VLAN tunneling
First Claim
Patent Images
1. A method comprising:
- receiving information over a first tunnel associated with a first virtual local area network;
determining whether the information is from a network device assigned to a second virtual local area network differing from the first virtual local area network; and
creating a second tunnel associated with the second virtual local area network if the network device is a member of the second virtual local area network.
4 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment of the invention, a method for establishing multiple tunnels for each virtual local area network is described. Upon receiving information over a first tunnel associated with a first virtual local area network, a determination is made whether the information is from a network device assigned to a second virtual local area network, which differs from the first virtual local area network. If the network device is a member of the second virtual local area network, a second tunnel associated with the second virtual local area network is created.
91 Citations
18 Claims
-
1. A method comprising:
-
receiving information over a first tunnel associated with a first virtual local area network; determining whether the information is from a network device assigned to a second virtual local area network differing from the first virtual local area network; and creating a second tunnel associated with the second virtual local area network if the network device is a member of the second virtual local area network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Software executed by a processor implemented within a network switch of a network, comprising:
-
a first software module that, when executed, determines whether incoming information from a network device should be transferred over a second tunnel differing from a first tunnel associated with a first virtual local area network over which the incoming information is initially transferred; and a second software module that, when executed, creates the second tunnel associated with a second virtual local area network if the network device is a member of the second virtual local area network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
determining whether information is from a network device assigned to a second virtual local area network differing from a first virtual local area network corresponding to a tunnel previously established; and creating a second tunnel associated with the second virtual local area network if the network device is a member of the second virtual local area network. - View Dependent Claims (15, 16, 17, 18)
-
Specification