The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 23, 2009

Filed:

Oct. 22, 2004
Applicants:

Premkumar Jonnala, Santa Clara, CA (US);

Adam J. Sweeney, Sunnyvale, CA (US);

Dehua Huang, Fremont, CA (US);

Silviu Dobrota, San Jose, CA (US);

Pradeep S. Sudame, Fremont, CA (US);

Marco E. Foschiano, To, IT;

Inventors:

Premkumar Jonnala, Santa Clara, CA (US);

Adam J. Sweeney, Sunnyvale, CA (US);

Dehua Huang, Fremont, CA (US);

Silviu Dobrota, San Jose, CA (US);

Pradeep S. Sudame, Fremont, CA (US);

Marco E. Foschiano, To, IT;

Assignee:

Cisco Technology, Inc., San Jose, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 5/12 (2006.01);
U.S. Cl.
CPC ...
Abstract

Users are allowed to specify per-interface rate limits for inter-layer binding protocol traffic. If the user-specified rate limit is exceeded on a given interface, inter-layer binding protocol messages received via that interface are caused to be dropped (e.g., by selectively dropping ILBP messages, or by simply shutting down the interface). If the rate is not exceeded, inter-layer binding protocol messages received via that interface can be validated (e.g., by comparing an inter-layer binding included in the body of an inter-layer binding protocol message to protocol status information obtained by snooping protocol messages). If the inter-layer binding does not match the protocol status information, the inter-layer binding protocol message is dropped. If a match is found, the inter-layer binding protocol message is allowed to be forwarded normally. Such systems and methods may be used to inhibit various undesirable network behavior, such as man-in-the-middle attacks.


Find Patent Forward Citations

Loading…