IDENTITY-BASED NETWORKING
First Claim
Patent Images
1. A system comprising:
- a network database including VLAN information;
a first network domain seed coupled to the network database;
a second network domain seed coupled to the network database and the first network domain seed;
a first network domain member coupled to the first network domain seed;
a second network domain member coupled to the second network domain seed;
wherein, in operation, a client that is authorized on the second network domain member attempts to connect to the first network domain member, the first network domain seed performs a lookup in the network database and determines that the client is authorized on the second network domain member, and, based on the determination, the client is connected from the first network domain member to the second network domain member via VLAN tunneling.
3 Assignments
0 Petitions
Accused Products
Abstract
A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.
130 Citations
20 Claims
-
1. A system comprising:
-
a network database including VLAN information; a first network domain seed coupled to the network database; a second network domain seed coupled to the network database and the first network domain seed; a first network domain member coupled to the first network domain seed; a second network domain member coupled to the second network domain seed; wherein, in operation, a client that is authorized on the second network domain member attempts to connect to the first network domain member, the first network domain seed performs a lookup in the network database and determines that the client is authorized on the second network domain member, and, based on the determination, the client is connected from the first network domain member to the second network domain member via VLAN tunneling. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving a log-in request from a client coupled to a first network domain member; requesting from a network domain seed VLAN information associated with the client configuration on a second network domain member; receiving the VLAN information at the first network domain member; determining, using the VLAN information, that the client is configured on a the second network domain member; connecting the client from the first network domain member to the second network domain member via VLAN tunneling. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a means for receiving a log-in request from a client coupled to a first network domain member; a means for requesting from a network domain seed VLAN information associated with the client configuration on a second network domain member; a means for receiving the VLAN information at the first network domain member; a means for determining, using the VLAN information, that the client is configured on a the second network domain member; a means for connecting the client from the first network domain member to the second network domain member via VLAN tunneling. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification