System and method for floating port configuration

ABSTRACT

A system and method automatically configures the interfaces of an intermediate network device. A discovery process operating at the device detects the identity or type of network entities actually coupled to the device&#39;s interfaces. Utilizing the identity or type of detected entities, a look-up is performed to obtain a configuration macro specially defined for each detected network entity. The retrieved configuration macros are executed and applied at the respective interfaces. During operation, the intermediate network device continues to monitor the identity and type of entities actually coupled to its interfaces. If a change is detected, such as an entity moving from a first to a second interface, the specially defined configuration macro for that entity floats from the first to the second interface where it is executed and applied.

RELATED APPLICATIONS

This application for U.S. patent is a continuation of U.S. patent application Ser. No. 11/230,395 filed on Sep. 20, 2005 by Norman W. Finn, Jacob Jensen and John. M. Schnizlein and entitled “System and Method for Floating Port Configuration”, and now issued as U.S. Pat. No. 7,710,903, which is incorporated by reference herein in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to computer networks and, more specifically, to configuring devices utilized in computer networks.

2. Background Information

Many organizations, including businesses, governments and educational institutions, utilize computer networks so that employees and others may share and exchange information and/or resources. A computer network typically comprises a plurality of entities interconnected by means of one or more communications media. An entity may consist of any device, such as a computer, that “sources” (i.e., transmits) or “sinks” (i.e., receives) data frames over the communications media. A common type of computer network is a local area network (“LAN”) which typically refers to a privately owned network within a single building or campus. LANs typically employ a data communication protocol (LAN standard), such as Ethernet, that defines the functions performed by data link and physical layers of a communications architecture (i.e., a protocol stack).

One or more intermediate network devices are often used to couple LANs together and allow the corresponding entities to exchange information. For example, a bridge may be used to provide a “bridging” or “switching” function between two or more LANs or end stations. Typically, the bridge is a computer and includes a plurality of ports that may be coupled to end stations, other bridges, routers or other network entities. The bridge includes one or more line cards and/or network interface cards (NICs) that establish ports for the exchange of network messages. Ports used to couple bridges to each other are generally referred to as a trunk ports, whereas ports used to couple bridges to end stations are generally referred to as access ports. The bridging function includes receiving data from a sending entity at a source port and transferring that data to at least one destination port for forwarding to one or more receiving entities.

Switches may also be classified depending on the role they play within the computer network. An access switch, for example, refers to an intermediate network device to which end stations, e.g., workstations, servers, etc., are directly coupled, and which is typically located at an edge of a computer network. A distribution switch refers to an intermediate network device to which one or more access switches are directly coupled. Distribution switches are often deployed in a central portion of the network.

Typically, the ports of a switch are physically connected, e.g., by cables, to the end stations, switches, routers, etc. After the ports of the switch have been connected as desired, a network administrator configures the switch in order to set operating conditions and to specify the protocols and applications that are to run on the interfaces corresponding to the switch ports. An interface refers to the boundary between protocol layers of a communication stack, such as the boundary between the physical and data link layers or between the data link and Internet Protocol (IP) layers. Thus, each port of a switch has one or more interfaces associated with it, and the terms interface and port are used interchangeably throughout this document. To configure the interfaces of a bridge, the network administrator enters a series of commands at the Command Line Interface (CLI) of a management console, and conveys those commands to the bridge. Each of the bridge's interfaces has a corresponding name or identity, such as a number. Typically, the interface number is assigned by the factory when the respective line card or NIC is installed into the switch. A command, such as “show interfaces”, when entered at the management console will return a report listing all of the interfaces on the bridge and their corresponding numbers. Examples of interface identifiers include “Serial 0”, “Ethernet 2”, etc.

To begin configuring a given interface, the network administrator enters a command at the CLI specifying the given interface, such as “interface ethernet 2”. The network administrator then enters a series of commands. For example, to set the size of a transmit queue at the interface, the network administrator may enter the command “tx-queue-limit number”. To adjust the maximum packet size, the network administrator may enter the command “mtu bytes”. After entering all of the desired configuration commands, the network administrator exits the configuration process. The configuration commands are then collected, executed and applied to the specified interface. The configuration is thereafter fixed to that interface, i.e., to “interface ethernet 2”. Once an interface has been configured, the network administrator can review the command sequence by entering a “show” type command.

Network administrators typically configure the interfaces of a bridge differently depending on what device is to be connected to the interface. For example, suppose interface “Ethernet 2” is connected to a combination desktop PC/Voice over Internet Protocol (VoIP) phone, while interface “FastEthernet 7” is connected to a backbone router. The network administrator may configure an Access Control List (ACL) on the “Fast Ethernet 7” interface that blocks certain types of un-wanted traffic from being sent and/or received on that interface. The network administrator may also configure each interface with one or more Port Virtual Local Area Network IDs. If the device is a router, the network administrator configures each interface with one or more IP addresses.

The process of configuring interfaces, as described above, is time-consuming for network administrators. It is also error prone, especially when changes are made to the network. Suppose, for example, that a combined desktop PC/VoIP phone, which had been connected to interface “Ethernet 2”, is moved to a new port corresponding to interface “Ethernet 15”, and that a distribution switch is connected to the port corresponding to interface “Ethernet 2”. In this case, the network administrator must go in and configure the “Ethernet 15” interface. He or she must also change the configuration of interface “Ethernet 2”. This often requires that the network administrator be logged into the switch, e.g., by a laptop computer, or be in voice contact with someone at the management console, e.g., by phone, as the physical cabling is being changed.

As more and more changes are made the network, it is possible that interfaces may become mis-configured, since the device actually coupled to a given interface may be very different from the one for which the interface was originally configured. Such errors, moreover, can be difficult to discover. These types of mis-configurations may result in reduced performance of the computer network. They may also result in improper access being granted to different parts of the network, thereby compromising the network's security. Accordingly, a need exists to simplify the process of configuring interfaces, and to reduce the errors that can result from changes or modifications to the network.

SUMMARY OF THE INVENTION

Briefly, the invention relates to a system and method for automatically configuring the ports or interfaces of an intermediate network device. Instead of fixing particular configuration information to a given interface, configuration information, which has been specially defined for certain entities, is permitted to “float” within the intermediate network device. A discovery process is run that identifies the neighboring network entities to which the intermediate device is connected. Various ones of the “floating” configuration information sets are then selected for application to the device's interfaces, based on the identifier or type corresponding to the entity that was determined to actually be coupled to the given interface. That is, each set of configuration information that “floats” within the device is associated with one or more network entity identifiers or types.

Once the discovery process determines which particular network entity is actually accessible through a given interface, then the configuration information that was specially defined for that entity is applied to the given interface. If changes are made to the computer network such that a network entity, which was originally accessible through a first interface, is moved over to a second interface, e.g., the cabling is changed, then this change is quickly detected by the discovery process. In response, the configuration information specially defined for that entity automatically “floats” from the first interface over to the second interface, where it is executed and applied. In other words, configuration information is effectively bound to actual network entities rather than to the device's interfaces. In the preferred embodiment, a clean-up process is run on the first interface to restore its configuration to a default setting.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention description below refers to the accompanying drawings, of which:

FIG. 1 is a highly schematic illustration of a computer network;

FIGS. 2 and 3 are partial block diagrams of an intermediate network device in accordance with the present invention;

FIGS. 4A and 4B are a flow diagram of a preferred method of the present invention; and

FIG. 5 is a highly schematic illustration of a preferred data structure in accordance with the present invention.

DETAILED DESCRIPTION OF AN ILLUSTRATIVE EMBODIMENT

FIG. 1 is a highly schematic illustration of a computer network 100. The computer network 100 includes a plurality of network entities, such as end stations, local area networks (LANs), and intermediate network devices. The intermediate network devices allow the end stations and LANs to communicate with each other. The computer network 100 includes two access switches 102 and 104, two distribution switches 106 and 108, and two routers 110 and 112. Routers 110 and 112 are connected, and thus provide access, to the Internet 114. Coupled to access switches 102 and 104 are LANs and end stations. More specifically, coupled to access switch 102 are two combination desktop personal computers (PCs) and Voice over Internet Protocol (VoIP) phones 116 and 118, a desktop PC 120, and two servers 122 and 124. Server 124 is also coupled to access switch 104 as is LAN 126. The two access switches 102 and 104 are coupled to the two distribution switches 106 and 108 by a plurality of links or trunks 128 a-d, which may be point-to-point links. The two distribution switches 106 and 108, in turn, are coupled to router 112 by links 128 e and 128 f. Access switch 102 is additionally coupled to router 110 by link 128 g.

Each switch 102, 104, 106 and 108 includes a plurality of ports 202 such that each end station, LAN or other intermediate network device is coupled to at least one switch port. Each switch 102, 104, 106 and 108, moreover, preferably identifies its own ports, e.g., by port numbers, such as zero, one, two, three, etc. The switches are thus able to associate specific ports with the end stations, LANs and/or other intermediate network devices coupled thereto.

In the illustrative embodiment, server 124 is preferably configured as an authentication, authorization and accounting (AAA) services server. Entities of computer network 100 may communicate with the AAA server 124 through the Remote Authentication Dial-In Service (RADIUS). The RADIUS service is described at Request for Comments (RFC) 2138, dated June 2000, and at RADIUS Support for Extensible Authentication Protocol (EAP), RFC 2869, dated September 2003, both of which are hereby incorporated by reference in their entireties.

It should be understood that the network 100 of FIG. 1 is meant for illustrative purposes only and that the present invention will operate with other networks having possibly far more complex topologies.

FIG. 2 is a partial, functional block diagram of an intermediate network device, such as access switch 102. As mentioned above, access switch 102 includes a plurality of ports 202 a-202 h each of which is preferably identified by a number (e.g., P0-P7). One or more frame transmission and reception objects, designated generally at 204, are associated with the ports 202 a-h such that network messages, including frames, received at a given port, e.g., P3, may be captured, and frames to be transmitted by switch 102 may be delivered to the appropriate port, e.g., P1, for transmission. Frame reception and trans-mission objects 204 may include message storage structures, such as priority queues.

In accordance with a preferred embodiment of the invention, switch 102 is provided with a plurality of protocol or execution entities. In particular, switch 102 includes a floating port configuration entity 206, a neighbor discovery entity 208, an authenticator entity 210, and one or more higher-level data/message transfer entities designated generally at 212. The floating port configuration entity 206 preferably includes a validation engine 213, and is in communication with, or otherwise has access to, a configuration table 214. In addition, the neighbor discovery entity 208 preferably includes a discovery message generator 216 for generating messages to be transmitted from one or more of the ports 202 a-h.

In the illustrated embodiment, switch 102 includes transmitting and receiving circuitry, including one or more line cards and/or network interface cards (NICs) establishing ports for the exchange of network messages, one or more supervisor cards having central processing units (CPUs) and/or microprocessors and associated memory devices for performing computations and storing the results therefrom and one or more bus structures. FIG. 3 is another highly schematic, partial block diagram of switch 102 illustrating such components. As shown in FIG. 3, switch 102 includes a plurality of line cards 302 and 304, and a supervisor card 306. Cards 302, 304 and 306 are in communicating relationship with each other through a communication bus 308. Each of the line cards 302 and 304 includes a microprocessor (μP) 310 and at least one memory 312. The supervisor card 306 also includes a μP 314, as well as both a non-volatile (N-V) memory 316 and a volatile memory 318, e.g., RAM.

Referring again to FIG. 2, it will be understood by those skilled in the art that entities 206, 208, 210 and 212 may each comprise registers and combinational logic configured and arranged to produce sequential logic circuits. In the illustrated embodiment, entities 206, 208, 210 and 212 are preferably software modules or libraries containing program instructions pertaining to the methods described herein and executable by one or more processing elements, such as the microprocessors 310 and/or 314 (FIG. 3), of switch 102. Other computer readable media may also be used to store and execute these program instructions. Nonetheless, those skilled in the art will recognize that various combinations of software and hardware, including firmware, may be utilized to implement the present invention. Similarly, configuration table 214 may be stored at any one or more of memories 312, 316 and/or 318.

Suitable intermediate network device platforms for use with the present invention include, but are not limited to, the commercially available Catalyst 4000 switches and 7200 series routers from Cisco Systems, Inc. of San Jose, Calif.

In operation, switch 102 preferably determines the identity of each network entity that is actually “behind”, i.e., reachable through, each of its ports 202. The term identity is used broadly to mean identity, name, or type or device. Using this information, switch 102 then performs a look-up on its configuration table 214 to retrieve the configuration information specially defined for the network entities that have been detected. These specially defined configuration information is then executed and applied at the corresponding ports. Once a port has been correctly configured for the network entity to which it is actually connected, the switch 102 allows network messages, e.g., data frames, to be sent to and received from the port.

In a preferred embodiment, the configuration information sets are in the form of files or macros. Those skilled in the relevant art, however, will understand that the configuration information sets may take other forms besides files or macros, and the term configuration information set is intended broadly.

FIGS. 4A-B are a flow diagram of a preferred method of the present invention. Prior to the switch 102 being activated, the configuration table 214 is preferably loaded with a plurality of specially defined configuration information sets, such as files or macros, as indicated at block 402 (FIG. 4A). Preferably, a network administrator uploads a plurality of configuration information sets into table 214 by utilizing a network management console. Each configuration information set is a particular set of Command Line Interface (CLI) commands specially defined, i.e., chosen, for use with a particular network entity or type of entity, such as a router, a desktop PC, etc. The configuration information sets may be created by the network administrator or they may be obtained from a vendor, such as Cisco Systems Inc.

A suitable method for creating configuration information sets, and then using them to configure the ports and/or interfaces of an intermediate network device is described in commonly owned, co-pending patent application Ser. No. 10/896,410, filed Jul. 21, 2004, entitled “System and Method for Automatically Configuring Switch Ports with Appropriate Features” and in “Using Smartport Macros: A Guide to Creating and Applying Cisco IOS Command Macros”, copr. 2004, both of which are hereby incorporated by reference in their entireties.

FIG. 5 is a highly schematic illustration of a preferred format of the configuration table 214. As shown, the configuration table 214 is preferably organized, at least logically, as a table or array having a plurality of columns and rows whose intersections define cells or records for storing information. Configuration table 214 preferably has a Neighboring Entity Identity or Type column 502, a Configuration Information Set Name column 504, and a Memory Pointer column 506. Table 214 also has a plurality of rows 508 a-j. The identities of network entities that might possibly be coupled to switch 102, and for which a configuration information set has been created, are loaded into the cells of column 502. The names of the corresponding configuration information sets are loaded into the respective cells of column 504. Pointers to memory locations where the corresponding configuration information sets are stored are preferably loaded into the respective cells of column 506.

Those skilled in the art will recognize that table 214 may take other forms, including having more or less information. Those skilled in the art will further recognize that other mechanisms besides a table may be used to hold configuration information sets.

Once configuration table 214 has been loaded with information, switch 102 may be activated. Upon activation, the neighbor discovery entity 208 proceeds to determine the name and/or type of entity to which each port 202 is coupled, as indicated at block 404. Specifically, the discovery message generator 216 preferably formulates one or more inquiry messages for transmission from each port 202 a-h. The entities of computer network 100 are preferably configured to respond to such inquiry messages with response messages that contain the identity of the entity that is responding, e.g., “Distribution-Switch07”. These response messages are received at switch 102, and passed to the neighbor discovery entity 208 for evaluation. Once entity 208 has determined the identity of the entity that is actually located “behind” a given port 202, it passes this information, e.g., port number and identity of the network entity, to the floating port configuration entity 206, as indicated at block 406.

The neighbor discovery entity 208 may be configured to utilize one or more well-known network discovery protocols to detect neighboring entities. A suitable network discovery protocol includes the Cisco Discovery Protocol (CDP) from Cisco Systems, Inc., as described in Understanding and Configuring CDP (Jun. 30, 2003), which is hereby incorporated by reference in its entirety. Other suitable discovery protocols include the Institute of Electrical and Electronics Engineers (IEEE) Std. 802.1AB-2005, Station and Media Access Control Connectivity Discovery, and the IEEE Std. 802.1X-2004, Port Based Network Access Control, both of which are also hereby incorporated by reference in their entireties. The discovery message generator 216 preferably formulates inquiry messages in accordance with the particular discovery protocol being executed by the neighbor discovery entity 208. These inquiry messages are sent from each port 202 a-h. Accordingly, such inquiry messages, as sent by switch 102, are received by router 110, distribution switch 106, distribution switch 108, AAA server 124, desktop PC/VoIP phone 118, desktop PC 120, desktop PC/VoIP phone 116 and server 122. Each such entity, in turn, preferably responds to switch 102 with a discovery response message identifying itself. A suitable identifier includes the “system name” defined in the CDP protocol.

Preferably, the floating port configuration entity 206 directs the higher-level data/message transfer entities 212 to delay transmitting any messages from, or otherwise using, the ports 202 until after the configuration process is completed, as indicated at block 408. Nevertheless, in the preferred embodiment, entity 206 allows lower-level protocols, such as the Distributed Diagnostics and Service Network (DDSN) Transfer Process (DTP) and/or the Uni-Directional Link Detection (UDLD) protocols, to be run on the ports 202 during the configuration process. It should be understood, moreover, that the neighbor discovery entity 208 may ignore ports that have been disabled.

In addition to the discovery process, switch 102 may also be configured to authenticate the entities to which it is connected, as indicated at block 410. More specifically, as provided in IEEE Std. 802.1X, each neighboring network entity, operating as a “supplicant” in 802.1X terminology, issues an ASSOCIATE request message to switch 102, which operates as the “authenticator” in 802.1X terminology. The ASSOCIATE request message is passed on to the authenticator entity 210, which may temporarily designate the port on which it was received as “unauthorized”, thereby blocking all traffic on the port except for 802.1X traffic. The authenticator entity 210 then returns an ASSOCIATE response message to the network entity, which in turn responds with a START message. This time, the authenticator entity 210 responds with a REQUEST IDENTITY message to the network entity, and the network entity responds by supplying its identity in a RESPONSE message. The authenticator entity 210 then forwards the received identity to the authentication server 124, which proceeds to authenticate the network entity using a selected authentication algorithm.

If the authentication server 124 verifies the network entity's credentials, it sends an ACCEPT message to the authenticator entity 210 at switch 102. The authenticator entity 210 responds by sending a SUCCESS message to the network entity, and by changing the port from the unauthorized condition to an authorized condition. If the network entity's credentials cannot be verified, then the authentication server 124 returns a FAILURE message to the authenticator entity 210, and the port is left in the unauthorized condition.

In an alternative embodiment, the authentication server 124 is further configured to return a configuration information set name to switch 102, assuming the network entity's credentials are verified. In this embodiment, the configuration table 214 is disposed at the authentication server 124. The authentication server 124 performs the look-up to identify the proper configuration information set for the entity seeking authentication.

In addition to the name, the authenticator server 124 may also return one or more parameter values. That is, configuration information sets can be created in which one or more commands include parameters or keywords, such as “$VLANID”, rather than actual values. To execute and apply such a configuration information set, a value, such as “$VLAN10”, must be provided for each parameter or keyword. Appropriate values may be stored at the AAA server 124, and passed to switch 102 along with the configuration information set name for use with a particular network entity.

Upon learning that a particular network entity is actually associated with a respective port 202, the validation engine 213 of the floating port configuration entity 206 preferably determines whether the network entity is a proper entity to be coupled to that port, as indicated at block 412. Specifically, the validation engine 213 may be pre-configured with information specifying the types of entities that may (or may not) be coupled to different ones of the ports 202 of switch 102. For example, knowing that certain configuration information sets include particular CLI commands, it may be determined by the network administrator that such commands are not appropriate for certain kinds of ports or interfaces. If so, the validation engine 213 is loaded with information indicating that a given type of network entity is not to be connected to that port. The validation engine 213 may similarly detect an error if a port intended to provide a high-speed, e.g., 1 Gbit/sec, link to another network segment appears to have a much slower speed, e.g., 10 Mbit/sec., thereby suggesting a possible mis-wiring.

Based on the results of the discovery process, entity 206 learns that port P0 is coupled to a router, that ports P1 and P2 are coupled to distribution switches, that ports P3 and P7 are coupled to servers, that ports P4 and P6 are coupled to desktop PC/VoIP phone combinations, and that port P5 is coupled to a desktop PC. Assuming these entities are appropriate for the respective ports, entity 206 proceeds to configure the interfaces. In particular, the floating port configuration entity 203 performs a look-up on the configuration table 214 to identify the appropriate configuration macro specially designed for each type of network entity, as indicated at block 414. For example, upon learning that port P4 is coupled to a combination desktop PC/VoIP phone, entity 206 determines that configuration macro “cisco-desktop-phone” of row 508 b should be applied. Entity 206 utilizes the pointer from column 506, i.e., pointer value “551233”, to retrieve this configuration macro from memory, and executes and applies it at the interface corresponding to port P4, as indicated at block 416. Similarly, upon learning that port P1 is coupled to a distribution switch, entity 206 determines that configuration macro “cisco-switch-distribution” should be applied. Again, using the pointer from column 506, i.e., pointer value “127453”, entity 206 retrieves this macro and executes it at the interface corresponding to port P1.

Those skilled in the art will recognize that the configuration macros may be included within table 214 itself, rather than being stored separately in memory. Regardless of where they are stored, the identified configuration macro is retrieved, executed and applied to the corresponding interface.

This process is preferably repeated for each interface, resulting in the configuration information designed for a particular entity automatically being applied to the port 202 leading to that entity. Thus, configuration information generated for a specific network entity, such as a combination desktop PC/VoIP phone 118, is applied to the port, e.g., P4, that has been determined to actually be coupled to that particular network entity.

Once a given port 202 is configured, the floating port configuration entity 206 preferably notifies the higher-level data/message transfer entities 212 that data messages, e.g., frames, may now be sent from and received at the given port, as indicated at block 418 (FIG. 4B).

Advantageously, the floating port configuration entity 206 is able to respond to network changes quickly and correctly without network administrator involvement. In particular, neighbor discovery entity 208 continues to issue inquire messages from ports 202 periodically during operation of switch 102 in order to confirm that the previously identified entities are still located “behind” each of the ports 202, as indicated at block 420. If the neighbor discovery entity 208 learns that a particular device has moved from one port to another, it preferably notifies the floating port configuration entity 206, as indicated at blocks 422 and 424. Suppose, for example, that distribution switch 106 is disconnected from port P1 of switch 102, and that server 122 is disconnected from port P7 and re-connected at the now vacant port P1. Entity 208 will quickly detect this change and notify the floating port configuration entity 206.

Specifically, the neighbor discovery entity 208 will notify entity 206 that port P1 now leads to server 122 rather than to distribution switch 106, and that no entity is presently connected to port P7. In response, the floating port configuration entity 206 first clears the current configuration information that was applied to port P1, as indicated at block 426. To clear the configuration information applied to port P1, entity 206 may execute a “clean-up” macro at port P1. The clean-up macro preferably removes all of the previous configuration information that was applied to port P1 when it was connected to distribution switch 106. Entity 206 then identifies the appropriate configuration macro to be executed and applied at port P1, now that it is actually connected to server 122, as indicated at block 428. Entity 206 then executes and applies this particular configuration macro at port P1, as indicated at block 430. In addition, now that port P7 is empty, entity 206 preferably applies the “clean-up” macro to this port as well, as indicated at block 432. As shown, the configuration information specially defined for a server “floats” from port P7 to P1 upon discovering that the server has been disconnected from port P7 and reconnected at port P1.

The foregoing description has been directed to specific embodiments of this invention. It will be apparent, however, that other variations and modifications may be made to the described embodiments, with the attainment of some or all of their advantages. For example, upon being authenticated, the neighboring entities may supply their own configuration macros. Therefore, it is an object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention. 

What is claimed is:
 1. A method comprising: maintaining, by an intermediate network device in a computer network, a plurality of configuration information sets, each configuration information set for a respective type of network entity in the computer network and including a set of commands that are executable by the intermediate network device to configure a port of the intermediate network device to operate with a neighboring network entity of the respective type; detecting a particular neighboring network entity is accessible through a first port of the intermediate network device, the particular neighboring network entity being of a type; directing one or more higher-level protocols not to use the first port until a configuration information set is applied to the first port, while allowing one or more lower-level protocols to use the first port prior to the configuration information set being applied to the first port; locating a particular configuration information set for the type from among the plurality of configuration information sets; automatically applying, by the intermediate network device, the particular configuration information set to the first port; determining a network configuration change has occurred in the computer network and that the particular neighboring network entity has been moved from being accessible through the first port to being accessible through a second port of the intermediate network device; and automatically applying, by the intermediate network device, the particular configuration information set to the second port.
 2. The method of claim 1, wherein the particular neighboring network entity is accessible through the first port of the intermediate network device by being physically connected to the first port and is moved to being accessible through the second port of the intermediate network device by becoming physically connected to the second port.
 3. The method of claim 1, further comprising: receiving the set of commands from a network administrator.
 4. The method of claim 1, wherein the set of commands are Command Line Interface (CLI) commands.
 5. The method claim 1, wherein each configuration information set is a macro.
 6. The method of claim 1, wherein the detecting further comprises: transmitting one or more inquiry messages from the first port; and receiving one or more response messages that contain an indication of an identity of the particular neighboring network entity.
 7. The method of claim 6, wherein the identity of the particular neighboring network entity includes a name of the particular neighboring network entity.
 8. The method of claim 6, further comprising: formulating the one or more inquiry messages according to a network discovery protocol, the network discovery protocol selected from the group consisting of: Cisco Discovery Protocol (CDP), Station and Media Access Control Connectivity Discovery, and Port Based Network Access Control.
 9. The method of claim 1, further comprising: validating that the type of the particular neighboring network entity is a type of entity permitted to be coupled to the first port of the intermediate network device.
 10. The method of claim 1, wherein the determining a network configuration change has occurred further comprises: periodically transmitting one or more inquiry messages from ports of the intermediate network device.
 11. The method of claim 1, further comprising: restoring the first port to default settings.
 12. The method of claim 1, further comprising: forwarding an identity of the particular network entity to an authentication server; and receiving from the authentication server an indication that credentials of the particular network entity have been verified.
 13. The method of claim 1, further comprising: authenticating the particular network entity with an authentication server; and receiving from the authentication server an identity of the particular configuration information set to apply.
 14. The method of claim 1, wherein the particular configuration information set includes one or more parameters that lack specific values, and the method further comprises: authenticating the particular network entity with an authentication server; and receiving from the authentication server values for each of the one or more parameters to be used when applying the particular configuration information set.
 15. An apparatus comprising: a plurality of ports; a plurality of configuration information sets, each configuration information set for a respective type of network entity and including a set of commands that are executable to configure a port of the plurality of ports to operate with a neighboring network entity of the respective type; a neighbor discovery entity coupled to the plurality of ports and configured to detect an identity of neighboring network entities coupled to the plurality of ports; and a floating port configuration entity coupled to the neighbor discovery entity, the floating port configuration entity configured to, in response to a particular neighboring network entity of a type being detected to be coupled to a first port of the plurality of ports, direct one or more higher-level protocols not to use the first port until a configuration information set is applied to the first port, allow one or more lower-level protocols to use the first port prior to the configuration information set being applied to the first port, locate a particular configuration information set for the type from among the plurality of configuration information sets, apply the particular configuration information set to the first port, and in response to the particular neighboring network being detected to be moved to be coupled to a second port of the plurality of ports, apply the particular configuration information set to the second port.
 16. The apparatus of claim 15, wherein the particular neighboring network entity is coupled to the first port by being physically connected to the first port and is moved to be coupled to the second port by becoming physically connected to the second port.
 17. The apparatus of claim 15, wherein the set of commands are Command Line Interface (CLI) commands.
 18. The apparatus of claim 15, wherein each configuration information set is a macro.
 19. The apparatus of claim 15, wherein the neighbor discovery entity comprises: a discovery message generator configured to generate one or more inquiry messages; and wherein the neighbor discovery entity is further configured to transmit the one or more inquiry messages from the first port, and to receive, in response to the one or more inquiry messages, one or more response messages that contain an indication of an identity of the particular neighboring network entity.
 20. The apparatus of claim 19, wherein the identity of the particular neighboring network entity includes a name of the particular network entity.
 21. The apparatus of claim 15, further comprising: a validation engine configured to determine that the type of the particular neighboring network entity is a type of entity permitted to be coupled to the first port.
 22. An apparatus comprising: a plurality of ports; means for maintaining a plurality of configuration information sets, each configuration information set for a respective type of network entity in a computer network and including a set of commands that are executable to configure a port of the plurality of ports to operate with a network entity of the respective type; means for detecting a particular network entity is accessible through a first port of the plurality of ports, the particular network entity being of a type; means for directing one or more higher-level protocols not to use the first port until a configuration information set is applied to the first port, while allowing one or more lower-level protocols to use the first port prior to the configuration information set being applied to the first port; means for automatically applying a particular configuration information set selected from among the plurality of configuration information sets to the first port, the particular configuration information set for the type; means for determining a network configuration change has occurred in the computer network and that the particular network entity has been moved from being accessible through the first port to being accessible through a second port of the plurality of ports; and means for automatically applying the particular configuration information set to the second port, in response to determination of the network configuration change.
 23. A method comprising: detecting a particular network entity is accessible through a first port of an intermediate network device in a computer network, the particular network entity being of a type of network entity; directing one or more higher-level protocols not to use the first port until a configuration information set is applied to the first port, while allowing one or more lower-level protocols to use the first port prior to the configuration information set being applied to the first port; obtaining a particular configuration information set for the type from among a plurality of configuration information sets, each configuration information set for a respective type of network entity and executable by the intermediate network device to configure a port to be used with the respective type of network entity; automatically applying, by the intermediate network device, the particular configuration information set to the first port to configure the first port to operate with the type of network entity; determining a network configuration change has occurred in the computer network and that the particular network entity has been moved from being accessible through the first port to being accessible through a second port of the intermediate network device; and automatically applying, by the intermediate network device, the particular configuration information set to the second port to configure the second port to operate with the type of network entity.
 24. The method of claim 23, wherein the particular network entity is accessible through the first port of the intermediate network device by being physically connected to the first port, and is moved to being accessible through the second port of the intermediate network device by becoming physically connected to the second port.
 25. The method of claim 23, wherein each configuration information set includes a set of Command Line Interface (CLI) commands.
 26. The method claim 23, wherein the detecting further comprises: transmitting one or more inquiry messages from the first port; and receiving one or more response messages that contain an indication of an identity of the particular network entity.
 27. The method claim 23, further comprising: validating that the type of network entity is a type permitted to be coupled to the first port of the intermediate network device. 