NETWORK SEGMENTATION FOR CONTAINER ORCHESTRATION PLATFORMS

    公开(公告)号:US20250016029A1

    公开(公告)日:2025-01-09

    申请号:US18892845

    申请日:2024-09-23

    Abstract: In general, techniques are described for performing network segmentation for container orchestration platforms. A network controller comprising a memory and processing circuitry may be configured to perform the techniques. The memory may be configured to store a request, conforming to a container orchestration platform, to configure a new pod of a plurality of pods with a primary interface to communicate on a virtual network to segment a network formed by the plurality of pods. The processing circuitry may be configured to configure, responsive to the request, the new pod with the primary interface to enable communications via the virtual network.

    Network access control intent-based policy configuration

    公开(公告)号:US12192241B2

    公开(公告)日:2025-01-07

    申请号:US17937208

    申请日:2022-09-30

    Abstract: Techniques are described for configuration and application of intent-based network access control (NAC) policies for authentication and authorization of multi-tenant, network access server (NAS) devices to access enterprise networks of organizations. A network management system configures intent-based NAC policies for an organization. A cloud-based NAC system may apply an appropriate intent-based NAC policy in response to an authentication request from a NAS device. The NAC system identifies a vendor of the NAS device, matches incoming attributes in the authentication request to a set of normalized match rules of the intent-based NAC policy, and translates a set of abstracted policy results corresponding to the set of normalized match rules into a vendor-specific set of return attributes based on the vendor of the NAS device. The NAC system sends the vendor-specific set of return attributes to the NAS device to enable the NAS device to access the enterprise network of the organization.

    MULTIPLEXING TENANT TUNNELS IN SOFTWARE-AS-A-SERVICE DEPLOYMENTS

    公开(公告)号:US20250004738A1

    公开(公告)日:2025-01-02

    申请号:US18294933

    申请日:2022-08-05

    Abstract: An example system includes a service provider, wherein the service provider is configured to: receive a connection request from an enterprise device via one or more communication networks, generate a route, a logical tunnel, and a first port number, instantiate, by the service provider, a service process configured to listen for network traffic at a first port associated with the first port number, store an association of the route to a logical tunnel interface for the logical tunnel with one of a plurality of virtual machines (VMs) and an association of the first port number with a source Internet protocol (IP) address obtained from the connection request, and forward, to the first port, an application request received from the enterprise at a second port associated with a second port number and via a tunnel established with the enterprise device.

    Creating roles and controlling access within a computer network

    公开(公告)号:US12184659B2

    公开(公告)日:2024-12-31

    申请号:US18047727

    申请日:2022-10-19

    Abstract: This disclosure is directed to devices, systems, and techniques for enforcing access to resources within a computer network. In some examples, a system includes a network managed by a service provider and configured to provide a plurality of microservices to a plurality of tenants each having one or more users and a controller having access to the network. The controller is configured to output, to a user interface, data indicative of a plurality of capabilities for presentation by the user interface and receive, from the user interface, data indicative of a user selection of a set of capabilities and a user selection of a new role identifier. The controller is further configured to create, based on the set of capabilities and the role identifier, a role which enables access to a set of actions within a computer network, the set of actions corresponding to the set of capabilities.

    Using anycast as an abstract next hop (ANH) to reduce information related to border gateway protocol (BGP) next hops received by autonomous system border routers (ASBRs) and/or to improve BGP path convergence

    公开(公告)号:US12184532B1

    公开(公告)日:2024-12-31

    申请号:US18381607

    申请日:2023-10-18

    Abstract: An autonomous system border router (ASBR) provided in a domain in which routers share an anycast address, may perform a method comprising: (a) receiving, from an exterior Border Gateway Protocol (eBGP) peer, first reachability information for a first prefix, the first reachability information including a first next hop (NH) address; (b) communicating first link state information about the first prefix to another router in the domain, the first link state information associating the first prefix with the anycast address; (c) receiving, from an eBGP peer, second reachability information for a second prefix, the second reachability information including a second next hop (NH) address; and (d) communicating second link state information about the second prefix to the other router in the domain, the second link state information associating the second prefix with the anycast address. This effectively reduces the number of next hops related to a prefix learned by two or more ASBRs (e.g., one or more spine routers in a Clos of an aggregate spine) via eBGP, stored as forwarding information on a non-ASBR in an IGP domain (e.g., on a leaf node in a Clos of an aggregate spine).

    Rollback-on-error support for forwarding components of a network device

    公开(公告)号:US12184493B1

    公开(公告)日:2024-12-31

    申请号:US18473469

    申请日:2023-09-25

    Abstract: A network device may receive an original configuration that includes configuration objects, and may generate, based on the original configuration, a dependency graph that includes nodes representing and entries representing the configuration objects. The network device may receive a configuration update that includes new configuration objects, and may update the dependency graph based on the configuration update and to generate an updated dependency graph that includes new nodes and/or new entries representing the new configuration objects. The network device may test the configuration update, based on the updated dependency graph, to determine whether the configuration update fails or succeeds. The network device may selectively implement the configuration update based on the configuration update succeeding or perform a rollback of the configuration update, based on the configuration update failing, to restore the original configuration.

    INTER-AUTONOMOUS SYSTEM (INTER-AS) OPTION

    公开(公告)号:US20240430197A1

    公开(公告)日:2024-12-26

    申请号:US18341439

    申请日:2023-06-26

    Abstract: In some implementations, a network device may receive, from a first other network device, a route that includes a label, a prefix, and a next-hop identifier. The network device may generate, based on receiving the route, a composite tunnel attribute that includes an identifier of the network device and a label allocated by the network device. The network device may modify, based on generating the composite tunnel attribute, the route to cause the composite tunnel attribute to be included in the route. The network device may send, based on modifying the route, the route to a second other network device.

    NETWORK ANOMALY DETECTION AND MITIGATION

    公开(公告)号:US20240430153A1

    公开(公告)日:2024-12-26

    申请号:US18828155

    申请日:2024-09-09

    Inventor: Ebrahim Safavi

    Abstract: A network management system may detect congestion and other network problems, identify the root cause of the issue and invoke remedial actions. The network management system may collect a time series of network data from various devices in the network. The network management system may use the collected network data to determine metrics indicating whether the network is experiencing congestion and/or anomalies, and if so, what is the root cause. Once the root cause is identified an automated and/or manual corrective action may take place.

    Efficient encryption and decryption of duplicate packets communicated via a virtual private network

    公开(公告)号:US12177187B2

    公开(公告)日:2024-12-24

    申请号:US18145995

    申请日:2022-12-23

    Abstract: A network device may create an encrypted packet and may duplicate the encrypted packet to create a plurality of encrypted packets that includes a first set of encrypted packets that is associated with a first receiving network device and a second set of encrypted packets that is to be associated with a second receiving network device. The network device may modify the second set of encrypted packets by replacing a first virtual destination address in the second set of the plurality of encrypted packets with a second virtual destination address that identifies a virtual tunnel endpoint of the second receiving network device. The network device may encapsulate and may send, based on the first virtual destination address and the second virtual destination address, individual encapsulated encrypted packets to the first receiving network device or the second receiving network device.

Patent Agency Ranking