Patents Assigned to Enterasys Networks, Inc.
  • Patent number: 9130826
    Abstract: A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 8, 2015
    Assignee: Enterasys Networks, Inc.
    Inventors: Markus Nispel, David Kjendal, Michael Rash, Richard Graham
  • Patent number: 8972589
    Abstract: A request for network access is received from a client device at a network entry device of a network infrastructure. The network infrastructure determines a physical location of the client device and determines authorization of the client device based on the physical location. The approach can include providing the physical location along with other user credentials to an authorizing device. The method can also include determining a level of service based on the physical location. Communication for the approach can make use of the IEEE 802.1X protocol.
    Type: Grant
    Filed: February 28, 2003
    Date of Patent: March 3, 2015
    Assignee: Enterasys Networks, Inc.
    Inventors: John J. Roese, Richard W. Graham, David Frattura, David Harrington
  • Publication number: 20140282823
    Abstract: A function is provided in a network system for adjusting network policies associated with the operation of network infrastructure devices of the network system. Network policies are established on network devices including packet forwarding devices. The network has a capability to identify computer applications associated with traffic running on the network. A network policy controller of the network is arranged to change one or more policies of one or more network devices based on computer application information acquired. The policies changed may be network policies as well as mirroring policies. An example policy to change is direct a network device to mirror traffic to an application identification appliance for the purpose of identifying applications running on the network through a plurality of mechanisms. The function may be provided in one or more devices of the network.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Michael Rash, Markus Nispel, Jamie Woodhead, Richard Graham
  • Publication number: 20140279768
    Abstract: A function is provided for effectively identifying computer applications running on a network. The function receives information related to frames of packets moving through the network. The information is compared to known information about computer applications. The known information is obtained from a plurality of mechanisms, including the option of obtaining it through custom mechanisms. The comparison information is scored for each of the plurality of mechanisms and those scores are combined to establish a single score indicative of the likely computer application associated with the received frames. One or more mathematical operations can be used to combine the scores. The mechanisms may be weighted for likely accuracy and the score that is established may include with it an indication of the level of confidence in that score. One or more of the plurality of mechanisms may be used to weight others of the types of mechanisms.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Publication number: 20140280829
    Abstract: A function is provided in a network system for the dynamic mirroring of network traffic for a variety of purposes including the identification of characteristics of the traffic. Multiple criteria are established for when, what and where to mirror the traffic. The criteria include what frames of traffic to mirror, what portions of the selected frames to mirror, one or more portals through which to mirror the selected frames, a destination for the mirroring and the establishment of a mirror in a device to carry out the mirroring. The criteria may also include when to stop the mirroring. The mirroring instructions can be changed based on the detection of a triggering event, such as authentication, device type or status, ownership of an attached function attached to the device, flow status, but not limited to that. The function may be established in one or more devices of the network.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Enterasys Networks, Inc.
    Inventors: David Kjendal, Markus Nispel, Ernie Eaton, Richard Graham, Jeffrey Haskell
  • Publication number: 20140280211
    Abstract: A function is provided for identifying computer applications running on a network. Information obtained from frames having content associated with computer applications is examined and compared to information stored on the network. The stored information is obtained from a plurality of mechanisms including computer application signatures. An application identification engine of the function compares examined content with the known application information and determines an indication of the likely computer application associated with the examined frames. The determination output may include a level of confidence in the accuracy of the determination. The function includes an application programming interface to allow the introduction into the engine of custom mechanisms for application identification. The different mechanisms may be weighted. The function may be provided in one or more devices of the network including a standalone appliance.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: Enterasys Networks, Inc.
    Inventors: Michael Rash, Patrick Bosa, Richard Graham
  • Publication number: 20140280889
    Abstract: A network architecture system that expands the control network administrators have on existing networks. The system provides application identification and usage data by user, by device and network location. Dynamic traffic mirroring of the system allows for the efficient use of a tool to identify computer applications running on the network. The system includes the ability to embed the tool where needed rather than pervasively based on the use of the dynamic mirroring to bring the packets to the tool. The architecture implemented functions allow the ability to start small with a single application identification tool added to a network management server, examine flows from throughout the network (via mirroring) and upgrade policy control based on real application identification data and usage, then grow to pervasive deployment where virtually all new flows could be identified and controlled via policy. This architecture enables substantially complete application visibility and control.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: ENTERASYS NETWORKS, INC.
    Inventors: Markus Nispel, David Kjendal, Michael Rash, Richard Graham
  • Patent number: 8462794
    Abstract: Connection-oriented services for packet switched data communications networks are provided, including distributed MAC and protocol alias addresses discovery. Link state topology exchanges provide each switch with network topology graphs to determine paths from source to destination end systems. Broadcast frames are resolved to unicast frames to reduce broadcast traffic. Policy restrictions may be applied prior to connection setup. Connection management includes source-routed mapping of connections on the desired path. Distributed call rerouting is provided so switches receive topology change notifications and unmap failed link connections. Broadcast/unknown services provide non-resolvable packet restricted flooding. Connection-oriented switching is provided based on source and destination MAC addresses. Resolution of networks outside the switch domain is enabled by listening for network and server route advertisements and maintaining best routes to the networks and servers.
    Type: Grant
    Filed: March 23, 2010
    Date of Patent: June 11, 2013
    Assignee: Enterasys Networks, Inc.
    Inventors: Kurt Dobbins, Thomas A. Grant, David J. Ruffen, Laura Kane, Theodore Len, Philip Andlauer, David H. Bahi, Kevin Yohe, Brendan Fee, Chris Oliver, David L. Cullerot, Michael Skubisz
  • Patent number: 8347375
    Abstract: The intrusion detection function monitors for and reports detected intrusion signatures. The dynamic intrusion signatures function determines whether reported intrusion signatures exist in a library of signatures associated with a particular intrusion detection function. If the reported signature does not exist in the library, the library is updated. Detected intrusion signatures are reported to similarly enabled devices for library analysis and updating, if necessary. The related method includes the steps of monitoring for intrusion signatures or other triggering events, analyzing the events and updating IDS signature libraries as necessary.
    Type: Grant
    Filed: October 1, 2004
    Date of Patent: January 1, 2013
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard W. Graham, John J. Roese
  • Patent number: 8239960
    Abstract: Systems and methods are provided for preserving the privacy of data contained in mirrored network traffic. The mirrored network traffic may comprise data that may be considered confidential, privileged, private, or otherwise sensitive data. For example, the data payload of a frame of mirrored network traffic may include private Voice over IP (VoIP) communications between users on one or more networks. The present invention provides various techniques for securing the privacy of data contained in the mirrored network traffic. Using the techniques of the present invention, network traffic comprising confidential, privileged, private, or otherwise sensitive data may be mirrored in such a manner as to provide for the privacy of such data over at least a portion if not all of the mirrored communications between the mirror source point and the mirror destination point.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: August 7, 2012
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham, John Roese
  • Patent number: 8191107
    Abstract: A lost contact policy response system and related method for adjusting the operation of one or more network infrastructure devices upon detection of a loss of contact with a policy server function. The response system includes a policy enforcement function (“PEF”), a policy manager function, and either or both of policy set(s) and policy enforcement rule (“PER”) set(s). The PEF implements stored or generated PER set(s). The policy manager function includes a monitoring function and an analysis function. The monitoring function monitors for continuing connectivity or signal exchange contact with a network policy server function. The analysis function selects a designated policy, policy set, PER or PER set, and instructs the PEF to implement the selected policy, PER or set. The policy and/or PER sets may be pre-installed, updated, re-installed, revised, or otherwise changed when and as desired. The related method includes corresponding steps for implementing the operations of the functions described.
    Type: Grant
    Filed: March 30, 2010
    Date of Patent: May 29, 2012
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard W. Graham
  • Patent number: 8166151
    Abstract: It is realized that the use of a spanning tree protocol in particular portions of a network may not necessarily be desired due to performance and stability reasons. A method and system is provided for executing a revised spanning tree algorithm that performs more optimally in particular network topologies. In one aspect, a spanning tree protocol is executed over a first and second network connected by a third network, wherein the spanning tree network is disabled in the third network. The third network may be, for example, a core network through which first and second Layer 2 networks are bridged. The first and second networks may be coupled by another network or network connection, and it may be preferable to allow the operation of the spanning tree network between the first and second coupled networks for the purpose of fail over to redundant paths.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: April 24, 2012
    Assignee: Enterasys Networks, Inc.
    Inventor: Demetrios James Tsillas
  • Patent number: 8086232
    Abstract: A scanning method, computer readable medium, and device for suspending, during a first data scanning sequence including a plurality of discrete data scanning intervals, data scanning operations during at least one discrete data scanning interval chosen from the plurality of discrete data scanning intervals. A data transmission operation is performed during the at least one discrete data scanning interval.
    Type: Grant
    Filed: June 28, 2006
    Date of Patent: December 27, 2011
    Assignee: Enterasys Networks, Inc.
    Inventor: Venkatraman G. Krishnan
  • Patent number: 8040890
    Abstract: A method and apparatus are provided for creating a virtual hierarchical local area network. The method and apparatus provide a hierarchical framing technique that allows a network architecture to realize a local area network hierarchy within the network. In this manner, a first local area network hierarchy is defined by communication in a first frame format between a first set of network devices and a second set of network devices. A second local area network hierarchy is defined by communication in a second frame format between members of the second set of network devices. The second frame format includes the fields of a frame in the first frame format that is used to communicate between the first set of communication devices and the second set of communication devices.
    Type: Grant
    Filed: March 27, 2009
    Date of Patent: October 18, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Arnold Sodder, Timothy Mancour, Louis Didiodato
  • Patent number: 8023521
    Abstract: Methods and apparatus for the provision of differentiated services in a packet-based network may be provided in a communications device such as a switch or router having input ports and output ports. Each output port is associated with a set of configurable queues that store incoming data packets from one or more input ports. A scheduling mechanism retrieves data packets from individual queues in accord with a specified configuration, providing both pure priority and proportionate de-queuing to achieve a guaranteed QoS over a connectionless network.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: September 20, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Leon K. Woo, Robert Ryan, John B. Crowther
  • Patent number: 8023515
    Abstract: Connection-oriented services for packet switched data communications networks are provided, including distributed MAC and protocol alias addresses discovery. Link state topology exchanges provide each switch with network topology graphs to determine paths from source to destination end systems. Broadcast frames are resolved to unicast frames to reduce broadcast traffic. Policy restrictions may be applied prior to connection setup. Connection management includes source-routed mapping of connections on the desired path. Distributed call rerouting is provided so switches receive topology change notifications and unmap failed link connections. Broadcast/unknown services provide non-resolvable packet restricted flooding. Connection-oriented switching is provided based on source and destination MAC addresses. Resolution of networks outside the switch domain is enabled by listening for network and server route advertisements and maintaining best routes to the networks and servers.
    Type: Grant
    Filed: March 23, 2010
    Date of Patent: September 20, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Kurt Dobbins, Thomas A. Grant, David J. Ruffen, Laura Kane, Theodore Len, Philip Andlauer, David H. Bahi, Kevin Yohe, Brendan Fee, Chris Oliver, David L. Cullerot, Michael Skubisz
  • Patent number: 7990981
    Abstract: Connection-oriented services for packet switched data communications networks are provided, including distributed MAC and protocol alias addresses discovery. Link state topology exchanges provide each switch with network topology graphs to determine paths from source to destination end systems. Broadcast frames are resolved to unicast frames to reduce broadcast traffic. Policy restrictions may be applied prior to connection setup. Connection management includes source-routed mapping of connections on the desired path. Distributed call rerouting is provided so switches receive topology change notifications and unmap failed link connections. Broadcast/unknown services provide non-resolvable packet restricted flooding. Connection-oriented switching is provided based on source and destination MAC addresses. Resolution of networks outside the switch domain is enabled by listening for network and server route advertisements and maintaining best routes to the networks and servers.
    Type: Grant
    Filed: March 23, 2010
    Date of Patent: August 2, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Kurt Dobbins, Thomas A. Grant, David J. Ruffen, Laura Kane, Theodore Len, Philip Andlauer, David H. Bahi, Kevin Yohe, Brendan Fee, Chris Oliver, David L. Cullerot, Michael Skubisz
  • Patent number: 7945945
    Abstract: A method, computer readable medium, and system for acquiring address block information for an attached function that initiates network access on a distributed computing network. Additional policy information in acquired concerning the attached function. One or more access policies are set based, at least in part, on the address block information and the additional policy information.
    Type: Grant
    Filed: August 8, 2005
    Date of Patent: May 17, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: Richard Graham, John Roese
  • Patent number: 7936770
    Abstract: A method and apparatus are provided that allows for the representation of a larger number of classes of network traffic and logical queues than is physically available on a per port basis within a network device. A number of logical queues, whose number can match the number of classes of network traffic a network device handles, may be supported across an aggregated set of ports even though the network device has fewer physical queues per port than there are classes of network traffic. The method and apparatus improve the management of network traffic sensitive to time delay and jitter, and further facilitates the operation of these applications in a simultaneous or near simultaneous manner.
    Type: Grant
    Filed: March 8, 2006
    Date of Patent: May 3, 2011
    Assignee: Enterasys Networks, Inc.
    Inventors: David E. Frattura, Richard Graham, John Roese
  • Publication number: 20110072286
    Abstract: The present invention provides method and systems for activating or deactivating network devices by managing the power of the network device. By controlling the power for network devices, the size and coverage of the network can be adjusted to meet the needs for the current usage. This can be particularly advantageous in wireless networks where multiple wireless access points may be provided to provide coverage during peak usage but present the additional security concern of the network being accessible to unauthorized users. Being able to power down unneeded wireless access points during off-peak usage allows for the minimization of such potential security concerns.
    Type: Application
    Filed: July 12, 2010
    Publication date: March 24, 2011
    Applicant: Enterasys Networks, Inc.
    Inventor: Richard W. GRAHAM