2001-01-30 | 2006-08-15 | At&T Corp. | Technique for ethernet access to packet-based services |
US7061899B2 (en) * | 2001-05-01 | 2006-06-13 | Hewlett-Packard Development Company, L.P. | Method and apparatus for providing network security |
US7272137B2 (en) * | 2001-05-14 | 2007-09-18 | Nortel Networks Limited | Data stream filtering apparatus and method |
US7411980B2 (en) * | 2001-12-14 | 2008-08-12 | Broadcom Corporation | Filtering and forwarding frames within an optical network |
US7120791B2 (en) * | 2002-01-25 | 2006-10-10 | Cranite Systems, Inc. | Bridged cryptographic VLAN |
US7188364B2 (en) * | 2001-12-20 | 2007-03-06 | Cranite Systems, Inc. | Personal virtual bridged local area networks |
US7546458B1 (en) * | 2002-05-04 | 2009-06-09 | Atheros Communications, Inc. | Method for organizing virtual networks while optimizing security |
US20030235191A1 (en) * | 2002-06-19 | 2003-12-25 | Heggarty Jonathan W. | VLAN inheritance |
US6950628B1 (en) * | 2002-08-02 | 2005-09-27 | Cisco Technology, Inc. | Method for grouping 802.11 stations into authorized service sets to differentiate network access and services |
JP3729265B2 (en) * | 2002-08-22 | 2005-12-21 | 日本電気株式会社 | Network system, spanning tree configuration method, spanning tree configuration node, and spanning tree configuration program |
US7062566B2 (en) * | 2002-10-24 | 2006-06-13 | 3Com Corporation | System and method for using virtual local area network tags with a virtual private network |
US7721323B2 (en) * | 2004-11-23 | 2010-05-18 | Cisco Technology, Inc. | Method and system for including network security information in a frame |
US7827402B2 (en) * | 2004-12-01 | 2010-11-02 | Cisco Technology, Inc. | Method and apparatus for ingress filtering using security group information |
US7483423B2 (en) * | 2005-03-30 | 2009-01-27 | Intel Corporation | Authenticity of communications traffic |
US20080162922A1 (en) * | 2006-12-27 | 2008-07-03 | Swartz Troy A | Fragmenting security encapsulated ethernet frames |
US7840708B2 (en) * | 2007-08-13 | 2010-11-23 | Cisco Technology, Inc. | Method and system for the assignment of security group information using a proxy |
-
2003
- 2003-02-13 US US10/367,341 patent/US7567510B2/en active Active
-
2004
- 2004-01-30 AU AU2004214281A patent/AU2004214281B2/en not_active Ceased
- 2004-01-30 CN CN200480004038.0A patent/CN1748401B/en not_active Expired - Fee Related
- 2004-01-30 WO PCT/US2004/002771 patent/WO2004075509A1/en active Application Filing
- 2004-01-30 EP EP04707069.3A patent/EP1593251B1/en not_active Expired - Lifetime
- 2004-01-30 CA CA2515510A patent/CA2515510C/en not_active Expired - Fee Related
-
2009
- 2009-07-27 US US12/509,894 patent/US8295168B2/en not_active Expired - Lifetime
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5742604A (en) | 1996-03-28 | 1998-04-21 | Cisco Systems, Inc. | Interswitch link mechanism for connecting high-performance network switches |
US5978378A (en) | 1997-09-11 | 1999-11-02 | 3Com Corporation | Method and apparatus for VLAN support |
WO1999056436A1 (en) | 1998-04-27 | 1999-11-04 | Internap Network Services Corporation | Establishing connectivity in networks |
WO2000078004A2 (en) | 1999-06-10 | 2000-12-21 | Alcatel Internetworking, Inc. | Policy based network architecture |
WO2002019585A1 (en) | 2000-08-31 | 2002-03-07 | Verizon Communications Inc. | Methods, apparatus and data structures for segmenting customers using at least a portion of a layer 2 address header or bits in the place of layer 2 address header |
Non-Patent Citations (1)
Title |
---|
HAIGH T: "Virtual enterprises and the enterprise security architecture", NEW SECURITY PARADIGMS WORKSHOP, 1995. PROCEEDINGS LA JOLLA, CA, USA 22-25 AUG. 1995, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 22 August 1995 (1995-08-22), pages 53 - 64, XP010158976, ISBN: 0-8186-7318-4 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7778999B1 (en) | 2003-01-24 | 2010-08-17 | Bsecure Technologies, Inc. | Systems and methods for multi-layered packet filtering and remote management of network devices |
GB2421398A (en) * | 2004-12-16 | 2006-06-21 | Samsung Electronics Co Ltd | Routing a VoIP call based on a service class of a subscriber |
GB2421398B (en) * | 2004-12-16 | 2007-03-28 | Samsung Electronics Co Ltd | Routing voice over internet (VoIP) call |
US7873826B2 (en) | 2004-12-16 | 2011-01-18 | Samsung Electronics Co., Ltd. | Routing voice over internet (VoIP) call |
US7716472B2 (en) | 2005-12-29 | 2010-05-11 | Bsecure Technologies, Inc. | Method and system for transparent bridging and bi-directional management of network data |
EP3706374B1 (en) | 2006-08-22 | 2022-08-24 | Mala Technologies Ltd. | Point-to-multipoint functionality in a bridged network |
US8091115B2 (en) | 2008-10-03 | 2012-01-03 | Microsoft Corporation | Device-side inline pattern matching and policy enforcement |
WO2010132061A1 (en) | 2009-05-15 | 2010-11-18 | Hewlett-Packard Development Company, L. P. | A method and apparatus for policy enforcement using a tag |
EP2430800A1 (en) * | 2009-05-15 | 2012-03-21 | Hewlett-Packard Development Company, L.P. | A method and apparatus for policy enforcement using a tag |
EP2430800A4 (en) * | 2009-05-15 | 2014-01-08 | Hewlett Packard Development Co | A method and apparatus for policy enforcement using a tag |
Also Published As
Publication number | Publication date |
---|---|
AU2004214281B2 (en) | 2009-07-30 |
AU2004214281A1 (en) | 2004-09-02 |
CN1748401A (en) | 2006-03-15 |
US20090300350A1 (en) | 2009-12-03 |
CA2515510A1 (en) | 2004-09-02 |
US7567510B2 (en) | 2009-07-28 |
US20040160903A1 (en) | 2004-08-19 |
CA2515510C (en) | 2010-09-14 |
CN1748401B (en) | 2011-08-31 |
EP1593251B1 (en) | 2016-06-29 |
EP1593251A1 (en) | 2005-11-09 |
US8295168B2 (en) | 2012-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2515510C (en) | Method and apparatus for enforcing security groups for vlans | |
US20050190758A1 (en) | Security groups for VLANs | |
US7779459B2 (en) | Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device | |
Kent et al. | RFC 4301: Security architecture for the Internet protocol | |
US8146148B2 (en) | Tunneled security groups | |
US7061899B2 (en) | Method and apparatus for providing network security | |
AU2002327757A1 (en) | Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device | |
Rietz et al. | An SDN-based approach to ward off LAN attacks | |
US7447782B2 (en) | Community access control in a multi-community node | |
US6915351B2 (en) | Community separation control in a closed multi-community node | |
StJohns et al. | Common architecture label IPv6 security option (CALIPSO) | |
Rietz et al. | Research Article An SDN-Based Approach to Ward Off LAN Attacks | |
Thomas | Common Architecture Label IPv6 Security Option (CALIPSO) | |
Du et al. | Protecting an MPLS-based Programmable Virtual Network Using Distributed Firewall |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004214281 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004707069 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2515510 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20048040380 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2004214281 Country of ref document: AU Date of ref document: 20040130 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2004214281 Country of ref document: AU |
|
WWP | Wipo information: published in national office |
Ref document number: 2004707069 Country of ref document: EP |