NAT ROUTE DISTRIBUTION BASED ON TAG INFORMATION IN AN SDWAN OVERLAY NETWORK

    公开(公告)号:US20250126091A1

    公开(公告)日:2025-04-17

    申请号:US18909072

    申请日:2024-10-08

    Abstract: A process can include determining a plurality of Network Address Translation (NAT) routes associated with respective edge routers included in a same virtual private network (VPN) for communicating with a software-defined wide area network (SDWAN). A process can include identifying a first subset of the plurality of NAT routes as mapped to a first public NAT address included in a NAT pool associated with the VPN. A process can include tagging each NAT route of the first subset with a tag value indicative of a preferred router for receiving return traffic of the respective NAT route. A process can include routing traffic on a respective NAT route of the plurality of NAT routes based on applying, at an SDWAN controller, a corresponding control policy matching the tag value of the respective NAT route.

    Eventually-consistent message delivery system for edge applications

    公开(公告)号:US12278872B2

    公开(公告)日:2025-04-15

    申请号:US18665320

    申请日:2024-05-15

    Abstract: In one embodiment, a method by a site router agent at an edge site includes receiving a first message from a message router at an edge backend, where a destination field of the first message includes a destination information, determining that the first message is destined to a first application instance by comparing a first unique identifying information associated with the first application instance with the destination information, storing the first message into a storage communicatively connected to the site router agent, establishing a network connection with the first application instance, and sending the first message to the first application instance upon establishing the network connection.

    Optimized protected segment-list determination for weighted SRLG TI-LFA protection

    公开(公告)号:US12278754B2

    公开(公告)日:2025-04-15

    申请号:US18516571

    申请日:2023-11-21

    Abstract: A method includes generating a first shortest path tree for traffic routing in a network, the first shortest path tree identifying a corresponding shortest path from the network node to other nodes in the network and generating a second shortest path tree for traffic routing after removing an element from the network. The second shortest path tree identifies a corresponding shortest path from the network node to the other nodes in the network with the element removed. A third shortest path tree is generated, which is a weighted version of the second shortest path tree with a weight value added to any node or link in the network sharing a SRLG value with the element removed from the network. Network traffic is enforced based on a comparison of the third shortest path tree with at least one of the first shortest path tree and the second shortest path tree.

    Distributed virtualization of telemetry processing with IP anycast

    公开(公告)号:US12278737B2

    公开(公告)日:2025-04-15

    申请号:US17978259

    申请日:2022-11-01

    Abstract: Presented herein are techniques to analyze network traffic and equipment based on telemetry generated by a plurality of network devices. A method includes generating first telemetry at a first network device, receiving, at the first network device, via an Internet Protocol anycast addressing scheme, at least one of second telemetry generated at a second network device, and third telemetry generated at a third network device, performing, on the first network device using a local processing unit, first analytics on the first telemetry, performing, on the first network device using the local processing unit, second analytics on the at least one of the second telemetry and the third telemetry, and transmitting data resulting from the first analytics and the second analytics to a fourth network device.

    Runtime container protection
    48.
    发明授权

    公开(公告)号:US12277446B2

    公开(公告)日:2025-04-15

    申请号:US17202447

    申请日:2021-03-16

    Abstract: According to certain embodiments, a method comprises monitoring a request for use of memory requested by a container manager application on behalf of a given one of a plurality of containers during runtime of the given container. The method further comprises determining that the request for use of memory has caused an exception. The exception indicates that the request has requested an invalid operation on a memory table or that the request has requested a previously not seen memory table. In response, the method further comprises determining an action to perform. The action depends on both first trustworthiness information associated with the given container and second trustworthiness information associated with the given container. The first trustworthiness information is obtained from a Third Party Reputation Service (TPRS). The second trustworthiness information is obtained based on monitoring the runtime behavior of the given container.

Patent Agency Ranking