Determining virtual adapter access controls in a computing environment
First Claim
1. A computer-implemented method comprising:
- sending one or more requests over a network by an activated virtual adapter, the activated virtual adapter being hosted on a physical adapter of a host system coupled to the network, the virtual adapter being for use by a guest, hosted by the host system, in performing data input and output, and the sending being based on one or more indications provided to the physical adapter, absent involvement of the guest, that the one or more requests be sent by the virtual adapter;
receiving access control information by the activated virtual adapter from one or more responses to at least one request of the one or more requests, the access control information being indicative of one or more access controls enforced by the network in controlling access by the activated virtual adapter to one or more network components of the network;
providing at least some of the access control information to a control component, wherein the sending the one or more requests, the receiving the access control information, and the providing the at least some of the access control information are performed absent involvement of the guest; and
returning the activated virtual adapter to an initial state of the virtual adapter that the virtual adapter was in prior to activation of the virtual adapter.
1 Assignment
0 Petitions
Accused Products
Abstract
A control component of a computing environment initiates sending of request(s) over a network of the computing environment by an activated virtual adapter. The activated virtual adapter is hosted on a physical adapter of a host system coupled to the network, and is for use by a guest, hosted by the host system, in performing data input and output. The request(s) retrieve access control information from the network indicative of access control(s) enforced in controlling access by the activated virtual adapter to network component(s). The initiating provides indication(s) to the physical adapter, absent involvement of the guest, that the request(s) be sent by the virtual adapter. Based on the initiating, the control component obtains the access control information from the physical adapter, and determines, based on that information, the access control(s) being enforced by the network in controlling access by the activated virtual adapter to the network component(s).
-
Citations
12 Claims
-
1. A computer-implemented method comprising:
-
sending one or more requests over a network by an activated virtual adapter, the activated virtual adapter being hosted on a physical adapter of a host system coupled to the network, the virtual adapter being for use by a guest, hosted by the host system, in performing data input and output, and the sending being based on one or more indications provided to the physical adapter, absent involvement of the guest, that the one or more requests be sent by the virtual adapter; receiving access control information by the activated virtual adapter from one or more responses to at least one request of the one or more requests, the access control information being indicative of one or more access controls enforced by the network in controlling access by the activated virtual adapter to one or more network components of the network; providing at least some of the access control information to a control component, wherein the sending the one or more requests, the receiving the access control information, and the providing the at least some of the access control information are performed absent involvement of the guest; and returning the activated virtual adapter to an initial state of the virtual adapter that the virtual adapter was in prior to activation of the virtual adapter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification