AUTOMATIC GENERATION OF REUSABLE NETWORK CONFIGURATION OBJECTS
    2.
    发明申请
    AUTOMATIC GENERATION OF REUSABLE NETWORK CONFIGURATION OBJECTS 失效
    自动生成可重复使用的网络配置对象

    公开(公告)号:US20120254441A1

    公开(公告)日:2012-10-04

    申请号:US13423186

    申请日:2012-03-17

    IPC分类号: G06F15/173

    摘要: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

    摘要翻译: 一种方法自动捕获网络系统的每个单独系统的网络资源。 该方法为从各个系统捕获的每个类型的网络资源定义可重用的对象名称。 每类网络资源至少有一个共同特征。 该方法自动将具有每个单独系统的特定类别的每个网络资源映射到为该特定类定义的可重用对象名称。 实施例使得诸如IP地址之类的各个系统特定的资源被映射到可重用的对象。 在一些实施例中,可重复使用的对象名称可以被组合以形成诸如网络配置规则的更高级配置对象。

    Automatic generation of reusable network configuration objects
    5.
    发明授权
    Automatic generation of reusable network configuration objects 失效
    自动生成可重复使用的网络配置对象

    公开(公告)号:US08606925B2

    公开(公告)日:2013-12-10

    申请号:US13079792

    申请日:2011-04-04

    IPC分类号: G06F15/173

    摘要: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

    摘要翻译: 系统自动捕获网络系统的每个单独系统的网络资源。 该方法为从各个系统捕获的每个类型的网络资源定义可重用的对象名称。 每类网络资源至少有一个共同特征。 系统将具有每个单独系统的特定类别的每个网络资源自动映射到为该特定类定义的可重用对象名称。 实施例使得诸如IP地址之类的各个系统特定的资源被映射到可重用的对象。 在一些实施例中,可重复使用的对象名称可以被组合以形成诸如网络配置规则的更高级配置对象。

    AUTOMATIC GENERATION OF REUSABLE NETWORK CONFIGURATION OBJECTS
    6.
    发明申请
    AUTOMATIC GENERATION OF REUSABLE NETWORK CONFIGURATION OBJECTS 失效
    自动生成可重复使用的网络配置对象

    公开(公告)号:US20120254438A1

    公开(公告)日:2012-10-04

    申请号:US13079792

    申请日:2011-04-04

    IPC分类号: G06F15/173

    摘要: A system automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The system automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

    摘要翻译: 系统自动捕获网络系统的每个单独系统的网络资源。 该方法为从各个系统捕获的每个类型的网络资源定义可重用的对象名称。 每类网络资源至少有一个共同特征。 系统将具有每个单独系统的特定类别的每个网络资源自动映射到为该特定类定义的可重用对象名称。 实施例使得诸如IP地址之类的各个系统特定的资源被映射到可重用的对象。 在一些实施例中,可重复使用的对象名称可以被组合以形成诸如网络配置规则的更高级配置对象。

    Automatic generation of reusable network configuration objects
    7.
    发明授权
    Automatic generation of reusable network configuration objects 失效
    自动生成可重复使用的网络配置对象

    公开(公告)号:US08612602B2

    公开(公告)日:2013-12-17

    申请号:US13423186

    申请日:2012-03-17

    IPC分类号: G06F15/173

    摘要: A method automatically captures network resources of each individual system of a networked system. The method defines a reusable object name for each class of network resources captured from the individual systems. Each class of network resources has at least one common feature. The method automatically maps each network resource having a particular class of each individual system to the reusable object name defined for that particular class. Embodiments enable individual system-specific resources, such as IP addresses, to be mapped to reusable objects. In some embodiments, reusable objects names may be combined to form higher-level configuration objects, such as network configuration rules.

    摘要翻译: 一种方法自动捕获网络系统的每个单独系统的网络资源。 该方法为从各个系统捕获的每个类型的网络资源定义可重用的对象名称。 每类网络资源至少有一个共同特征。 该方法自动将具有每个单独系统的特定类别的每个网络资源映射到为该特定类定义的可重用对象名称。 实施例使得诸如IP地址之类的各个系统特定的资源被映射到可重用的对象。 在一些实施例中,可重复使用的对象名称可以被组合以形成诸如网络配置规则的更高级配置对象。

    Tiered network policy configuration with policy customization control
    8.
    发明授权
    Tiered network policy configuration with policy customization control 失效
    具有策略定制控制的分层网络策略配置

    公开(公告)号:US08539548B1

    公开(公告)日:2013-09-17

    申请号:US13458610

    申请日:2012-04-27

    IPC分类号: G06F21/00

    CPC分类号: G06F21/6218

    摘要: A hierarchical administrative system centrally controls configuration of network security policy for a group of information handling systems (IHSs) by multiple tier levels of administration. The highest tier level of administration builds policies that fulfill IT security policy intent. Higher level administrators may scope subordinate administrators to a group of IHSs or a single IHS. Higher level administrators may allow subordinate administrators to perform system specific customization of the policy based on permissions that the higher level administrator grants. Customization may include completing partially-built rule conditions with IP address and port, completing partially-built rule actions, and adding or deleting rules based on IHS unique applications or security requirements. A security enforcement tool may enforce customizations of network security policy. A security policy administration tool along with the security enforcement tool may detect attempts to work around the administrative system, and alerts higher tier level administrators and/or takes remedial action.

    摘要翻译: 分级管理系统通过多层次管理集中控制一组信息处理系统(IHS)的网络安全策略配置。 最高级别的管理层构建了实现IT安全策略意图的策略。 较高级别的管理员可以将下级管理员列为一组IHS或单个IHS。 较高级别的管理员可以允许下级管理员根据上级管理员授予的权限执行策略的系统特定定制。 定制可能包括完成部分构建的IP地址和端口的规则条件,完成部分构建的规则操作,以及基于IHS唯一应用程序或安全要求添加或删除规则。 安全执行工具可以强制实施网络安全策略的自定义。 安全策略管理工具以及安全执行工具可以检测围绕管理系统的尝试,并警告更高级别的管理员和/或采取补救措施。