-
公开(公告)号:US11757940B2
公开(公告)日:2023-09-12
申请号:US17103706
申请日:2020-11-24
Applicant: VMware, Inc.
Inventor: Sachin Mohan Vaidya , Kausum Kumar , Jayant Jain , Shadab Shah , Anirban Sengupta
IPC: H04L9/40 , G06F9/455 , H04L12/46 , H04L41/0803 , H04L41/0893 , H04L45/586 , H04L49/00 , H04L67/10 , H04L12/66 , H04L45/42 , H04L45/64
CPC classification number: H04L63/20 , G06F9/455 , G06F9/45558 , H04L12/4641 , H04L12/66 , H04L41/0803 , H04L41/0893 , H04L45/42 , H04L45/586 , H04L45/64 , H04L49/70 , H04L63/0209 , H04L63/0218 , H04L63/0236 , H04L63/0263 , H04L63/10 , H04L67/10 , G06F2009/45595
Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a set of datacenters. The method receives a definition of an application to be deployed in the virtual infrastructure. The application definition specifies a requirement that the application receive data traffic from sources external to the virtual infrastructure. Based on the application definition, the method defines a first set of firewall rules for the application that indicate conditions for allowing data traffic from sources external to the virtual infrastructure. For an existing second set of higher-level firewall rules for data traffic entering and exiting the virtual infrastructure, the method specifies a new firewall rule that directs a network element implementing the sets of firewall rules to apply the first set of firewall rules to any data traffic that is from sources external to the virtual infrastructure and directed to the application.
-
公开(公告)号:US20220103521A1
公开(公告)日:2022-03-31
申请号:US17103706
申请日:2020-11-24
Applicant: VMware, Inc.
Inventor: Sachin Mohan Vaidya , Kausum Kumar , Jayant Jain , Shadab Shah , Anirban Sengupta
IPC: H04L29/06 , H04L12/713 , H04L12/717 , H04L12/66 , G06F9/455
Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a set of datacenters. The method receives a definition of an application to be deployed in the virtual infrastructure. The application definition specifies a requirement that the application receive data traffic from sources external to the virtual infrastructure. Based on the application definition, the method defines a first set of firewall rules for the application that indicate conditions for allowing data traffic from sources external to the virtual infrastructure. For an existing second set of higher-level firewall rules for data traffic entering and exiting the virtual infrastructure, the method specifies a new firewall rule that directs a network element implementing the sets of firewall rules to apply the first set of firewall rules to any data traffic that is from sources external to the virtual infrastructure and directed to the application.
-
公开(公告)号:US20230026330A1
公开(公告)日:2023-01-26
申请号:US17384736
申请日:2021-07-24
Applicant: VMware, Inc.
Inventor: Pierluigi Rolando , Jayant Jain , Raju Koganty , Shadab Shah , Abhishek Goliya , Chandran Anjur Narasimhan , Gurudutt Maiya Belur , Vikas Kamath
IPC: H04L29/06 , H04L12/46 , H04L12/717 , H04L12/721 , H04L12/713
Abstract: A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.
-
公开(公告)号:US20230025586A1
公开(公告)日:2023-01-26
申请号:US17384735
申请日:2021-07-24
Applicant: VMware, Inc.
Inventor: Pierluigi Rolando , Jayant Jain , Raju Koganty , Shadab Shah , Abhishek Goliya , Chandran Anjur Narasimhan , Gurudutt Maiya Belur , Vikas Kamath
IPC: H04L29/06 , H04L12/713 , H04L12/717 , H04L12/721
Abstract: A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.
-
公开(公告)号:US11375005B1
公开(公告)日:2022-06-28
申请号:US17384737
申请日:2021-07-24
Applicant: VMware, Inc.
Inventor: Pierluigi Rolando , Jayant Jain , Raju Koganty , Shadab Shah , Abhishek Goliya , Chandran Anjur Narasimhan , Gurudutt Maiya Belur , Vikas Kamath
Abstract: A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.
-
公开(公告)号:US20230026865A1
公开(公告)日:2023-01-26
申请号:US17384738
申请日:2021-07-24
Applicant: VMware, Inc.
Inventor: Pierluigi Rolando , Jayant Jain , Raju Koganty , Shadab Shah , Abhishek Goliya , Chandran Anjur Narasimhan , Gurudutt Maiya Belur , Vikas Kamath
IPC: H04L29/06 , H04L12/717 , H04L12/713 , H04L12/721
Abstract: A software-defined wide area network (SD-WAN) environment that leverages network virtualization management deployment is provided. Edge security services managed by the network virtualization management deployment are made available in the SD-WAN environment. Cloud gateways forward SD-WAN traffic to managed service nodes to apply security services. Network traffic is encapsulated with corresponding metadata to ensure that services can be performed according to the desired policy. Point-to-point tunnels are established between cloud gateways and the managed service nodes to transport the metadata to the managed service nodes using an overlay logical network. Virtual network identifiers (VNIs) in the metadata are used by the managed service nodes to identify tenants/policies. A managed service node receiving a packet uses provider service routers (T0-SR) and tenant service routers (T1-SRs) based on the VNI to apply the prescribed services for the tenant, and the resulting traffic is returned to the cloud gateway that originated the traffic.
-
-
-
-
-