Arista Networks, Inc.
INTERCONNECTING NETWORKS OPERATING DIFFERENT TYPES OF CONTROL PLANES
Last updated:
Abstract:
Security policies are translated into access-control list entries and can be stored by switches in the computer network. When a new device is connected to the computer network, the device may be resolved to the group for which it is a member and an ACL entry may be created for the new device. In networks having redundant switches, the ACL entries may be stored by each redundant network switch.
Status:
Application
Type:
Utility
Filling date:
26 Nov 2019
Issue date:
27 May 2021