Juniper Networks, Inc.
Deterministic distribution of rekeying procedures for a scaling virtual private network (VPN)
Last updated:
Abstract:
A network device may determine that network traffic for a communication session between a first peer device and a second peer device is to be protected using a security protocol suite. The network device may establish, using one or more tunnels, multiple security associations that are to be used to securely provide the network traffic of the communication session over an unsecured medium. The network device may determine a rekey scheduling time for each security association, of the multiple security associations, based on a combination of configuration information and dynamic network device information. The network device may perform, at each rekey scheduling time, a rekeying procedure to rekey each security association of the multiple security associations.
Utility
13 Feb 2018
16 Feb 2021