Application identification and overlay provisioning as a service

    公开(公告)号:US09887936B2

    公开(公告)日:2018-02-06

    申请号:US14816406

    申请日:2015-08-03

    CPC classification number: H04L47/825 H04L45/74 H04L47/24

    Abstract: In one embodiment, a first device in a network receives application traffic sent from a source device towards a destination address. The first device sends the application traffic to a traffic identification service. The first device receives an instruction to establish a network tunnel to send the application traffic from the source device towards the destination address. The instruction is based on a classification of the application traffic by the traffic identification service. The first device establishes the network tunnel to send the application traffic from the source device towards the destination address.

    ON-DEMAND SECURITY ASSOCIATION MANAGEMENT
    16.
    发明申请

    公开(公告)号:US20190268383A1

    公开(公告)日:2019-08-29

    申请号:US15903820

    申请日:2018-02-23

    Abstract: A mapping server provisions network elements to optimize the cryptographic resources of a computer network. The mapping server obtains from a source network element, a request for a source endpoint to communicate with a destination endpoint across the computer network. The mapping server determines a cryptographic policy based on the source endpoint, the destination endpoint, and an availability of cryptographic resources on the network elements. The mapping server identifies a destination network element based on the cryptographic policy. The destination network element is associated with the destination endpoint. The mapping server selects a security association based on the cryptographic policy to secure a communication from the source endpoint to the destination endpoint. The security association secures the communication between the source network element and the destination network element. The mapping server provides the security association to the source network element along with a network address of the destination network element.

    Dynamic VPN policy model with encryption and traffic engineering resolution

    公开(公告)号:US10187321B2

    公开(公告)日:2019-01-22

    申请号:US15058447

    申请日:2016-03-02

    Abstract: High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN based on the high-level network policies. The high-level network policies are translated into low-level device configuration information represented in a network overlay and used for configuring a network underlay that provides the connections sites to the VPN. The network underlay is configured with the device configuration information so that the network underlay implements the VPN in accordance with the high-level policies. It is determined whether the network underlay is operating to direct traffic flows between the connection sites in compliance with the high-level network policies. If it is determined that the network underlay is not operating in compliance, the network underlay is reconfigured with new low-level device configuration information so that the network underlay operates in compliance.

    STATEFUL LISP SUBSCRIPTION FOR OVERLAPPING SUBNETWORKS

    公开(公告)号:US20180343227A1

    公开(公告)日:2018-11-29

    申请号:US15607248

    申请日:2017-05-26

    CPC classification number: H04L61/103 H04L43/08 H04L45/586 H04L61/2084

    Abstract: A Location/Identifier Separation Protocol (LISP) mapping server, including: a network interface for communicating with a LISP-enabled network; a mapping database; a subscription database; and an overlapping subscription publication engine (OSPE) to: receive a first mapping of a first subnetwork to a first routing locator (RLOC); add the first mapping to the mapping database; receive from a first ingress tunnel router (ITR) a subscription request for an endpoint identifier (EID) within the first subnetwork; add to a first subscription entry for the first subnetwork in the subscription database a subscription for the first ITR; receive a second mapping of a second subnetwork to a second RLOC, wherein the second subnetwork overlaps the first subnetwork; add the second mapping to the mapping database; and copy at least part of the first subscription entry to a second subscription entry for the second subnetwork.

    APPLICATION IDENTIFICATION AND OVERLAY PROVISIONING AS A SERVICE
    20.
    发明申请
    APPLICATION IDENTIFICATION AND OVERLAY PROVISIONING AS A SERVICE 有权
    作为服务的应用程序标识和覆盖提供

    公开(公告)号:US20170041246A1

    公开(公告)日:2017-02-09

    申请号:US14816406

    申请日:2015-08-03

    CPC classification number: H04L47/825 H04L45/74 H04L47/24

    Abstract: In one embodiment, a first device in a network receives application traffic sent from a source device towards a destination address. The first device sends the application traffic to a traffic identification service. The first device receives an instruction to establish a network tunnel to send the application traffic from the source device towards the destination address. The instruction is based on a classification of the application traffic by the traffic identification service. The first device establishes the network tunnel to send the application traffic from the source device towards the destination address.

    Abstract translation: 在一个实施例中,网络中的第一设备接收从源设备发送到目的地地址的应用流量。 第一个设备将应用流量发​​送到流量识别服务。 第一设备接收建立网络隧道的指令,以将来自源设备的应用流量发​​送到目的地址。 该指令基于流量识别服务对应用流量的分类。 第一个设备建立网络隧道,将应用流量从源设备发送到目的地址。

Patent Agency Ranking