Claims
- 1. A packet forwarding device for processing a data packet, the packet forwarding device comprising:
an input port, the input port being operable to receive a data packet; a processor, the processor being connected to the input port and being operable to:
determine a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination; and apply the set of rules to the data packet; and an output port, the output port being connected to the processor and being operable to:
output the data packet to its virtual local area network destination, using the result from the application of the rules if a virtual local area network destination has been determined for the received data packet; and drop the data packet if a virtual local area network destination has not been determined for the received data packet.
- 2. The packet forwarding device of claim 1, wherein the processor further is operable to apply a traffic policy to the received data packet, the traffic policy being associated with the packet forwarding device and applied to all data packets processed by the packet forwarding device.
- 3. The packet forwarding device of claim 1, wherein the processor is operable to determine a virtual local area network destination by:
extracting layer information from the data packet, the layer information being selected from the group consisting of layer 2 information, layer 3 information, layer 4 information and layer 7 information; and using the extracted layer information to determine a virtual local area network destination for the data packet.
- 4. The packet forwarding device of claim 1, wherein the processor is operable to apply the set of rules to the data packet by:
shaping the data packet based on the virtual local area network destination; and discarding the data packet if no virtual local area network destination is determined.
- 5. The packet forwarding device of claim 4, wherein shaping the data packet comprises:
attaching a digital address tag to the data packet, the digital address tag identifying a virtual local area network destination; and further comprising reading the digital address tag and outputting the data packet using the digital address tag content.
- 6. The packet forwarding device of claim 1, wherein the processor is operable to apply the set of rules to the data packet by applying a set of rules selected from the group consisting of network address translation, mobile internet protocol, virtual internet protocol, user authentication and URL blocking.
- 7. The packet forwarding device of claim 1, wherein the processor is operable to apply the set of rules to the data packet by applying a set of policies selected from the group consisting of incoming policies and outgoing policies for a virtual local area network destination.
- 8. The packet forwarding device of claim 7, wherein the processor further is operable to:
retrieve entries from one or more of a global address book, a private address book, and a global service book; and wherein applying the rules to the data packet comprises using the retrieved entries.
- 9. The packet forwarding device of claim 1, wherein the processor further is operable to:
determine available resources for outputting the data packet to the virtual private network destination, the resources being definable by a user; and wherein outputting the data packet comprises:
outputting the data packet to a determined virtual private network destination in accordance with the determined available resources.
- 10. The packet forwarding device of claim 1, wherein the processor further is operable to apply the set of rules to the data packet by applying a set of virtual tunneling rules for a virtual local area network destination, the tunneling rules being selected from the group consisting of PPTP, L2TP and IPSec tunneling protocols.
- 11. The packet forwarding device of claim 1, wherein outputting the data packet comprises:
if a virtual local area network destination has been determined for the received data packet, reading a set of entries in a private routing table; and outputting the data packet to its virtual local area network destination using a routing protocol for the packet's virtual local area network destination.
- 12. The packet forwarding device of claim 1, wherein the processor further is operable to receive a set of rules configured by a user.
- 13. The packet forwarding device of claim 1, further comprising a management module, the management module being operable to associate one or more management settings with a virtual local area network, the management settings being selected from the group consisting of administrator tools, logging, counting, alarming and notification facilities.
- 14. The packet forwarding device of claim 13, wherein the management module further is operable to set up additional VLAN destinations.
- 15. The packet forwarding device of claim 1, further comprising a user interface, the user interface being operable to display a unique user interface for each virtual local area network.
- 16. A method for processing a data packet in a packet forwarding device, the method comprising:
receiving a data packet; determining a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination; applying the set of rules to the data packet; and if a virtual local area network destination has been determined for the received data packet, outputting the data packet to its virtual local area network destination, using the result from the application of the rules, and if a virtual local area network destination has not been determined for the received data packet, dropping the data packet.
- 17. The method of claim 16, further comprising applying a traffic policy to the received data packet, the traffic policy being associated with the packet forwarding device and applied to all data packets processed by the packet forwarding device.
- 18. The method of claim 16, wherein determining a virtual local area network destination comprises:
extracting layer information from the data packet, the layer information being selected from the group consisting of layer 2 information, layer 3 information, layer 4 information and layer 7 information; and using the extracted layer information to determine a virtual local area network destination for the data packet.
- 19. The method of claim 16, wherein applying the rules to the data packet comprises:
shaping the data packet based on the virtual local area network destination; and discarding the data packet if no virtual local area network destination is determined.
- 20. The method of claim 19, wherein shaping the data packet comprises:
attaching a digital address tag to the data packet, the digital address tag identifying a virtual local area network destination; and further comprising reading the digital address tag and outputting the data packet using the digital address tag content.
- 21. The method of claim 16, wherein applying the rules to the data packet comprises applying a set of rules selected from the group consisting of network address translation, mobile internet protocol, virtual internet protocol, user authentication and URL blocking.
- 22. The method of claim 16, wherein applying the rules to the data packet comprises applying a set of policies selected from the group consisting of incoming policies and outgoing policies for a virtual local area network destination.
- 23. The method of claim 22, further comprising:
retrieving entries from one or more of a global address book, a private address book, and a global service book; and wherein applying the rules to the data packet comprises using the retrieved entries.
- 24. The method of claim 16, further comprising:
determining available resources for outputting the data packet to the virtual private network destination, the resources being definable by a user; and wherein outputting the data packet comprises: outputting the data packet to a determined virtual private network destination in accordance with the determined available resources.
- 25. The method of claim 16, wherein applying the rules to the data packet comprises applying a set of virtual tunneling rules for a virtual local area network destination, the tunneling rules being selected from the group consisting of PPTP, L2TP and IPSec tunneling protocols.
- 26. The method of claim 16, wherein outputting the data packet comprises:
if a virtual local area network destination has been determined for the received data packet, reading a set of entries in a private routing table; and outputting the data packet to its virtual local area network destination using a routing protocol for the packet's virtual local area network destination.
- 27. The method of claim 1, further comprising receiving a set of rules configured by a user.
- 28. A data processing system for processing data packets transferred over a network, the data processing system comprising:
a firewall engine, the firewall engine being operable to:
receive a set of firewall policies; and apply the firewall policies to a data packet; an authentication engine, the authentication engine being operable to:
receive a set of authentication policies; and authenticate a data packet in accordance with the authentication policies; one or more virtual private networks, each virtual private network having an associated destination address and policies; and a controller being operable to:
detect an incoming data packet; examine the incoming data packet for a virtual private network destination address; identify the policies associated with the virtual private network destination; if the policies include firewall policies, then call the firewall engine and apply the set of firewall policies corresponding to the virtual private network destination to the data packet; if the policies include authentication policies, then call the authentication engine and apply the set of authentication policies corresponding to the virtual private network destination to the data packet; and route the data packet to the virtual private network containing the data packet's destination address.
- 29. The data processing system of claim 28, wherein the controller is operable to examine the incoming data packet by:
extracting layer information from the data packet, the layer information being selected from the group consisting of layer 2 information, layer 3 information, layer 4 information and layer 7 information; and using the extracted layer information to determine a virtual private network destination address.
- 30. The data processing system of claim 28, wherein the authentication policies include one or more of: network address translation, mobile internet protocol, virtual internet protocol, user authentication and URL blocking.
- 31. The data processing system of claim 28, wherein the firewall policies include one or more of: incoming policies and outgoing policies for a virtual local area network destination.
- 32. The data processing system of claim 28, wherein the controller is operable to route the data packet by:
reading a set of entries in a private routing table; and outputting the data packet to its virtual private network destination address using a routing protocol associated with the packet's virtual private network destination address.
- 33. A method for screening data packets transferred over a network, the method comprising:
connecting to one or more virtual local area networks; associating a set of firewall configuration settings with each of the one or more virtual local area networks; receiving an incoming data packet; screening the incoming data packet in accordance with a set of firewall configuration settings; and outputting the screened data packet to a particular virtual local area network among the one or more virtual local area networks, based on the result of the screening.
- 34. The method of claim 33, further comprising applying a traffic policy to the received data packet, the traffic policy being applied to all incoming data packets independent of the packets' local area network destination.
- 35. The method of claim 33, wherein screening the data packet comprises applying a set of rules selected from the group consisting of network address translation, mobile internet protocol, virtual internet protocol, user authentication and URL blocking.
- 36. The method of claim 33, wherein screening the data packet comprises applying a set of policies selected from the group consisting of incoming policies and outgoing policies for a virtual local area network destination.
- 37. The method of claim 33, further comprising:
determining available resources for outputting the data packet to the virtual local area network destination, the resources being definable by a user; and wherein outputting the data packet comprises: outputting the data packet to a determined virtual local area network destination in accordance with the determined available resources.
- 38. The method of claim 33, wherein outputting the data packet comprises:
if a virtual local area network destination has been determined for the received data packet, reading a set of entries in a private routing table; and outputting the data packet to its virtual local area network destination using a routing protocol for the packet virtual local area network destination.
- 39. A packet processing system in a network for transferring packets of data, comprising: one or more packet processing engines, each packet processing engine being operable to:
receive an incoming packet of data; apply a global traffic policy to the incoming packet; classify the incoming packet including determining a virtual local area network destination; shape the incoming packet based on the virtual local area network destination; and output the shaped packet.
- 40. The packet processing system of claim 39, further including one or more switches connected to the packet processing engine by a trunk cable and being operable to:
receive the shaped packet from the packet processing engine through the trunk cable; determine a destination device to which the shaped packet is to be routed; and switch the shaped packet to a communication link that is connected to the destination device.
- 41. The packet processing system of claim 40, wherein the trunk cable is a VLAN cable.
- 42. The packet processing system of claim 40, wherein
a first packet processing engine of the one or more packet processing engines is connected to a first switch of the one or more switches, and cross connected to at least a second switch of the one or more switches; and a second packet processing engine of the one or more packet processing engines is connected to the second switch of the one or more switches, and cross connected to at least the first switch of the one or more switches.
- 43. The packet processing system of claim 42, wherein each of the first and second switches operable to connect to one or more communication links, each communication link representing a virtual local area network destination.
- 44. The packet processing system of claim 42, further comprising a trunk cable connecting a switch and a packet processing engine.
- 45. The packet processing system of claim 42, consisting of:
a first packet processing engine connected to a first switch of the one or more switches, and cross connected to a second switch; and a second packet processing engine connected to the second switch, and cross connected to the first switch, each of the first and second switches being operable to connect to one or more communication links, each communication link representing a virtual local area network destination.
- 46. The packet processing system of claim 40, further comprising one or more virtual local area networks (VLANs), each virtual local area network being connected to the one or more switches via a communication link dedicated for the virtual local area network.
- 47. The packet processing system of claim 39, wherein outputting the packet comprises outputting the shaped packet to its virtual local area network destination through a destination port on the packet processing engine, the destination port connecting the packet processing engine via a communication link to a destination device.
- 48. The packet processing system of claim 47, further comprising one or more virtual local area networks (VLANs), each virtual local area network being connected to a destination port on the packet processing engine via a communication link dedicated for the virtual local area network.
- 49. The packet processing system of claim 39, wherein each packet processing engine is operable to perform one or more functions that are configurable for each virtual local area network.
- 50. A security system, comprising:
security system resources including firewall services; and a controller operable to partition the security system resources into a plurality of separate security domains, each security domain being configurable to enforce one or more policies relating to a specific subsystem, and to allocate security system resources to the one or more security domains.
- 51. The security system of claim 50, wherein the security system further is operable to allocate security system resources to a specific subsystem.
- 52. The security system of claim 50, wherein the specific subsystem is a computer network.
- 53. The security system of claim 50, wherein the specific subsystem is a device connected to a computer network.
- 54. The security system of claim 50, wherein each security domain includes a user interface for viewing and modifying a set of policies relating to a specific subsystem.
- 55. The security system of claim 54, wherein the security system resources further include authentication services.
- 56. The security system of claim 54, wherein the security system resources further include virtual private network (VPN) services.
- 57. The security system of claim 54, wherein the security system resources further include traffic management services.
- 58. The security system of claim 51, wherein the security system resources further include encryption services.
- 59. The security system of claim 54, wherein the security system resources further include one or more of: administrative tools, logging, counting, alarming and notification facilities, and resources for setting up additional subsystems.
- 60. The security system of claim 50, further comprising a management device operable to provide a service domain, the service domain being configurable to enforce one or more policies for all security domains.
- 61. The security system of claim 60, wherein the management device includes a user interface for viewing, adding and modifying any set of policies associated with any specific subsystem and the set of policies associated with the service domain.
- 62. The security system of claim 60, wherein the service domain includes a global address book.
- 63. The security system of claim 50, wherein each set of security domain policies includes one or more policies for incoming data packets, policies for outgoing packets, policies for virtual tunneling, authentication policies, traffic regulating policies and firewall policies.
- 64. The security system of claim 63, wherein the policies for virtual tunneling are selected from the group consisting of PPTP, L2TP and IPSec tunneling protocols.
- 65. The security system of claim 50, wherein one or more of the plurality of security domains include a unique address book.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of prior U.S. provisional application No. 60/280,684, filed Mar. 30, 2001.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60280684 |
Mar 2001 |
US |