Cloud authentication of layer 2-connected member devices via an IP-connected active device
First Claim
1. A method comprising:
- transmitting, by a first network device to a second network device, a request to authenticate the first network device with a cloud management platform, wherein the first network device is connected to the second network device via a Layer 2 connection, and wherein the second network device is connected to the cloud management platform via an IP (Internet Protocol) connection;
receiving, by the first network device from the second network device, an encrypted nonce generated by the cloud management platform in response to the request, the encrypted nonce being encrypted using a public key of the first network device;
decrypting, by the first network device, the encrypted nonce using a private key of the first network device to generate a decrypted nonce;
transmitting, by the first network device, the decrypted nonce to the second network device; and
receiving, by the first network device from the second network device, a token generated by the cloud management platform indicating that the first network device has been authenticated, wherein the first network device is a member switch in a stacking system and wherein the second network device is an active or master switch in the stacking system.
7 Assignments
0 Petitions
Accused Products
Abstract
Techniques for enabling cloud authentication of Layer 2-connected member devices via an IP-connected active device are provided. In one set of embodiments, the member device can transmit, to the active device, a request to authenticate the member device with a cloud management platform. The member device can further receive, from the active device, an encrypted nonce generated by the cloud management platform in response to the request, where the encrypted nonce is encrypted using a public key of the member device. The member device can decrypt the encrypted nonce using a private key of the member device to generate a decrypted nonce and can transmit the decrypted nonce to the active device. The member device can then receive, from the active device, a token generated by the cloud management platform indicating that the member device has been authenticated by the platform.
5 Citations
18 Claims
-
1. A method comprising:
-
transmitting, by a first network device to a second network device, a request to authenticate the first network device with a cloud management platform, wherein the first network device is connected to the second network device via a Layer 2 connection, and wherein the second network device is connected to the cloud management platform via an IP (Internet Protocol) connection; receiving, by the first network device from the second network device, an encrypted nonce generated by the cloud management platform in response to the request, the encrypted nonce being encrypted using a public key of the first network device; decrypting, by the first network device, the encrypted nonce using a private key of the first network device to generate a decrypted nonce; transmitting, by the first network device, the decrypted nonce to the second network device; and receiving, by the first network device from the second network device, a token generated by the cloud management platform indicating that the first network device has been authenticated, wherein the first network device is a member switch in a stacking system and wherein the second network device is an active or master switch in the stacking system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable storage medium having stored therein instructions executable by a first network device, the instructions causing the first network device to:
-
transmit, to a second network device, a request to authenticate the first network device with a cloud management platform, wherein the first network device is connected to the second network device via a Layer 2 connection, and wherein the second network device is connected to the cloud management platform via an IP (Internet Protocol) connection; receive, from the second network device, an encrypted nonce generated by the cloud management platform in response to the request, the encrypted nonce being encrypted using a public key of the first network device; decrypt the encrypted nonce using a private key of the first network device to generate a decrypted nonce; transmit the decrypted nonce to the second network device; and receive, from the second network device, a token generated by the cloud management platform indicating that the first network device has been authenticated, wherein the first network device is a member switch in a stacking system and wherein the second network device is an active or master switch in the stacking system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A network device comprising:
-
a processor; and a memory having stored therein program code that, when executed, causes the processor to; transmit, to another network device, a request to authenticate the network 6 device with a cloud management platform, wherein the network device is connected to said 7 another network device via a Layer 2 connection, and wherein said another network device is 8 connected to the cloud management platform via an IP (Internet Protocol) connection; receive, from said another network device, an encrypted nonce generated by the cloud management platform in response to the request, the encrypted nonce being encrypted using a public key of the network device; decrypt the encrypted nonce using a private key of the network device to generate a decrypted nonce; transmit the decrypted nonce to said another network device; and receive, from said another network device, a token generated by the cloud management platform indicating that the network device has been authenticated, wherein the network device is a member switch in a stacking system and wherein the said another network device is an active or master switch in the stacking system. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification