Point-to-multi-point/non-broadcasting multi-access VPN tunnels
First Claim
Patent Images
1. A method, performed by a network device, the method comprising:
- receiving, at the network device, a data unit;
performing, by the network device, a lookup in a first table to retrieve a next hop identifier, the next hop identifier corresponding to a destination of the data unit;
performing, by the network device and using the retrieved next hop identifier, a lookup in a second table to identify a tunnel identifier; and
forwarding, by the network device, the data unit via a tunnel corresponding to the tunnel identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
A system establishes a virtual private network (VPN) tunnel to a destination and determines a next hop for the VPN tunnel. The system inserts the next hop, and an address associated with the destination, into an entry of a first table. The system inserts the next hop, and a tunnel identifier corresponding to the established VPN tunnel, into an entry of a second table. The system associates one or more security parameters, used to encrypt traffic sent via the VPN tunnel, with the tunnel identifier.
63 Citations
20 Claims
-
1. A method, performed by a network device, the method comprising:
-
receiving, at the network device, a data unit; performing, by the network device, a lookup in a first table to retrieve a next hop identifier, the next hop identifier corresponding to a destination of the data unit; performing, by the network device and using the retrieved next hop identifier, a lookup in a second table to identify a tunnel identifier; and forwarding, by the network device, the data unit via a tunnel corresponding to the tunnel identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, performed by a device, the method comprising:
-
establishing, by the device, a tunnel to a destination; inserting, by the device, a tunnel identifier corresponding to the established tunnel into a data table; and associating, by the device, one or more security parameters, used to encrypt traffic sent via the tunnel, with the tunnel identifier. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A network device comprising:
-
a first table to store; a plurality of destination addresses associated with a plurality of destination networks, and a plurality of next hop identifiers, each next hop identifier corresponding to a network address of the plurality of network addresses; a second table to store a plurality of tunnel identifiers, each tunnel identifier corresponding to a next hop identifier of the plurality of next hop identifiers; and a processor to; receive a data unit, the data unit including a first destination address of a first destination network, retrieve, from the first table and using the first destination address, a first next hop identifier, retrieve, from the second table and using the first next hop identifier, a first tunnel identifier, and forward the data unit using a tunnel associated with a first tunnel identifier. - View Dependent Claims (16, 17, 20)
-
- 18. The network device of 15, where the first next hop identifier includes a network address associated with a network device.
Specification