-
公开(公告)号:US20230131771A1
公开(公告)日:2023-04-27
申请号:US17508731
申请日:2021-10-22
Applicant: Cisco Technology, Inc.
Inventor: Shree Murthy , Sanjay Kumar Hooda , Prakash C. Jain , Roberto Kobo , Rajagopal Venkatraman
IPC: H04L9/40 , H04L61/5014 , G06F9/455
Abstract: Techniques for analyzing traffic originating from a host device in a wireless network to identify one or more virtual machines (VMs) running on the host device and connected to the network via the host device in bridge mode. When a VM is created in bridge mode behind a host device, the traffic originated by the VM will have the source Media Access Layer (MAC) address of the host device. According to techniques described herein, devices and/or components associated with the network may profile the traffic to identify an address of the VM, such as by analyzing dynamic host configuration protocol (DHCP) packets to determine the Internet Protocol (IP) address of the VM. Once the IP address and the MAC address of the VM is known, the components and/or devices may apply security policies to the VM that may be different than security policies applied to the host device.
-
公开(公告)号:US20220353186A1
公开(公告)日:2022-11-03
申请号:US17242601
申请日:2021-04-28
Applicant: Cisco Technology, Inc.
Inventor: Victor Manuel Moreno , Sanjay Kumar Hooda , Anoop Vetteth , Prakash C. Jain
IPC: H04L12/803 , H04L12/771 , H04L12/16
Abstract: This disclosure describes techniques for software-defined service insertion. The techniques include a method of configuring a network for service insertion. The techniques include processing a master policy correlating an endpoint group pair, of source endpoint group and destination endpoint group, to a service graph. The service graph indicates a template service chain, and the template service chain indicates an ordering of a plurality of services. Processing the master policy includes disaggregating the master policy into at least one location specific policy, each of the at least one location specific policy corresponding to a separate location in the network and including traffic steering directives corresponding to a portion of the plurality of services associated with the separate location. The techniques further include causing each of the at least one location specific policy to be stored in association with the separate location to which that location specific policy corresponds.
-
公开(公告)号:US20220191135A1
公开(公告)日:2022-06-16
申请号:US17684376
申请日:2022-03-01
Applicant: Cisco Technology, Inc.
Inventor: Satish Kondalam , Sanjay Kumar Hooda , Prakash C. Jain , Vikram Vikas Pendharkar
Abstract: Systems, methods, and computer-readable media for discovering silent hosts in a software-defined network and directing traffic to the silent hosts in a scalable and targeted manner include determining interfaces of a fabric device that are connected to respective one or more endpoints, where the fabric device is configured to connect the endpoints to a network fabric of the software-defined network. At least a first interface is identified, where an address of a first endpoint connected to the first interface is not available at the fabric device. A first notification is transmitted to a control plane of the software-defined network based on identifying the first interface, where the control plane may create a flood list which includes the fabric device. Traffic intended for the first endpoint from the network fabric is received by the fabric device can be based on the flood list.
-
公开(公告)号:US11102074B2
公开(公告)日:2021-08-24
申请号:US16368624
申请日:2019-03-28
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Muninder Singh Sambi , Victor Moreno , Prakash C. Jain , Tarunesh Ahuja , Satish Kondalam
Abstract: Systems, methods, and computer-readable storage media are provided for provisioning a common subnet across a number of subscribers and their respective virtual networks using dynamically generated network policies that provide isolation between the subscribers. The dynamic generation of the network policies is performed when a host (e.g. client) is detected (via a switch) as the host joins the computing network via virtual networks. This ability to configure a common subnet for all the subscriber virtual networks allows these subscribers to more easily access external shared services coming from a headquarter site while keeping the separation and segmentation of multiple subscriber virtual networks within a single subnet. This allows the Enterprise fabric to be more simple and convenient to deploy without making security compromises.
-
公开(公告)号:US20180367328A1
公开(公告)日:2018-12-20
申请号:US15792180
申请日:2017-10-24
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Prakash C. Jain , Rishabh Parekh , Atri Indiresan , Satish Kondalam , Victor Moreno
CPC classification number: H04L12/1886 , H04L12/1818 , H04L12/185 , H04L45/48 , H04L45/74 , H04L47/2416 , H04L61/103 , H04L61/2069 , H04L61/2084 , H04L65/1093
Abstract: A method including determining that network traffic being transmitted is unicast or multicast; mapping to which virtual network and locator address each host belongs; generating leaking data for unicast and multicast traffic, wherein the leaking data indicates that a first virtual network leaks traffic to a second virtual network; receiving a request from the second virtual network to receive traffic from a host in the first virtual network; determining, based on the leaking data and the type of traffic being transmitted, if the first virtual network leaks traffic to the second virtual network; if the first virtual network leaks traffic to the second virtual network, determining a locator address for the host in the first virtual network using the mapping data; and transmitting the locator address for the host to the second virtual network to enable traffic leaking from the host to the second virtual network is disclosed.
-
公开(公告)号:US12267238B2
公开(公告)日:2025-04-01
申请号:US18198104
申请日:2023-05-16
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. Jain , Sanjay Kumar Hooda , Darrin Joseph Miller , Ashwin Kumar
Abstract: Techniques for group-based classification and policy enforcement at a network fabric edge for traffic that is being sent to external network destinations are disclosed herein. The techniques may include receiving, at a control plane of a network and from an edge node of the network, a request to provide mapping data associated with sending a packet to a destination. Based at least in part on an address prefix value associated with the destination, the control plane may determine that the destination is located in an external network. Additionally, a group identifier that is associated with the destination may be determined. In this way, an indication of the group identifier may be sent to the edge node such that the edge node may determine, based at least in part on the group identifier, a policy decision for routing the packet to the external network.
-
公开(公告)号:US12212544B2
公开(公告)日:2025-01-28
申请号:US17526164
申请日:2021-11-15
Applicant: Cisco Technology, Inc.
Inventor: Sanjay Kumar Hooda , Prakash C. Jain
IPC: H04L9/40 , H04L45/745
Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.
-
公开(公告)号:US20240406183A1
公开(公告)日:2024-12-05
申请号:US18223344
申请日:2023-07-18
Applicant: Cisco Technology, Inc.
Inventor: Marc Portoles Comeras , Sanjay Kumar Hooda , Balaji Pitta Venkatachalapathy , Kedar Sudhir Karmarkar , Prakash C. Jain
IPC: H04L9/40 , H04L45/02 , H04L45/745
Abstract: Techniques for propagating security group tag mapping between external interconnected sites that are not capable of carrying the SGT mappings. A system is disclosed that includes operations of subscribing at a first border of a first site, by a control plane, a first SGT mapping associated with a first data packet at the first site for storing the SGT mapping of the first data packet at the control plane. Then transmitting, the first data packet from the first border of the first site to a second border of the second site without attaching the first SGT mapping with the first data packet. Further, in response to a determination by the control plane that the first data packet has lost the associated first SGT mapping at the second border, identifying the SGT mapping with the first data packet at the second border to be re-associated with the first data packet.
-
公开(公告)号:US12113698B2
公开(公告)日:2024-10-08
申请号:US17446918
申请日:2021-09-03
Applicant: Cisco Technology, Inc.
Inventor: Rajeev Kumar , Sanjay K. Hooda , Balaji Pitta Venkatachalapathy , Prakash C. Jain , Rajagopal Venkatraman
IPC: H04L45/64 , H04L45/02 , H04L45/745
CPC classification number: H04L45/02 , H04L45/64 , H04L45/745
Abstract: Techniques and apparatus for allowing a network fabric to accept network devices associated with other fabric networks are described. An example technique involves establishing a communication session between a first network node and a first control plane of the network fabric, wherein the first network node supports a second control plane different from the first control plane; First routing information from the first network node is imported into a first routing table of the first control plane. Second routing information from a second network node is imported into a second routing table of the first network node.
-
50.
公开(公告)号:US12082294B2
公开(公告)日:2024-09-03
申请号:US17554887
申请日:2021-12-17
Applicant: Cisco Technology, Inc.
Inventor: Prakash C. Jain , Parthiv Shah , Anton Smirnov
Abstract: Techniques and architecture are described for providing connectivity and monitoring the connectivity of a fabric network controller/control plane with external and extended network controllers/control planes. The techniques and architecture provide a method that includes provisioning a control plane of a first network with a control plane of a second network. The method also includes establishing a session between the control planes of the first and second networks. The method further includes registering nodes of the first network with the control plane of the second network and providing, by the control plane of the first network to the control plane of the second network, information related to endpoints within the first network. The method also includes monitoring, reporting, and possibly taking corrective actions, by the control plane of the second network, with respect to connectivity/status between the control plane of the first network and the control plane of the second network.
-
-
-
-
-
-
-
-
-