Abstract:
In an example, a method is disclosed for implementing forwarding behavior based on communication activity between an SDN controller and a network device. The method includes generating, for the network device, a first flow table rule to implement first forwarding behavior for a network flow if communication to the SDN controller is active. The first flow table rule comprises match criteria for matching to the network flow, a first timeout value, and a first priority value. The method also includes generating, for the network device, a second flow table rule to implement second forwarding behavior for the network flow if communication to the SDN controller is not active. The second flow table rule comprises match criteria for matching to the network flow, a second timeout value, and a second priority value. The method further includes instructing the network device to implement the first and second flow table rules.
Abstract:
In an example implementation according to aspects of the present disclosure, a method may include identifying, by a computing system, an infrastructure device and an end-host device within a network. The method may further include disseminating, by the computing system, network traffic rules to the infrastructure device, the network traffic rules to route network traffic between end-host devices through the infrastructure device. Further, the network traffic transmitted from a first end-host device to a second end-host device is passed through the infrastructure device to the second end-host device in accordance with the network traffic rules, and network traffic transmitted from the first end-host device to the infrastructure device is blocked by the infrastructure device in accordance with the network traffic rules.
Abstract:
Systems and methods are provided for dynamic grammar augmentation for editing multiple network switch configuration files as a single file. The method includes identifying a first base grammar of a first network switch; identifying a second base grammar of a second network switch; identifying first and second patch grammars for the first and second network switches; generating an augmented grammar based on the first and second patch grammars and the first and second base grammars; identifying a first configuration file for the first network switch; identifying a second configuration file for the second network switch; generating a base merged configuration file, the base merged configuration file representing the first and second configuration files modified according to the augmented grammar.
Abstract:
An expression evaluation system is provided. During operation, the system can obtain an encoded expression associated with a user group of a network and evaluate the encoded expression for a first switch to determine a first set of commands that the user group is allowed to execute on the first switch. The encoded expression can encode a set of commands. The system can then determine validity of the first set of commands for the user group by determining whether a respective user of the user group should be allowed to execute the first set of commands on the first switch. If the system identifies an issue with the validity of the first set commands, the system can generate a notification indicating the issue.
Abstract:
An example method is described for monitoring a network. The method includes detecting that a network attribute has been updated at a network device. The method further includes selecting, based in part on the updated network attribute, a set of network functionality tests from a group of network functionality tests. The method further includes executing the set of network functionality tests. The method further includes receiving information describing functionality of the network during the set of network functionality tests at the network device. The method further includes determining results of the set of network functionality tests based on the information describing functionality of the network. The method further includes calculating a network functionality score based, in part, on the results of the set of network functionality tests.
Abstract:
Example implementations relate to testing an original executable. In an example, the original executable is received at a network device. A modified executable is generated by replacing calls in the original executable to production application programming interfaces (APIs) with calls to mock APIs. The modified executable is executed on the network device. Information associated with execution of the modified executable on the network device is recorded for post-execution analysis.
Abstract:
A controller, which manages nodes that provide virtual entities, receives information from a first of the nodes, where the received information relates to a characteristic of a virtual entity provided by the first node. The controller determines that the received information is inconsistent with information, maintained by the controller, relating to the characteristic of the virtual entity provided by the first node. In response to the determining, the controller reconciles an inconsistency between the received information and the information maintained by the controller.
Abstract:
Example embodiments disclosed herein relate to determining whether a device exhibits anomalous behavior based on a set of rules, address usage information, and address range information. Address usage information for a device communicating on a data plane of a network implemented using switches is received via a control plane. Address range information for the network is maintained. Whether the device exhibits anomalous behavior is determined based on the set of rules, address usage information, and address range information.
Abstract:
Methods for systems are provided. In one aspect, a method for minimizing a network outage includes identifying one or more paths connecting a resource node of the network to an edge switch of one or more edge switches of the network. Each edge switch is connected to one or more endpoint devices to allow resources coupled to the resource node to be provided to the one or more endpoint devices. The method further includes calculating endpoint downtime costs corresponding to rebooting each of the common switches in the network. The common switches are present in all paths connecting the resource node to the edge switch. The calculated endpoint downtime costs corresponding to the one or more common switches are compared. One of the common switches with a highest endpoint downtime cost is identified as a candidate switch for redundancy based on the comparison.
Abstract:
In some examples, a method includes accessing an orthogonal network policy set that represents a first intent-based network policy and a second intent-based network policy. The method may also include determining multiple reduced orthogonal network policy sets from the orthogonal network policy set. The multiple reduced orthogonal network policy sets may differ from one another, and each represent the first and second intent-based network policies. The method may further include selecting a particular reduced orthogonal network policy set among the multiple reduced orthogonal network policy sets to implement on a target switching device.