Abstract:
Methods and apparatus for allowing a central network manager to distribute corrective configuration information to customers using e-mail are disclosed. According to one aspect of the present invention, a method includes determining if an issue is reported by a first customer system that supports a first device. The issue is associated with the first device. The method also includes obtaining updating information if the issue is reported by the first customer system, and providing the updating information to the first customer system. The first customer system is arranged to distribute the updating information to the first device and to cause the updating information to be implemented on the first device.
Abstract:
Programmable network intelligence approaches as disclosed herein provide apparatus, methods and tools to achieve programmable interfaces to a device, or group of devices or a network where native programmable interfaces are not available.
Abstract:
Information flow between network elements in a network enables a management system to capture a security knowledge base and to perform a static analysis of the network. In one embodiment, a method for performing a network security audit based on information flows among network elements comprises the machine-implemented steps of obtaining a network inventory that identifies one or more network elements of a packet-switched network; determining how information packets flow through the one or more network elements; determining a first threat level for each of the one or more network elements; determining a second threat level for the network as a whole; and providing a report of a network security audit based on the first and second threat levels.
Abstract:
Syntax and semantic validation of network commands use a command database that has been learned automatically for validation of the syntax and the semantics of command line interface commands by interpreting the network commands as the network commands are entered to identify syntax errors or semantic errors before applying the same commands on a device of interest.
Abstract:
Information flow between network elements in a network enables a management system to capture a security knowledge base and to perform a static analysis of the network. In one embodiment, a method for performing a network security audit based on information flows among network elements comprises the machine-implemented steps of obtaining a network inventory that identifies one or more network elements of a packet-switched network; determining how information packets flow through the one or more network elements; determining a first threat level for each of the one or more network elements; determining a second threat level for the network as a whole; and providing a report of a network security audit based on the first and second threat levels.
Abstract:
Data Model Prediction tries to emulate the existing non-programmable interfaces by accurately predicting the data structures and operations required to provide the programmable interfaces.
Abstract:
Data Model Prediction tries to emulate the existing non-programmable interfaces by accurately predicting the data structures and operations required to provide the programmable interfaces.