Sign In to Follow Application
View All Documents & Correspondence

Facilitating Defense Against Mac Table Overflow Attacks

Abstract: A method for defending against MAC table overflow attacks comprises a plurality of operations. An operation is performed for determining whether each one of a plurality of MAC addresses within a MAC table has one-way traffic or two-way traffic corresponding thereto. Thereafter, operations are performed for designating each MAC address having two-way traffic corresponding thereto as a first category of MAC address and for designating each MAC address having one-way traffic corresponding thereto as a second category of MAC address. In response to the number of the MAC addresses designated as the second category of MAC address exceeding a prescribed threshold value, an operation is performed for causing a timeout value of at least a portion of the MAC addresses designated as the second category of MAC address to be less than a timeout value of the MAC addresses designated as the first category of MAC address.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 June 2010
Publication Number
51/2010
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2017-07-12
Renewal Date

Applicants

ALCATEL LUCENT
54, RUE LA BOETIE, 75008 PARIS

Inventors

1. YONG SUN
296 KNUDSON DRIVE, KANATA, ONTARIO K2K2P1
2. VINOD KUMAR CHOYI
345 BERRIGAN DRIVE, OTTAWA, ONTARIO K2J4Z9

Specification

FACILITATING DEFENSE AGAINST MAC TABLE OVERFLOW ATTACKS

FIELD OF THE DISCLOSURE

The disclosures made herein relate generally to source address learning in MAC (Media Access Control) tables and, more particularly, to facilitating defense against MAC table overflow attacks through control of information within a MAC table.

BACKGROUND

Ah Ethernet switch (i.e., the switch) forwards Ethernet frames to a specific port depending on the physical destination address (i.e., MAC address) from the Ethernet frame. In order to do this, the switch must remember which port leads to a specific destination address. This information is stored in a MAC table that is populated (i.e., built) by means known as source learning. Source leaning includes the Witch 'dynamically learning the MAC address of an Ethernet frame by' checking the source address of a received Ethernet frame. If the MAC address for this Ethernet frame does not exist in the MAC table, a record is created associating this MAC address with the port on which the MAC address was learned.

Each dynamically learned entry has a time-to-live. In this manner, each entry in the MAC table will age out if an Ethernet frame designating that respective MAC address is not received by the switch for a configurable period of time. This configurable period of time is referred to as the timeout value. When the MAC table is frill, no MAC address will be learned until some entry in the table ages out.

With respect to malicious acts associated with managing information within a MAC table, MAC table overflow attack is one of the major risks to Ethernet LAN and simulated Ethernet LAN service such as, for example, Virtual Private LAN Service (VPLS) over MPLS (Multi Protocol Label Switching). In a MAC table overflow attack, an attacker attempts to exploit source leaning of an MAC table of an Ethernet switch. Such exploitation includes subjecting the Ethernet switch with a large number of invalid source MAC addresses (i.e., flooding with invalid source MAC addresses) to fill up the MAC table with such invalid source MAC addresses. Li doing so, traffic to and from unknown address will be flooded to all ports of the Ethernet switch causing network performance to degrade significantly and allowing the attacker to snoop the traffic. If the attacker maintains the flood of invalid source MAC addresses, eventually all the older legitimate MAC entries could age out, and all legitimate traffic would be flooded. From both a performance and a security perspective, problems associated with MAC address flooding become more serious when Ethernet is deployed across a metro or wide area network.

One known approach to defending against MAC address flooding is referred to as "Port Security". Port Security functions to prevent MAC table over-flow by allowing a network administrator to configure (e.g., statistically configure) the MAC addresses that are allowed for a particular port of an Ethernet switch. Frames that are, originated from addresses other than the configured address(es) are dropped. However, a limitation of Port. Security is that it is not suitably scalable because each MAC address needs to be configured manually on the Ethernet switch. As such, when a network becomes sufficiently large (e.g., a carrier network), it is often impossible to configure each and every MAC address manually.

An extension to Port Security is referred to as "Dynamical Port Security". Dynamical Port Security allows the administrator to specify the number of MAC addresses allowed for each port, as opposed to just being able to configure the MAC addresses themselves. When the specified number of MAC addresses is learned for the configured port, other source MAC address will not be allowed. In this manner, Dynamical Port Security resolves the problem of manual configuration of MAC address. But, Dynamical Port Security is not without its own limitations. For example, if an attacker launches MAC flooding attack in one port, it can cause a Denial of Service (DoS) attack to legitimate hosts connected to the same port when the MAC address limit allowance is reached. Moreover, Dynamical Port Security is limited in its flexibility. If new users are added to a port, the MAC address limit allowance on the switch has to be raised to accommodate more MAC addresses. For these reasons. Dynamical Port Security is not suitable for a service provider's network

A standard referred to as MACSec (i.e., MAC Security as defined in EBEE 802. lae) provides LAN security by using cryptographic techniques to protect data confidentiality and integrity in a LAN, and it also indirectly resolves the MAC flooding problem. But, MACSec is a heavyweight solution that requires support of switches and all end users to prevent a DoS attack. Accordingly, it may not work in an exiting network. Furthermore, MACSec is not practical to upgrade a required installation base of Ethemet to support this standard, and some mechanisms must be in place to deliver PKI (public key infrastructure) security keys either out of band or online before network communication can be initiated. Significant key management work must to be done to support the MACSec standard. As a result, to some users who are more concerned about the speed and service availability, like a VPLS service provider, a lightweight solution to MAC table overflow attack may be more desirable
.
Therefore, a solution that defends against MAC table overflow attacks in a manner that overcomes limitations associated with known approaches for defending against MAC table overflow attacks would be advantageous, desirable and useful.

SUMMARY OF THE DISCLOSURE

Embodiments of the present invention are configured for defending against MAC table overflow attacks in a manner that overcomes limitations associated with known approaches for defending against MAC table overflow attacks. More specifically, embodiments of the present invention preclude a MAC table overflow attack from causing legitimate MAC entries in a MAC table from becoming aged out if an attacker maintains the flood of invalid source MAC addresses. In this manner, embodiments of the present invention prevent all legitimate traffic from being flooded at the expense of invalid source MAC addresses from the attacker.

Traditionally, a switch builds a MAC table by source learning (i.e., dynamic learning) and forward frames based on this table. Each of these dynamically learned entries has the same timeout value. Accordingly, when the switch is under attack, if older entries age out slower than newer entries are learned, eventually the MAC table of the switch will become filled to its capacity. As opposed to assigning the same timeout value for every MAC address, a switch configured in accordance with an embodiment of the present invention assigns shorter timeout value to invalid MAC addresses than it does to legitimate ones. In doing so, when a MAC table overflow attack happens, invalid entries in the MAC table can age out faster and make room for legitimate ones, thus preventing the potential MAC table overflow attack.

In one embodiment of the present invention, a method for defending against MAC table overflow attacks comprises a plurality of operations. An operation is performed for determining whether each one of a plurality of MAC addresses within a MAC table has one-way traffic or two-way traffic corresponding thereto. Thereafter, operations are performed for designating each MAC ad[dress having two-way traffic corresponding thereto as a first category of MAC address and for designating each MAC address having one-way traffic corresponding thereto as a second category of MAC address. In response to the number of the MAC addresses designated as the second category of MAC address exceeding a prescribed threshold value, an operation is performed for causing a timeout value of at least a portion of the MAC addresses designated as the second category of MAC address to be less than a timeout value of the MAC addresses designated as the first category of MAC address.

In another embodiment of the present invention, an Ethernet switch comprises a MAC table, a flood determining mechanism, and a timeout value adjustment mechanism. The MAC table has a plurality of MAC address entries therein. Each one of the entries designates a respective MAC address, a respective MAC address category and a respective timeout value. The respective MAC address category is one of a MAC address category corresponding to one-way traffic and a MAC address category corresponding to two-way traffic. The flood determining mechanism is configured for determining when an increase in the number of MAC address entries designating the one-way traffic MAC address category exceeds a prescribed threshold. The timeout value adjustment mechanism is configured for adjusting the timeout values dependent upon MAC address category. Such adjusting includes causing the timeout value of at least a portion the MAC address entries designating the one-way traffic MAC address category to be less than a default timeout value.

In another embodiment of the present invention, a data storage device has a set of processor-executable instructions stored thereon. The set of processor-executable instructions comprises various instructions configured for defending against MAC table overflow attacks. To this end, instructions are provided for populating a MAC table with a plurality of MAC address entries therein. Each one of the entries designates a respective MAC address, a respective MAC address category and a respective timeout value and wherein the respective MAC address category is one of a MAC address category corresponding to one-way traffic and a MAC address category corresponding to two-way traffic. Instructions are provided for determining when an increase in the number of MAC address entries designating the one-way traffic MAC address category exceeds a prescribed threshold. Instructions are provided for adjusting at least a portion of the timeout values dependent upon MAC address category in response to the number of the MAC address entries designating the one-way traffic MAC address category exceeding a prescribed threshold.

As such, a skilled person will appreciate that embodiments of the present invention facilitate defending against MAC table overflow attacks in a manner that offers a number of advantages relative to prior approaches for defending against MAC table overflow attacks. One advantage is that such embodiments defend against MAC table overflow attacks in a manner that is lightweight, easy and simple whereby no complicated computation is required and whereby the switch still works like a traditional bridge. Another advantage is that such embodiments defend against MAC table overflow attacks in a manner that is flexible and scalable whereby no MAC addresses or number of MAC addresses have to be configured and whereby, when new users are added, no configuration changes are required on the switch. Still another advantage is that such embodiments defend against MAC table overflow attacks in a manner that is resilient whereby, when an attack happens, the switch still allows legitimate user traffic from/to other ports or even the port on which the attack originates, which is especially important and useful for VPLS (e.g., emulated local area network (E-LAN) service from service providers). Yet another advantage is that such embodiments defend against MAC table overflow attacks in a manner whereby, unlike MACSec, no large-scale changes to existing switches and/or end user equipment must be made.

These and other objects, embodiments, advantages and/or distinctions of the present invention will become readily apparent upon further review of the following specification, associated drawings and appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a method for defending against MAC table overflow attacks in accordance with an embodiment of the present invention.

FIGS. 2-7 show various populated states of a MAC table in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE DRAWING FIGURES

Typically legitimate traffic is two-way, so a MAC address can be seen by a switch as both source and destination in a reasonable time window. On the contrary, typically MAC table overflow attack is one-way. Frames with spoofed MAC addresses as source are sent with an intention to overflow the MAC table and the switch will not see any response traffic to those spoofed addresses. It is these one-way and two-way traffic considerations that embodiments of the present invention use for defending against MAC table overflow attacks.

Turning now to specific discussion of embodiments of the present invention, a MAC address on a switch is referred to a being "verified" (i.e., a verified MAC address) when it has been seen as both source and destination addresses. If a MAC address is only seen as source address, and not yet seen as a destination address, it is referred as being "unverified" (i.e., an unverified MAC address). In this manner, a machine communicating verified MAC addresses is a verified machine and a machine communicating unverified MAC addresses is an unverified machine.

Initially (e.g., upon initialization of a system in accordance with the present invention), default timeout values are assigned to both verified and unverified MAC addresses. In some implementations of the present invention, the verified and unverified MAC addresses are assigned a common default timeout value because, in real-world situations, a small percentage of traffic exhibits asymmetry with respect to source and destination addresses. In other implementations of the present invention, the verified and unverified MAC addresses are assigned respective default timeout values that are effectively different (e.g., by a relatively small amount) or substantially different (e,.g., by a relatively large amount). Thus, if no MAC table overflow attack happens, the switch works exactly or essentially like a traditional (i.e., prior art) switch.

When MAC flooding happens (i.e., a MAC table overflow attack), the switch will see a significant increase of unverified MAC addresses for a specific port. When the number grows to a configurable penalty-threshold 1, the timeout value of unverified address for that specific port is decreased by a first configurable amount (e.g., percentage, increment, etc) such that the spoofed MAC address(es) age out fast and unknown legitimate MAC address(es) can still be learned. If the number of unverified MAC addresses for the same specific port continues to grow and exceed the second penalty-threshold 2, the timeout value of unverified address for that specific port is decreased again by a second configurable amount such that unverified MAC address(es) timeout even faster. Conversely, if the MAC table overflow attack stops or goes milder to a point where the number of unverified MAC addresses decreases to below either penalty-threshold, the timeout value for the unverified MAC addresses learned on that specific port will be restored to the value used before the most current penalty-threshold was exceeded. Thus, in this implementation, the timeout value is adjusted on a per-port basis). Alternatively, in a simplified implementation of the present invention, the total number of unverified MAC addresses for all ports can be monitored and the timeout value for the unverified MAC addresses can be adjusted on a system-wide basis as opposed to a per-port basis. It is disclosed herein that the number of penalty-thresholds and theirs values can be configurable based on a various system parameters (e.g., the size of MAC table of the switch).

If the MAC table overflow attack become uncontrolled such that the number of unverified MAC addresses received on the port continues growing to a configurable drop threshold, the switch will then drop the traffic from unknown MAC addresses from the port in an effort to disable the attack. However, traffic from verified (i.e., known MAC addresses) will be handled normally. In this manner, the switch operates like a traditional switch with added intelligence of keeping track of the status of each MAC address and adjusting the timeout value or dropping traffic based on the number of unverified MAC addresses.

FIG. 1 shows a data flow method 100 for defending against MAC table overflow attacks in accordance with an embodiment of the present invention. An operation 102 is performed for receiving a frame on a port of the Ethernet switch. In response to receiving the frame, an operation 104 is performed for assessing MAC information associated with the contents of the frame. If a source MAC address of the frame is not in an MAC table of the switch, the MAC table is not full and the drop threshold has been exceeded, an operation 106 is performed for dropping the packet. If a source MAC address of the frame is not in an MAC table, the MAC table is not frill, the drop threshold has not been exceeded, and a penalty threshold has been exceeded, an operation 108 is performed for decreasing a timeout value of the MAC address (i.e., an unverifled MAC address), followed by an operation 110 being performed for adding the source MAC address to the MAC table as unverified and an operation 112 being performed for starting the timeout counter for the MAC entry. Otherwise, if the source MAC address of the frame is in the MAC table or the source MAC address of the frame is not in the MAC table but the MAC table is frill, an operation 114 is performed for flooding the frame to all ports of the switch when the destination MAC address for the frame is not in the MAC table. In the case where the MAC address of the frame is not in theMAC table, the MAC table is not foil, the drop threshold has not been exceeded and a penalty threshold has not been exceeded, the method continues at the operation 110 for adding the source MAC address to the MAC table.
In the case where the source MAC address of the frame is in the MAC table or the source MAC address of the frame is not in the MAC table but the MAC table is foil, an operation 116 is performed for changing a status of the destination MAC address from unverified to verified when the destination MAC address is in the MAC table
,
the source and destination MAC addresses are not on a common port and the destination MAC address is not verified. Thereafter, an operation 118 is performed for resetting a timeout counter for the port and an operation 120 is performed for forwarding the flame to the destination MAC address. If the destination MAC address is verified, the operation of 116 for changing the status of the MAC address from unverified to verified is omitted and the method continues at the operation 118 for resetting a timeout counter. If the source and destination MAC addresses are on a common port, the method continues at the operation 106 for dropping the packets.

Referring back to the operation 112 for starting the timer in conjunction with performing the operation 110 for adding the source MAC address to the MAC table as unverified, thereafter, the method continues at the operation 116 for changing a status of the MAC address from unverified to verified when the destination MAC address is in the MAC table, the source and destination MAC addresses are not on a common port and the destination MAC address is not verified. If the destination MAC address is verified, the operation of 116 for changing the status of the MAC address from unverified to verified is omitted and the method continues at the operation 118 for resetting a timeout counter. If the source and destination MAC addresses are on a common port, the method continues at the operation 106 for dropping the packets.
Example - System Configured For Defending Against MAC Table Overflow Attacks
A network includes three host machines with MAC address MACl, MAC2 and MACS connect, respectively, to port pi, p2 and p3 of a switch (i.e., Switch). The three host machines are referred to as MACl, MAC2 and MACS, respectively. A hub (i.e., HUB) is connected between MACl and the switch. The switch boots up and the MAC table of the switch is cleared
.
Referring to FIG. 2 and Table 1 (i.e., the switch MAC table), MACl sends a frame to MAC2, and it is received by the switch on port pi. The switch checks its MAC table and does not find MACl, so it creates an entry in the MAC table for the source MAC address of MACl to associate MAC 1 with port p 1 and sets the status of the MAC address of MAC 1 as being unverified. The timeout counter for this MAC table entry is then started. The switch allows a user (e.g., system administrator) to specify default timeout values for both unverified and verified MAC addresses. In this example, the timeout values for both verified and unverified MAC addresses are set at 300 seconds.
Table 1 - Switch MAC Table (first state)
Next, the destination MAC address for MACl is checked against the MAC table. Because MAC2 is not found (i.e., no entry for MAC2 in the MAC table), the switch floods the frame to all of its ports, as shown in FIG. 3.

Accordingly, both MAC2 and MACS will receive this frame. MACS discards this frame because the destination is not the address of MACS. After MAC2 receives this frame, it responds to MACl. In this manner, a frame with MAC2 as source and MACl as destination is seen by the switch on port P2. Referring to FIG. 4 and Table 2, the switch checks the source address of MAC2, but doesn't find it in the MAC table, so the switch creates an entry to associate port P2 with MAC2, sets the status of this source address as unverified (i.e., because the MAC address of MAC 2 has only one-way traffic associated therewith), and then starts the timeout counter for this MAC table entry.

Thereafter, the destination MAC address is checked. Now, MACl is found in the MAC table and is determined to have a status as being unverified. Accordingly, because MAC addresses of MACl support two-way traffic, the switch changes the status of MACl to verified, resets the timeout counter for MACl, and then forwards the frame to MACl.

Please note the table for demonstration purposes does not take into consideration the time elapsed since MACl and MAC2 addresses were populated and therefore do not have the realistic values for "Timeout remaining
"
Table 2- Switch MAC Table (second state)
Referring to FIG. 5 and Table 3, if MACl send another frame to MAC2, the switch will update the status of MAC2 status to verified, reset the timeout counter for MAC 2, and send the frame to P2 directly, without flooding to all ports.
Table 3- Switch MAC Table (third state)

Referring to FIG. 6 and Table 4, if an attacker connects to the hub, which is connected to port PI of the switch, and sends frames with a large number of invalid source MAC addresses (e.g., MAC-a, MAC-b, etc) to the switch, the switch will create entries to associate these invalid MAC addresses with port PI and set their status as unverified because they are spoofed and no return traffic is seen. At this point, the switch has no idea if the traffic from an unverified MAC is legitimate or not, so the default timeout is still used for the invalid MAC addresses. Typically, attacking traffic will also use spoofed destination MAC addresses, which cannot be found in the MAC table, so the traffic is flooded to all ports by the switch.

Table 4- Switch MAC Table (fourth state)

Referring to Table 5, with tiie attack still continuing, a large number of unverified MAC addresses will be added to the MAC table. When this number reaches a first configurable threshold (e.g., penalty-threshold 1), for example 20% of MAC table space is taken by unverified MAC addresses learned on one port, it is likely that the switch is under attack, so the switch will decrease the timeout value of unverified MAC address learned on PI by 50% (i.e., a configurable value). Now, all the newly learned unverified MAC address from PI will have a timeout value of 150 s, so that they can age out quickly to make room for legitimate MAC addresses. When the number of unverified MAC addresses keeps growing to a second configurable threshold (e.g., penalty-threshold 2), the timeout value is decreased by another 50% to make the corresponding unverified MAC address timeout even faster. If the attack stops or goes milder, the number of unverified MAC addresses should decrease because older invalid unverified MAC addresses will age out. When the number is lower than either penalty-threshold, the timeout value for unverified MAC learned on that port will be restored to the value used before that penalty-threshold was exceeded. The number of penalty-thresholds and their values are configurable, and they should be based on the size of MAC tables.

Table 5- Switch MAC Table (fifth state)

Referring to FIG. 7, if the attack goes wild, eventually a high percentage (e.g., a drop-threshold) of MAC table will be filled by unverified MAC addresses (i.e., designated as X) learned on PI. The switch will be quite sure that attack is under way, so it can drop all the traffic fi-om unknown addresses receive on port PI to disable the attack. But traffic fi-om known MAC addresses, MACl in this example, is still allowed to enable legitimate user communication (e.g., verified MAC addresses designated as V).

Referring now to instructions processible by a data processing device, it will be understood from the disclosures made herein that methods, processes and/or operations adapted for carrying out MAC table overflow attack defending functionality as disclosed herein are tangibly embodied by computer readable medium having instructions thereon that are configured for carrying out such functionality. In one specific embodiment, the instructions are tangibly embodied for carrying out the method 100 disclosed above, the example presented herein, both or a combination of portions from both. The instructions may be accessible by one or more data processing devices from a memory apparatus (e.g. RAM, ROM, virtual memory, hard drive memory, etc), from an apparatus readable by a drive unit of a data processing system (e.g., a diskette, a compact disk, a tape cartridge, etc) or both. Accordingly, embodiments of computer readable medium in accordance with the present invention include a compact disk, a hard drive, RAM or other type of storage apparatus that has imaged thereon a computer program (i.e., instructions) adapted for carrying out MAC table overflow attack defending functionality in accordance with the present invention.

In the preceding detailed description, reference has been made to the accompanying drawings that form a part hereof, and in which are shown by way of illustration specific embodiments in which the present invention may be practiced. These embodiments, and certain variants thereof, have been described in sufficient detail to enable those skilled in the art to practice embodiments of the present invention. It is to be understood that other suitable embodiments may be utilized and that logical, mechanical, chemical and electrical changes may be made without departing from the spirit or scope of such inventive disclosures. To avoid unnecessary detail, the description omits certain information known to those skilled in the art. The preceding detailed description is, therefore, not intended to be limited to the specific forms set forth herein, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the appended claims.
CLAIMS

WHAT IS CLAIMED IS:

1. A method for defending against MAC table overflow attacks, comprising:
determining whether each one of a plurality of MAC addresses within a MAC table has one-way traffic or two-way traffic corresponding thereto
designating each MAC address having two-way traffic corresponding thereto as a first category of MAC address;
designating each MAC address having one-way traffic corresponding thereto as a second category of MAC address; and
causing a timeout value of at least a portion of said MAC addresses designated as the second category of ML\C address to be less than a timeout value of said
MAC addresses designated as the first category of MAC address in response to the number of said MAC addresses designated as the second category of MAC address exceeding a prescribed threshold value.

2. The method of claim 1 wherein said determining, said designating and said causing are all performed on a per-port basis

3. The method of claim 1 wherein:

a timeout value of all of said MAC addresses is initially set at a common default
timeout value; and
causing the timeout value of at least a portion of said MAC addresses designated as the second category of MAC address to be less than the timeout value of said MAC addresses designated as the first category of MAC address includes setting the timeout value of said MAC addresses designated as the second category of MAC address at a reduced value relative to said default timeout value in response to the number of said MAC addresses designated as the second category of MAC address exceeding a respective prescribed penalty threshold value.

4. The method of claim 3, further comprising:
dropping traffic associated with at least a portion of said MAC addresses designated as the second category of MAC address in response to number of said MAC addresses designated as the second category of MAC address exceeding a respective prescribed drop threshold value.

5. The method of claim 3 wherein setting the timeout value at a reduced value includes:
setting the timeout value of said MAC addresses designated as the second category of MAC address at a first reduced value relative to said default timeout value in response to the number of said MAC addresses designated as the second category of MAC address exceeding a first prescribed threshold value; and setting the timeout value of said MAC addresses designated as the second category of MAC address at a second reduced value relative to said default timeout value in response to the number of said MAC addresses designated as the second category of MAC address exceeding a second prescribed threshold value greater than the first prescribed threshold value.

6. An Ethernet switch, comprising:

a MAC table having a plurality of MAC address entries therein, wherein each one of said entries designates a respective MAC address, a respective MAC address
category and a respective timeout value and wherein the respective MAC address category is one of a MAC address category corresponding to one-way traffic and a MAC address category corresponding to two-way traffic; a flood determining mechanism configured for determining when an increase in the number of MAC address entries designating said one-way traffic MAC address category exceeds a prescribed threshold; a timeout value adjustment mechanism configured for adjusting said timeout values dependent upon MAC address category, wherein said adjusting includes causing the timeout value of at least a portion said MAC address entries designating said one-way traffic MAC address category to be less than a default time out value.

7. The switch of claim 10 wherein said determining and said adjusting are performed on a per-port basis.

8. The switch of claim 10 wherein:
the flood determining mechanism is configured for determining when: an increase in the number of said MAC address entries designating said one-way traffic MAC address category exceeds a first prescribed penalty threshold value;
an increase in the number of said MAC address entries designating said one-way traffic MAC address category exceeds a second prescribed penalty threshold; and
an increase in the number of said MAC address entries designating said one-way traffic MAC address category exceeds a prescribed drop threshold; and the timeout value adjustment mechanism is configured for:
setting the timeout value in said MAC address entries designating said one-way traffic MAC address category at a first reduced value relative to the default
timeout value in response to the number of said MAC address entries designating said one-way traffic MAC address category exceeding the first prescribed penalty threshold value;
setting 'the timeout value in said MAC address entries designating said one-way traffic MAC address category at a second reduced value relative to said default
timeout value in response to the number of said MAC address entries designating said one-way traffic MAC address category exceeding the second prescribed penalty threshold value; and
dropping traffic associated with at least a portion of said MAC address entries designating said one-way traffic MAC address category in response to the number of said MAC address entries designating said one-way traffic MAC address category exceeding the drop threshold value.

9. The switch of claim 12 wherein:
the flood determining mechanism is configured for determining when the number of said MAC address entries designating said one-way traffic MAC address category drops below a threshold value corresponding to a currently reduced time out value; and
the timeout value adjustment mechanism is configured for setting the timeout value of said MAC address entries designating said one-way traffic MAC address category to a less reduced timeout value than the currently reduced timeout value in response to the number of said MAC address entries designating said one-way traffic MAC address category retreating from a threshold value corresponding to the currently reduced timeout value.

10. The switch of claim 12 wherein said determining and said adjusting are performed on a per-port basis.

Documents

Application Documents

# Name Date
1 4007-CHENP-2010 PCT 29-06-2010.pdf 2010-06-29
1 4007-CHENP-2010-RELEVANT DOCUMENTS [30-03-2019(online)].pdf 2019-03-30
2 4007-chenp-2010 power of attorney 29-06-2010.pdf 2010-06-29
2 4007-CHENP-2010-PatentCertificate01-09-2017.pdf 2017-09-01
3 4007-CHENP-2010-PatentCertificateCoverLetter.pdf 2017-09-01
3 4007-chenp-2010 form-5 29-06-2010.pdf 2010-06-29
4 Abstract_Granted 285129_12-07-2017.pdf 2017-07-12
4 4007-chenp-2010 form-3 29-06-2010.pdf 2010-06-29
5 Claims_Granted 285129_12-07-2017.pdf 2017-07-12
5 4007-chenp-2010 form-2 29-06-2010.pdf 2010-06-29
6 Description_Granted 285129_12-07-2017.pdf 2017-07-12
6 4007-chenp-2010 form-18 29-06-2010.pdf 2010-06-29
7 Drawings_Granted 285129_12-07-2017.pdf 2017-07-12
7 4007-chenp-2010 form-1 29-06-2010.pdf 2010-06-29
8 Marked Up Claims_Granted 285129_12-07-2017.pdf 2017-07-12
8 4007-chenp-2010 drawings 29-06-2010.pdf 2010-06-29
9 4007-chenp-2010 description(complete) 29-06-2010.pdf 2010-06-29
9 Form 3 [10-05-2017(online)].pdf 2017-05-10
10 4007-chenp-2010 correspondence others 29-06-2010.pdf 2010-06-29
10 Correspondence by Agent_Power of Attorney_27-02-2017.pdf 2017-02-27
11 4007-chenp-2010 claims 29-06-2010.pdf 2010-06-29
11 Abstract [23-02-2017(online)].pdf 2017-02-23
12 4007-chenp-2010 abstract 29-06-2010.pdf 2010-06-29
12 Claims [23-02-2017(online)].pdf 2017-02-23
13 4007-chenp-2010 correspondence others 30-08-2010.pdf 2010-08-30
13 Description(Complete) [23-02-2017(online)].pdf 2017-02-23
14 4007-CHENP-2010 FORM -13 09-09-2011.pdf 2011-09-09
14 Description(Complete) [23-02-2017(online)].pdf_346.pdf 2017-02-23
15 4007-CHENP-2010 CORRESPONDENCE OTHERS 09-09-2011.pdf 2011-09-09
15 Examination Report Reply Recieved [23-02-2017(online)].pdf 2017-02-23
16 4007-CHENP-2010 CORRESPONDENCE OTHERS 13-09-2013.pdf 2013-09-13
16 Form 13 [23-02-2017(online)].pdf 2017-02-23
17 Marked Copy [23-02-2017(online)].pdf 2017-02-23
17 4007-CHENP-2010 FORM -3 13-09-2013.pdf 2013-09-13
18 4007-CHENP-2010 FORM-3 30-09-2013.pdf 2013-09-30
18 Other Document [23-02-2017(online)].pdf 2017-02-23
19 4007-CHENP-2010 CORRESPONDENCE OTHERS 30-09-2013.pdf 2013-09-30
19 Form 26 [22-02-2017(online)].pdf 2017-02-22
20 4007-CHENP-2010 FORM-3 21-02-2014.pdf 2014-02-21
20 Form 3 [17-02-2017(online)].pdf 2017-02-17
21 4007-CHENP-2010 CORRESPONDENCE OTHERS 21-02-2014.pdf 2014-02-21
21 Petition Under Rule 137 [17-02-2017(online)].pdf 2017-02-17
22 4007-CHENP-2010-FER.pdf 2016-09-21
23 4007-CHENP-2010 CORRESPONDENCE OTHERS 21-02-2014.pdf 2014-02-21
23 Petition Under Rule 137 [17-02-2017(online)].pdf 2017-02-17
24 Form 3 [17-02-2017(online)].pdf 2017-02-17
24 4007-CHENP-2010 FORM-3 21-02-2014.pdf 2014-02-21
25 Form 26 [22-02-2017(online)].pdf 2017-02-22
25 4007-CHENP-2010 CORRESPONDENCE OTHERS 30-09-2013.pdf 2013-09-30
26 4007-CHENP-2010 FORM-3 30-09-2013.pdf 2013-09-30
26 Other Document [23-02-2017(online)].pdf 2017-02-23
27 4007-CHENP-2010 FORM -3 13-09-2013.pdf 2013-09-13
27 Marked Copy [23-02-2017(online)].pdf 2017-02-23
28 4007-CHENP-2010 CORRESPONDENCE OTHERS 13-09-2013.pdf 2013-09-13
28 Form 13 [23-02-2017(online)].pdf 2017-02-23
29 4007-CHENP-2010 CORRESPONDENCE OTHERS 09-09-2011.pdf 2011-09-09
29 Examination Report Reply Recieved [23-02-2017(online)].pdf 2017-02-23
30 4007-CHENP-2010 FORM -13 09-09-2011.pdf 2011-09-09
30 Description(Complete) [23-02-2017(online)].pdf_346.pdf 2017-02-23
31 4007-chenp-2010 correspondence others 30-08-2010.pdf 2010-08-30
31 Description(Complete) [23-02-2017(online)].pdf 2017-02-23
32 4007-chenp-2010 abstract 29-06-2010.pdf 2010-06-29
32 Claims [23-02-2017(online)].pdf 2017-02-23
33 4007-chenp-2010 claims 29-06-2010.pdf 2010-06-29
33 Abstract [23-02-2017(online)].pdf 2017-02-23
34 4007-chenp-2010 correspondence others 29-06-2010.pdf 2010-06-29
34 Correspondence by Agent_Power of Attorney_27-02-2017.pdf 2017-02-27
35 4007-chenp-2010 description(complete) 29-06-2010.pdf 2010-06-29
35 Form 3 [10-05-2017(online)].pdf 2017-05-10
36 Marked Up Claims_Granted 285129_12-07-2017.pdf 2017-07-12
36 4007-chenp-2010 drawings 29-06-2010.pdf 2010-06-29
37 Drawings_Granted 285129_12-07-2017.pdf 2017-07-12
37 4007-chenp-2010 form-1 29-06-2010.pdf 2010-06-29
38 Description_Granted 285129_12-07-2017.pdf 2017-07-12
38 4007-chenp-2010 form-18 29-06-2010.pdf 2010-06-29
39 Claims_Granted 285129_12-07-2017.pdf 2017-07-12
39 4007-chenp-2010 form-2 29-06-2010.pdf 2010-06-29
40 Abstract_Granted 285129_12-07-2017.pdf 2017-07-12
40 4007-chenp-2010 form-3 29-06-2010.pdf 2010-06-29
41 4007-CHENP-2010-PatentCertificateCoverLetter.pdf 2017-09-01
41 4007-chenp-2010 form-5 29-06-2010.pdf 2010-06-29
42 4007-chenp-2010 power of attorney 29-06-2010.pdf 2010-06-29
42 4007-CHENP-2010-PatentCertificate01-09-2017.pdf 2017-09-01
43 4007-CHENP-2010 PCT 29-06-2010.pdf 2010-06-29
43 4007-CHENP-2010-RELEVANT DOCUMENTS [30-03-2019(online)].pdf 2019-03-30

ERegister / Renewals

3rd: 01 Dec 2017

From 08/01/2011 - To 08/01/2012

4th: 01 Dec 2017

From 08/01/2012 - To 08/01/2013

5th: 01 Dec 2017

From 08/01/2013 - To 08/01/2014

6th: 01 Dec 2017

From 08/01/2014 - To 08/01/2015

7th: 01 Dec 2017

From 08/01/2015 - To 08/01/2016

8th: 01 Dec 2017

From 08/01/2016 - To 08/01/2017

9th: 01 Dec 2017

From 08/01/2017 - To 08/01/2018

10th: 01 Dec 2017

From 08/01/2018 - To 08/01/2019