Provisioning remote access points
First Claim
1. A computer implemented method, comprising:
- establishing, at a network device, a wired network connection;
generating a query requesting controller information, wherein generating includes receiving a request for a web page and transmitting a query web page that is different from the requested web page, and wherein the query web page requests the controller information;
receiving input corresponding to a determination of the controller information;
transmitting a controller connection request using the controller information, wherein the controller connection request is transmitted using the wired network connection, wherein the controller connection request includes an identifier of the network device, wherein receiving the controller connection request at a network controller causes the network controller to query a whitelist for the identifier of the network device, and wherein the identifier of the network device is stored as a digital certificate;
receiving a response to the controller connection request;
establishing a controller connection using the response;
receiving configuration information over the controller connection; and
installing the configuration information.
3 Assignments
0 Petitions
Accused Products
Abstract
Provisioning remote access points for use in a telecommunication network. A remote access point contains identity information established during manufacturing; this identity information may be in the nature of a digital certificate. The identity information is stored in the remote access point, and may be stored in a Trusted Platform Module if present. When the remote access node is powered up in unprovisioned state, outside the manufacturing environment, it attempts to establish an internet connection via a first wired interface, and queries a user for information representing the TCP/IP address of its controller via a second wired interface. Once an internet connection is present, and a TCP/IP address has been provided, the remote access point attempts to connect to the controller at that address. Once a connection is established, controller and access point exchange and verify each other'"'"'s identities.
36 Citations
15 Claims
-
1. A computer implemented method, comprising:
-
establishing, at a network device, a wired network connection; generating a query requesting controller information, wherein generating includes receiving a request for a web page and transmitting a query web page that is different from the requested web page, and wherein the query web page requests the controller information; receiving input corresponding to a determination of the controller information; transmitting a controller connection request using the controller information, wherein the controller connection request is transmitted using the wired network connection, wherein the controller connection request includes an identifier of the network device, wherein receiving the controller connection request at a network controller causes the network controller to query a whitelist for the identifier of the network device, and wherein the identifier of the network device is stored as a digital certificate; receiving a response to the controller connection request; establishing a controller connection using the response; receiving configuration information over the controller connection; and installing the configuration information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
one or more processors; and a non-transitory computer readable storage medium communicatively coupled to the one or more processors, wherein the non-transitory computer readable storage medium includes instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including; establishing a wired network connection; generating a query requesting controller information, wherein generating includes receiving a request for a web page and transmitting a query web page that is different from the requested web page, and wherein the query web page requests the controller information; receiving input corresponding to a determination of the controller information; transmitting a controller connection request using the controller information, wherein the controller connection request is transmitted using the wired network connection, wherein the controller connection request includes an identifier of the system, wherein receiving the controller connection request at a network controller causes the network controller to query a whitelist for the identifier of the system, and wherein the identifier of the system is stored as a digital certificate; receiving a response to the controller connection request; establishing a controller connection using the response; receiving configuration information over the controller connection; and installing the configuration information. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium comprising instructions that, when executed by one or more processors, cause the one or more processors to perform operations including:
-
establishing, at a network device, a wired network connection; generating a query requesting controller information, wherein generating includes receiving a request for a web page and transmitting a query web page that is different from the requested web page, and wherein the query web page requests the controller information; receiving input corresponding to a determination of the controller information; transmitting a controller connection request using the controller information, wherein the controller connection request is transmitted using the wired network connection, wherein the controller connection request includes an identifier of the network device, wherein receiving the controller connection request at a network controller causes the network controller to query a whitelist for the identifier of the network device, and wherein the identifier of the network device is stored as a digital certificate; receiving a response to the controller connection request; establishing a controller connection using the response; receiving configuration information over the controller connection; and installing the configuration information. - View Dependent Claims (12, 13, 14, 15)
-
Specification