FIELD: computer equipment.
SUBSTANCE: method comprises steps of: generating key information for all crypto routers; selecting in each network ranges of IP addresses for installed devices, as well as ranges of IP addresses which are tunneled by crypto routers; key information is loaded onto crypt router devices; configuring on the crypto-router IP-addresses; configuring on the crypto-routers allocated ranges of tunneled IP-addresses; creating on each switch two virtual ports: a port for encapsulating / decapsulating network packets into tunneling protocol headers; L3 level port serving as tunnel end IP interface; configuring all IP address switches on network interfaces; setting IP address of controller on switches; creating on the controller a configuration file containing values of the following constants: timeout of rules in flow tables, statistics request interval, duration of one iteration of statistics collection.
EFFECT: possibility of creating a cluster of crypto routers without restrictions on their number.
1 cl, 1 dwg, 10 tbl
Authors
Dates
2019-07-16—Published
2018-10-11—Filed