-
公开(公告)号:US20240187424A1
公开(公告)日:2024-06-06
申请号:US18415423
申请日:2024-01-17
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
CPC classification number: H04L63/1416 , G06F9/45558 , H04L43/08 , H04L47/20 , H04L49/25 , H04L63/20 , G06F2009/45587 , G06F2009/45595
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US11575619B2
公开(公告)日:2023-02-07
申请号:US17080319
申请日:2020-10-26
Applicant: Cisco Technology, Inc.
Inventor: Mingzhe Lu , Hongqing Li , Diana Leung , Madhu Gindi , Preety Mordani , Prabahar Radhakrishnan
IPC: H04L49/00
Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
-
公开(公告)号:US12301478B2
公开(公告)日:2025-05-13
申请号:US18594482
申请日:2024-03-04
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US20240275800A1
公开(公告)日:2024-08-15
申请号:US18644315
申请日:2024-04-24
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
CPC classification number: H04L63/1416 , G06F9/45558 , H04L43/08 , H04L47/20 , H04L49/25 , H04L63/20 , G06F2009/45587 , G06F2009/45595
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US11888876B2
公开(公告)日:2024-01-30
申请号:US18171322
申请日:2023-02-17
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
CPC classification number: H04L63/1416 , G06F9/45558 , H04L43/08 , H04L47/20 , H04L49/25 , H04L63/20 , G06F2009/45587 , G06F2009/45595
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US10439909B2
公开(公告)日:2019-10-08
申请号:US14472194
申请日:2014-08-28
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Preety Mordani , Rahul Patel , Yoshiyuki Tsuda
IPC: G06F15/16 , G06F15/173 , H04L12/26 , H04L29/06 , H04L12/24
Abstract: In one embodiment, a method includes monitoring traffic at a network device at a receiving network site to determine if a performance threshold is violated, transmitting an alert to a sending network site if the performance threshold is violated at a path at the network device, and transmitting traffic information for the path from the network device to the sending network site. The receiving network site comprises a plurality of paths for receiving traffic from the sending network site and traffic information is transmitted to the sending network site for each of the paths if the performance threshold is violated. An apparatus and logic are also disclosed herein.
-
公开(公告)号:US12231444B2
公开(公告)日:2025-02-18
申请号:US18415423
申请日:2024-01-17
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US20240348554A1
公开(公告)日:2024-10-17
申请号:US18133975
申请日:2023-04-12
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Ganesh Devendrachar , Avinash Shah , Preety Mordani , Satyajit Das , Michael John Moskal
Abstract: Techniques are described for avoiding data packet fragmentation in a routing device such as a router or network switch. Path Maximum Transport Unit (PMTU) values are monitored for a plurality of egress links of a networking device. A statistical analysis of fragmentation rates is performed. The statistical analysis can be performed on a per-link basis, per-flow basis or both per-link and per-flow basis. If the packet fragmentation rate of data flows through a particular egress link exceeds a determined threshold value, one or more data flows can be re-routed to a different egress link having a higher PMTU, thereby preventing data packet fragmentation.
-
公开(公告)号:US20230208863A1
公开(公告)日:2023-06-29
申请号:US18171322
申请日:2023-02-17
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Gaurang Rajeev Mokashi , Preety Mordani , Vivek Agarwal
CPC classification number: H04L63/1416 , G06F9/45558 , H04L63/20 , H04L47/20 , H04L43/08 , H04L49/25 , G06F2009/45595 , G06F2009/45587
Abstract: Systems, methods, and computer-readable media for performing threat remediation through a switch fabric of a virtualized network environment. Data traffic passing into a virtualized network environment including a plurality of virtual machines running on a switch fabric is monitored. A network threat introduced through at a least a portion of the data traffic is identified at the switch fabric. One or more remedial measures are performed in the network environment based on the identification of the network threat in the virtualized network environment.
-
公开(公告)号:US20230188479A1
公开(公告)日:2023-06-15
申请号:US18164013
申请日:2023-02-03
Applicant: Cisco Technology, Inc.
Inventor: Mingzhe Lu , Hongqing Li , Diana Leung , Madhu Gindi , Preety Mordani , Prabahar Radhakrishnan
IPC: H04L49/00
CPC classification number: H04L49/3009
Abstract: The present disclosure is directed to adaptive networking policy with user defined fields and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including generating a user defined attribute (UDA) value corresponding to a set of attributes; receiving, at a network device, a packet having one or more packet conditions; determining that the one or more packet conditions of the packet match the set of attributes of the UDA value; assigning a UDA tag to the packet, wherein the UDA tag corresponds to the UDA value and is configured for chaining with one or more other UDA tags; and taking an action on the packet based on the UDA tag.
-
-
-
-
-
-
-
-
-