白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Bulk discovery of devices behind a network address translation device

專利號
US11159370B2
公開日期
2021-10-26
申請人
Juniper Networks, Inc.(US CA Sunnyvale)
發(fā)明人
Pradeep H. Krishnamurthy; Chandrasekhar A; Rahamath Sharif; Raviraj Satish Deshmukh
IPC分類
H04L12/28; H04L12/24; H04L12/46; H04L29/12; H04W8/00
技術(shù)領(lǐng)域
network,management,devices,seed,device,14a,system,may,ssh,tunneled
地域: CA CA Sunnyvale

摘要

In one example, a network management system discovers a plurality of network devices behind a network address translation device, such as a firewall. The network management system may receive a model of a seed network device, generate a first activation configuration and commit the first activation configuration on the seed network device. The network management system may connect to the seed network device and discover neighboring devices from information in the seed network device. The network management system may connect to the neighboring devices, automatically create a model of the neighboring network devices, generate s activation configurations for the neighboring network devices and commit the activation configurations on the neighboring network devices. The network management system may iterative perform these steps until it discovers all the discoverable network devices behind the network address translation device.

說明書

In general, network management system 10 maintains working drafts of candidate configurations to be applied to network devices 14, prior to committing configuration changes to network devices 14, e.g., in a private data store. Network management system devices that support a private data store persist private copies of data in the private data store separately, until the private copy is committed to a database. Data change requests in one draft need to be checked for conflicts with other drafts and persist the changes. This occurs in the business layer and conflicts detection does not occur in real time. Examples of techniques for detection of conflicts across multiple proposed changes to configuration data is discussed in greater detail in Chandrasekhar et al., “PROCESSING MULTIPLE PARALLEL HIGH LEVEL CONFIGURATION CHANGES FOR MANAGED NETWORK DEVICES,” U.S. Pat. No. 10,374,886, issued on Aug. 6, 2019, the entire contents of which are hereby incorporated by reference.

In the example of FIG. 1, network devices 14A-14G are behind NAT device 16 with respect to network management system 10. In this example, network management system 10 may also manage other network devices (not shown) that are not behind a NAT device with respect to network management system 10. For example, network management system 10 may manage network devices in network 8. With a configuration like the example of FIG. 1, typically network devices 14A-G would have to be manually added on to network management system 10 as discussed above.

權(quán)利要求

1
微信群二維碼
意見反饋