×

Managing rogue devices through a network backhaul

  • US 10,027,703 B2
  • Filed: 06/07/2016
  • Issued: 07/17/2018
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a network backhaul rogue device management system in a network backhaul from an originator switch, a rogue learned media access control (MAC) message including new learned device data, the new learned device data including a MAC address of a rogue device newly learned in a forwarding table of at least one switch by determining whether a learned MAC address in the forwarding table matches the MAC address of the rogue device in a rogue monitor table maintained at the originator switch;

    determining, by the network backhaul rogue device management system, whether an entry in a rogue learning table maintained in the network backhaul rogue device management system matches the new learned device data;

    when it is determined that the new learned device data is absent from the rogue learning table;

    adding, by the network backhaul rogue device management system, the new learned device data into a new entry in the rogue learning table;

    determining, by the network backhaul rogue device management system, an identification of a rogue access point (AP) associated with the new learned device data;

    causing, by the network backhaul rogue device management system, a switch coupled to the rogue AP to perform mitigation of the rogue AP to prevent transfer of data to and from the rogue device,wherein performing the mitigation includes;

    sending a block port mitigation message to a nearest switch to the rogue device;

    learning neighboring devices corresponding to ports of the nearest switch;

    determining whether a neighboring device of the neighboring devices corresponding to a port of the ports of the nearest switch is the rogue device;

    when it is determined that the neighboring device corresponding to the port is the rogue device;

    determining whether the port is supplying power;

    when it is determined that the port is supplying power, blocking traffic on the port.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×