Method and system of resiliency in cloud-delivered SD-WAN
First Claim
1. A system comprising:
- a first device at an edge of a branch first network;
a second device operating as an access point to a second network; and
at least two links between the first device and the second device, wherein (i) a tunnel is established on an active first link of the at least two links, (ii) no tunnel is established on a backup second link of the at least two links, and (iii) probe packets are used to monitor a state of the backup second link in order to ensure that the second link can become active when needed to replace the first link;
wherein if the first link becomes inactive, a second tunnel is established on the second link and the second link becomes the active link.
5 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a computerized method includes the step of providing process monitor in a Gateway. The method includes the step of, with the process monitor, launching a Gateway. Daemon (GWD). The GWD runs a GWD process that implements a Network Address Translation (NAT) process. The NAT process includes receiving a set of data packets from one or more Edge devices and forwarding the set of data packets to a public Internet. The method includes the step of receiving another set of data packets from the public Internet and forwarding the other set of data packets to the one or more Edge devices. The method includes the step of launching a Network Address Translation daemon (NATD). The method includes the step of detecting that the GWD process is interrupted; moving the NAT process to the NATD.
-
Citations
18 Claims
-
1. A system comprising:
-
a first device at an edge of a branch first network; a second device operating as an access point to a second network; and at least two links between the first device and the second device, wherein (i) a tunnel is established on an active first link of the at least two links, (ii) no tunnel is established on a backup second link of the at least two links, and (iii) probe packets are used to monitor a state of the backup second link in order to ensure that the second link can become active when needed to replace the first link; wherein if the first link becomes inactive, a second tunnel is established on the second link and the second link becomes the active link. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a first device at an edge of a branch location of an enterprise network; a second device operating as an access point to a public cloud network; and at least two links between the first device and the second device, wherein (i) a tunnel is established on an active first link of the at least two links, (ii) no tunnel is established on an inactive backup second link of the at least two links, and (iii) probe packets are used to monitor a state of the inactive backup second link in order to ensure that the second link can become active when needed to replace the first link; wherein if the first link becomes inactive, a second tunnel is established on the second link and the second link becomes the active link. - View Dependent Claims (17, 18)
-
Specification