POINT-TO-MULTI-POINT/NON-BROADCASTING MULTI-ACCESS VPN TUNNELS
0 Assignments
0 Petitions
Accused Products
Abstract
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.
-
Citations
61 Claims
-
1-41. -41. (canceled)
-
42. A method, performed by a network device, the method comprising:
-
receiving, at the network device, a data unit; retrieving a next hop identifier associated with a device along a path toward a destination of the data unit; identifying a tunnel identifier using the retrieved next hop identifier; and forwarding, by the network device, the data unit via a tunnel corresponding to the tunnel identifier. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
-
49. A device comprising:
one or more processors to; receive a data unit; retrieve a next hop identifier associated with a device along a path toward a destination of the data unit; identify a tunnel identifier using the retrieved next hop identifier; and forward the data unit via a tunnel corresponding to the tunnel identifier. - View Dependent Claims (50, 51, 52, 53, 54, 55)
-
56. A device comprising:
one or more processors to; establish a tunnel to a destination; insert a tunnel identifier corresponding to the established tunnel into a memory; and associate one or more security parameters, used to encrypt traffic sent via the tunnel, with the tunnel identifier. - View Dependent Claims (57, 58, 59, 60, 61)
Specification