Validation of routing information base-forwarding information base equivalence in a network
First Claim
Patent Images
1. A system for performing a network assurance check of proper deployment of a configuration in a fabric, comprising:
- at least one memory configured to store data; and
at least one processor operable to execute instructions associated with the data, which when executed by the at least one processor, causes the processor to;
obtain a forwarding information base (FIB) and a routing information base (RIB) of a network device;
convert the FIB and/or the RIB to a common format;
remove from the RIB and FIB duplicates;
determine, whether a RIB entry in the RIB matches an entry in the FIB;
identify, in response to a negative result of the determination, when the entry in the FIB is covered by another RIB entry; and
generate an error event in response to a negative result of the identification.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations
-
Citations
20 Claims
-
1. A system for performing a network assurance check of proper deployment of a configuration in a fabric, comprising:
-
at least one memory configured to store data; and at least one processor operable to execute instructions associated with the data, which when executed by the at least one processor, causes the processor to; obtain a forwarding information base (FIB) and a routing information base (RIB) of a network device; convert the FIB and/or the RIB to a common format; remove from the RIB and FIB duplicates; determine, whether a RIB entry in the RIB matches an entry in the FIB; identify, in response to a negative result of the determination, when the entry in the FIB is covered by another RIB entry; and generate an error event in response to a negative result of the identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14)
-
-
8. A method for performing a network assurance check of proper deployment of a configuration in a fabric, comprising:
obtaining a FIB and a RIB of the network device; converting the FIB and the RIB to a common format; removing from the RIB and FIB duplicates; determining, whether a RIB entry in the RIB matches an entry in the FIB; identifying, in response to a negative result of the determination, when the entry in the FIB is covered by another RIB entry; and generating an error event in response to a negative result of the identifying.
-
15. At least one non-transitory computer readable medium storing instructions, which when executed by a processor causes the processor to:
-
obtain a FIB and a RIB of the network device; convert the FIB and/or the RIB to a common format; remove from the RIB and FIB duplicates; determine, whether a RIB entry in the RIB matches an entry in the FIB; identify, in response to a negative result of the determination, when the entry in the FIB is covered by another RIB entry; and generate an error event in response to a negative result of the identification. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification