Applying computer network security policy using domain name to security group tag mapping

    公开(公告)号:US10609081B1

    公开(公告)日:2020-03-31

    申请号:US15796948

    申请日:2017-10-30

    Abstract: In one example embodiment, a network appliance is configured to process packets in a network. The network appliance obtains a mapping of a domain name to a security group tag having associated therewith one or more security policies. The network appliance receives a network packet having an Internet Protocol address. The network appliance determines a particular domain name associated with the Internet Protocol address of the packet. Based on the mapping of the domain name to the security group tag and the particular domain name, the network appliance determines whether the network packet is associated with the security group tag. The network appliance applies the one or more security policies to the network packet based on the security group tag when the particular domain name of the network packet matches the domain name.

    DHCP in layer-3 overlay with anycast address support and network address transparency

    公开(公告)号:US10454882B2

    公开(公告)日:2019-10-22

    申请号:US15638413

    申请日:2017-06-30

    Abstract: Address support and network address transparency may be provided. First, a border device may receive a processed network configuration parameter request having an address of a subnet to which a client device is associated and information data in an information field of the network configuration parameter request. The information data may comprise an address of a network device and an identifier of the subnet to which the client device is associated. Next, the border device may encapsulate the processed network configuration parameter request with the information data extracted from the processed network configuration parameter request. The border device may then forward the encapsulated network configuration parameter response to the network device.

    Underlay Overlay Correlation for Visibility and Debugging

    公开(公告)号:US20180077055A1

    公开(公告)日:2018-03-15

    申请号:US15263405

    申请日:2016-09-13

    Abstract: A network device may receive a flow having source information corresponding to a first client device and destination information corresponding to a second client device. A tag may then be created by the network device for the flow based upon the source information and the destination information. Next, the network device may encapsulate a packet corresponding to the flow. The packet may be encapsulated with encapsulation information including the created tag. The encapsulated packet may then be routed through a plurality of intermediate network devices in the network. The created tag encapsulated with the packet may identify the packet as being a part of the flow as the packet is routed through the plurality of intermediate network devices.

    Localization of Group Based Policies in a Demand Based Overlay Network

    公开(公告)号:US20180034732A1

    公开(公告)日:2018-02-01

    申请号:US15220441

    申请日:2016-07-27

    CPC classification number: H04L45/745 H04L45/741 H04L47/20

    Abstract: A first network device may receive a frame from a first client device that may be destined for a second client device. Then a request may be sent to a network control plane of a network by the first network device in response to receiving the frame. The request may be for information on reachability for the second client device and may comprise an identifier of the second client device and first metadata corresponding to the first client device. The first network device may receive, from the network control plane, in response to sending the request, a policy rule-set for a flow corresponding to the frame and for a location of the second client device. The network control plane may use the identifier of the second client device and the first metadata as keys to lookup the location of the second client device and the policy rule-set.

    Trace feature across the network (depth and breadth)-wise

    公开(公告)号:US09729422B2

    公开(公告)日:2017-08-08

    申请号:US14656840

    申请日:2015-03-13

    CPC classification number: H04L43/16 H04L41/0853 H04L43/04 H04L43/10

    Abstract: A feature trace capability may be provided for features including, but not limited to, automatic quality of service (auto QoS), power over Ethernet (PoE), and fabric compatibility. A network command may be implemented with the capability to validate features across a network path or the network as a whole. The output of this network command may result in the display of details about supported features. Such a command may also result in a listing of what devices require upgrades to support any number of features of interest. Embodiments of the feature trace capability may be configured such that the query gets terminated once a final subnet (or endpoint) is reached. Alternatively, the feature trace capability may be configured such that the query gets terminated after a maximum hop count, or trace total (trace_ttl) is reached. Such a limit may prevent the continuous flooding of the network.

    Dynamic user private networks of a shared virtual network

    公开(公告)号:US12107721B2

    公开(公告)日:2024-10-01

    申请号:US18426498

    申请日:2024-01-30

    CPC classification number: H04L41/0813 H04L12/4641 H04L67/306 H04L2212/00

    Abstract: In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.

Patent Agency Ranking