NETCONF/DMI-based secure network device discovery
First Claim
1. A method comprising:
- determining, by a network device, that a device has been added to a network management system associated with the network device,the device utilizing a network management protocol that requires the device to initiate a connection with the network device;
generating, by the network device, configuration information for establishing the connection between the network device and the device;
accessing, by the network device, the device,accessing the device including logging into the device using secure shell version 2 (SSH v2) credentials;
providing, by the network device and based on accessing the device, the configuration information for establishing the connection to the device to cause the device to establish the connection;
logging off, by the network device, from the device based on the configuration information having been provided to the device;
determining, by the network device, that the device has established the connection;
receiving, by the network device, device configuration information from the device via the connection; and
providing, by the network device, the device configuration information to the network management system,the device configuration information being usable by the network management system to manage the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system receives discovery rule inputs that include addresses, verifies one or more device identifiers for one or more addresses, obtains device information from each verified device associated with the one or more verified device identifiers, determines whether each verified device is a discovered device based on the device information, and automatically adds each verified device as a discovered device to a management system without human intervention when it is determined that the verified device is discovered. The system further creates device configuration information, creates an identifier and password, provides device configuration information, the identifier, and the password, to each of the discovered devices based on the NETCONF or the Device Management Interface standards, waits for a connection from the discovered devices, imports device configuration information from the discovered devices when the connection has been established, and indicates that the discovered devices are managed devices.
-
Citations
20 Claims
-
1. A method comprising:
-
determining, by a network device, that a device has been added to a network management system associated with the network device, the device utilizing a network management protocol that requires the device to initiate a connection with the network device; generating, by the network device, configuration information for establishing the connection between the network device and the device; accessing, by the network device, the device, accessing the device including logging into the device using secure shell version 2 (SSH v2) credentials; providing, by the network device and based on accessing the device, the configuration information for establishing the connection to the device to cause the device to establish the connection; logging off, by the network device, from the device based on the configuration information having been provided to the device; determining, by the network device, that the device has established the connection; receiving, by the network device, device configuration information from the device via the connection; and providing, by the network device, the device configuration information to the network management system, the device configuration information being usable by the network management system to manage the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A network device comprising:
-
a memory storing instructions, a processor that executes the instructions to; determine that a device has been added to a network management system, the device utilizing a network management protocol that requires the device to initiate a connection with the network device, the network management system being associated with the network device; generate, based on the device having been added to the network management system, configuration information for establishing the connection between the network device and the device; access the device based on logging into the device using secure shell version 2 (SSH v2) credentials; provide, based on accessing the device, the configuration information for establishing the connection to the device to cause the device to establish the connection; log off from the device based on the configuration information having been provided to the device; receive, via the connection established by the device, device configuration information from the device; and provide the device configuration information to the network management system, the device configuration information being usable by the network management system to manage the device. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by a processor of a network device, cause the processor to; determine that a device has been added to a network management system associated with the network device, the device utilizing a network management protocol that requires the device to initiate a connection with the network device; generate, based on the device having been added to the network management system, configuration information for establishing the connection between the network device and the device; access the device based on logging into the device using secure shell version 2 (SSH v2) credentials; provide, based on accessing the device, the configuration information for establishing the connection to the device to cause the device to establish the connection; log off from the device based on the configuration information having been provided to the device; determine that the device has established the connection; receive device configuration information from the device via the connection; and provide the device configuration information to the network management system, the device configuration information being usable by the network management system to manage the device. - View Dependent Claims (17, 18, 19, 20)
Specification