Filters to isolate untrusted ports of switches
First Claim
Patent Images
1. A method, comprising:
- dividing a plurality of switch ports into trusted ports and untrusted ports, wherein the trusted ports are those ports that are coupled either directly or via one or more additional switches to a trusted computing device; and
applying filters on each untrusted port to allow the untrusted ports to communicate with any trusted port, but disallow the untrusted ports to communicate with any other untrusted port.
1 Assignment
0 Petitions
Accused Products
Abstract
A technique is provided for dividing a plurality of switch ports into trusted ports and untrusted ports. The trusted ports are those ports that are coupled either directly or via one or more additional switches to a trusted computing device. Filters are applied on each untrusted port to allow the untrusted ports to communicate with any trusted port, but disallow the untrusted ports to communicate with any other untrusted port.
74 Citations
27 Claims
-
1. A method, comprising:
-
dividing a plurality of switch ports into trusted ports and untrusted ports, wherein the trusted ports are those ports that are coupled either directly or via one or more additional switches to a trusted computing device; and applying filters on each untrusted port to allow the untrusted ports to communicate with any trusted port, but disallow the untrusted ports to communicate with any other untrusted port. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
dividing a plurality of ports of a switch into trusted ports and untrusted ports, wherein trusted ports are those ports of the switch that are coupled either directly or via one or more additional switches to a trusted computing device; and converting an untrusted port of the switch into a trusted port in response to authentication of a computing device that is attached to the port. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A switch assembly, comprising:
-
at least one switch that includes a plurality of ports, wherein the ports are divided into trusted ports and untrusted ports, further wherein the trusted ports are those ports of the switch that are not coupled either directly or via one or more additional switches to a trusted computing device; and a filter that is applied to the untrusted ports to allow the untrusted ports to communicate with trusted ports, but disallow the untrusted ports from communicating with other untrusted ports. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification