×

Cluster architecture for network security processing

  • US 8,392,496 B2
  • Filed: 12/21/2009
  • Issued: 03/05/2013
  • Est. Priority Date: 12/19/2008
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium comprising instructions to cause a computing device to perform a method, the method comprising:

  • maintaining a flow assignment data structure comprising mappings between network flows and cluster computing devices assigned thereto by a cluster master, wherein each of the cluster computing devices is coupled to an external network interface and is capable of processing network flows independently of the cluster master;

    identifying a network flow for processing by the cluster;

    assigning the network flow to a selected one of the cluster computing devices;

    aggregating, at the cluster master, flow session data received from two or more of the cluster computing devices, wherein the flow session data comprises session keys of network flows assigned to the two or more cluster computing devices, each network flow being established between a respective one of the two or more cluster computing devices and an external client; and

    configuring the assigned cluster computing device to process network traffic associated with the network flow.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×