MANAGING ROGUE DEVICES THROUGH A NETWORK BACKHAUL
First Claim
Patent Images
1. A method comprising:
- detecting a rogue device in a network;
sending a rogue device message that includes an identification of the rogue device to a plurality of switches in a backhaul of the network;
adding the identification of the rogue device into a rogue monitor table;
determining whether the rogue device is In-Net or Out-Of-Net using forwarding tables of the plurality of switches in the backhaul of the network and the rogue monitor table;
if it is determined that the rogue device is In-Net, performing mitigation of the rogue device using a nearest switch to the rogue device of the plurality of switches in the backhaul of the network.
4 Assignments
0 Petitions
Accused Products
Abstract
Managing rogue devices in a network through a network backhaul. A rogue device is detected in a network and a rogue device message that includes the rogue device is sent to a plurality of switches in a backhaul of the network. The rogue device is added into a rogue monitor table. Whether the rogue device is In-Net or Out-Of-Net is determined using forwarding tables of the plurality of switches in the backhaul of the network and the rogue monitor table. Mitigation is performed using a nearest switch to the rogue device of the plurality of switches in the backhaul of the network if it is determined that the rogue device is In-Net.
-
Citations
21 Claims
-
1. A method comprising:
-
detecting a rogue device in a network; sending a rogue device message that includes an identification of the rogue device to a plurality of switches in a backhaul of the network; adding the identification of the rogue device into a rogue monitor table; determining whether the rogue device is In-Net or Out-Of-Net using forwarding tables of the plurality of switches in the backhaul of the network and the rogue monitor table; if it is determined that the rogue device is In-Net, performing mitigation of the rogue device using a nearest switch to the rogue device of the plurality of switches in the backhaul of the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a detector access point configured to detect a rogue device in a network; a rogue device message engine configured to send a rogue device message that includes an identification of the rogue device to a plurality of switches in a backhaul of the network; a rogue monitor table management engine configured to add the identification of the rogue device into a rogue monitor table; a rogue device status determination engine configured to determine whether the rogue device is In-Net or Out-Of-Net using forwarding tables of the plurality of switches in the backhaul of the network and the rogue monitor table; a network backhaul rogue device management system configured to perform mitigation of the rogue device using a nearest switch to the rogue device of the plurality of switches in the backhaul of the network, if it is determined that the rogue device is In-Net. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
means for detecting a rogue device in a network; means for sending a rogue device message that includes an identification of the rogue device to a plurality of switches in a backhaul of the network; means for adding the identity of the rogue device into a rogue monitor table; means for determining whether the rogue device is In-Net or Out-Of-Net using forwarding tables of the plurality of switches in the backhaul of the network and the rogue monitor table; means for performing mitigation of the rogue device using a nearest switch to the rogue device of the plurality of switches in the backhaul of the network, if it is determined that the rogue device is In-Net.
-
Specification