Abstract:
Systems, methods and devices are provided for registering DNS hostnames of Internet host devices for very large domain zones (VLZ) stored on a DNS server on a network, including setting a pseudo-zone as the VLZ, intercepting DNS updates to the pseudo-zone, mapping the entries in the pseudo-zone into a hierarchy of real parent zones and sub-zones using a mapping formula, and translating DNS updates to the pseudo-zone from an original fully qualified domain name (FQDN) into a at least one new FQDNs and adding the at least one new FQDNs to an authoritative DNS Server.
Abstract:
Methods and systems are disclosed for configuring a network consisting of an IP Policy Management (IPPM) service and a plurality of distributed network devices supporting DHCP and other service roles wherein network devices are discovered by the IPPM service and the configuration for each of the network devices is determined by the selection of a policy, wherein the policy is made up of a plurality of rules specific to the service roles and capabilities of the network devices, and the configuration of each of the network devices is deployed via the network to the network devices.
Abstract:
Methods and systems are disclosed for configuring a network consisting of an IP Policy Management (IPPM) service and a plurality of distributed network devices supporting DHCP and other service roles wherein network devices are discovered by the IPPM service and the configuration for each of the network devices is determined by the selection of a policy, wherein the policy is made up of a plurality of rules specific to the service roles and capabilities of the network devices, and the configuration of each of the network devices is deployed via the network to the network devices.
Abstract:
Systems, methods and devices are provided for registering DNS hostnames of Internet host devices for very large domain zones (VLZ) stored on a DNS server on a network, including setting a pseudo-zone as the VLZ, intercepting DNS updates to the pseudo-zone, mapping the entries in the pseudo-zone into a hierarchy of real parent zones and sub-zones using a mapping formula, and translating DNS updates to the pseudo-zone from an original fully qualified domain name (FQDN) into a at least one new FQDNs and adding the at least one new FQDNs to an authoritative DNS Server.
Abstract:
Systems, methods and devices are provided for registering DNS hostnames of Internet host devices for very large domain zones (VLZ) stored on a DNS server on a network, including setting a pseudo-zone as the VLZ, intercepting DNS updates to the pseudo-zone, mapping the entries in the pseudo-zone into a hierarchy of real parent zones and sub-zones using a mapping formula, and translating DNS updates to the pseudo-zone from an original fully qualified domain name (FQDN) into a at least one new FQDNs and adding the at least one new FQDNs to an authoritative DNS Server.
Abstract:
Embodiments described herein provide devices, methods, and systems for managing IPv6 and IPv4 addresses within an IP address management (IPAM) system, wherein various subnets are associated with administrator-defined names, which are semantic labels. Such semantic labels may be combined to yield the IP addresses in a user-friendly manner.
Abstract:
Systems, methods and devices are provided for deploying data from an operational database with multi-version-concurrency-control, the method comprising: deriving a single SQL query statement for retrieving large amounts of related, heterogeneous data as output where the large amounts of data are internally self-consistent; transforming and decorating the single SQL query output to obtain deployment data; and transferring the deployment data to the deployment target.
Abstract:
Devices, systems, and methods for observing and intercepting network activity for network data resources passing through one or more network security apparatuses and updating configuration of said apparatuses to control the network activity from one or more network computing devices. A spectrum of admissibility of network access may be used to configure network security apparatuses to allow or deny access to network data resources according to their position in the spectrum of admissibility and to display network characteristics in a graphical form