NETWORK POLICY ARCHITECTURE
    12.
    发明申请

    公开(公告)号:US20210135995A1

    公开(公告)日:2021-05-06

    申请号:US16674693

    申请日:2019-11-05

    Abstract: One or more lower-level attributes of a first network policy are translated to one or more higher-level attributes of the first network policy, and one or more lower-level attributes of a second network policy are translated to one or more higher-level attributes of the second network policy. The first network policy controls how first network traffic is handled, and the second network policy controls how second network traffic is handled. The one or more higher-level attributes of the first network policy are compared with the one or more higher-level attributes of the second network policy. Based on the comparing, it is determined whether the first network traffic and the second network traffic are handled in a functionally equivalent manner. If not, the first network policy is dynamically updated to generate an updated first network policy that causes the first network traffic to be handled in the functionally equivalent manner.

    Hierarchical activation of behavioral modules on a data plane for behavioral analytics

    公开(公告)号:US10659484B2

    公开(公告)日:2020-05-19

    申请号:US15898915

    申请日:2018-02-19

    Abstract: In one embodiment, a centralized controller maintains a plurality of hierarchical behavioral modules of a behavioral model, and distributes initial behavioral modules to data plane entities to cause them to apply the initial behavioral modules to data plane traffic. The centralized controller may then receive data from a particular data plane entity based on its having applied the initial behavioral modules to its data plane traffic. The centralized controller then distributes subsequent behavioral modules to the particular data plane entity to cause it to apply the subsequent behavioral modules to the data plane traffic, the subsequent behavioral modules selected based on the previously received data from the particular data plane entity. The centralized controller may then iteratively receive data from the particular data plane entity and distribute subsequently selected behavioral modules until an attack determination is made on the data plane traffic of the particular data plane entity.

    Traffic optimization using network address and port translation in a computer cluster
    15.
    发明授权
    Traffic optimization using network address and port translation in a computer cluster 有权
    在计算机集群中使用网络地址和端口转换进行流量优化

    公开(公告)号:US09203753B2

    公开(公告)日:2015-12-01

    申请号:US14089006

    申请日:2013-11-25

    CPC classification number: H04L45/745 H04L45/54 H04L67/327

    Abstract: Techniques are presented herein for optimizing and load balancing network traffic exchanged between devices in a network environment. At a first device in a cluster of devices in a network, a packet is received from a second device in the cluster. The packet comprises identifier information that is assigned to the first device. The identifier information is reassigned to the second device in the cluster such that subsequent packets with the identifier information are sent directly to the second device. A mapping table is updated to indicate that the identifier information is reassigned to the second device.

    Abstract translation: 本文介绍了技术来优化和负载平衡网络环境中设备之间交换的网络流量。 在网络中的设备集群中的第一设备处,从群集中的第二设备接收分组。 分组包括分配给第一设备的标识符信息。 标识符信息被重新分配给群集中的第二设备,使得具有标识符信息的后续分组被直接发送到第二设备。 映射表被更新以指示标识符信息被重新分配给第二设备。

    LIGHTWEIGHT DISTRIBUTED APPLICATION SECURITY THROUGH PROGRAMMABLE EXTRACTION OF DYNAMIC METADATA

    公开(公告)号:US20210218771A1

    公开(公告)日:2021-07-15

    申请号:US16741794

    申请日:2020-01-14

    Abstract: Presented herein are methodologies for implementing application security. A method includes generating an extraction vector based on a plurality of application security rules to be enforced, transmitting the extraction vector to a first agent operating on a first network device and to a second agent operating on a second network device; receiving, separately, from the first agent and from the second agent, first metadata generated by the first agent and second metadata generated by the second agent by the agents applying the extraction vector to network traffic passing, respectively, through the first network device and the second network device. The first metadata includes a transaction ID assigned by the first agent, and the second metadata includes the same transaction ID. The method further includes correlating the first metadata with the second metadata based on the transaction ID to construct a transactional service graph for the network traffic.

    Service-Function Chaining
    20.
    发明申请
    Service-Function Chaining 有权
    服务功能链

    公开(公告)号:US20150215172A1

    公开(公告)日:2015-07-30

    申请号:US14168447

    申请日:2014-01-30

    CPC classification number: H04L43/026 H04L41/5041

    Abstract: Presented herein are service-function chaining techniques. In one example, a service controller in a network comprising a plurality of service nodes receives one is configured to identify one or more service-functions hosted by each of the service nodes. The service controller defines a service-function chain in terms of service-functions to be applied to traffic in the network and provides information descriptive of the service-function chain to a classifier node.

    Abstract translation: 这里提供的是服务功能链接技术。 在一个示例中,包括多个服务节点的网络中的服务控制器接收一个服务控制器被配置为识别由每个服务节点托管的一个或多个服务功能。 服务控制器根据服务功能定义服务功能链,以应用于网络中的流量,并向分类器节点提供描述服务功能链的信息。

Patent Agency Ranking