UNDERLAY PATH DISCOVERY FOR A WIDE AREA NETWORK

    公开(公告)号:US20230261963A1

    公开(公告)日:2023-08-17

    申请号:US17846647

    申请日:2022-06-22

    IPC分类号: H04L45/02 H04L45/00 H04L43/12

    CPC分类号: H04L45/02 H04L45/20 H04L43/12

    摘要: The subject matter of this disclosure relates in general to the field of computer networking, and more particularly, to systems and methods for discovery of a tunnel for wide area network. Certain aspects provide a method for network path analysis. The method includes sending a first probe packet configured to identify a network tunnel, wherein the first probe packet includes an identifier of the first probe packet and a first time to live (TTL) value that corresponds to a first network hop; receiving a first response message from the first network hop in the network tunnel, wherein the first response message corresponds to the first probe packet and includes the identifier of the first probe packet; and analyzing the network tunnel based on the first response message including the identifier of the first probe packet.

    ON-PATH DYNAMIC POLICY ENFORCEMENT AND ENDPOINT-AWARE POLICY ENFORCEMENT FOR ENDPOINTS

    公开(公告)号:US20200322230A1

    公开(公告)日:2020-10-08

    申请号:US16782769

    申请日:2020-02-05

    IPC分类号: H04L12/24 H04L12/801

    摘要: Systems, methods, and computer-readable media for locally applying endpoint-specific policies to an endpoint in a network environment. A network device local to one or more endpoints in a network environment can receive from a centralized network controller one or more network-wide endpoint policies. A first endpoint of the one or more endpoints can be configured to inject policy metadata into first data traffic. Policy metadata injected into the first traffic data can be received from the first endpoint. The network device can determine one or more first endpoint-specific polices for the first endpoint by evaluation the first policy metadata with respect to the one or more network-wide endpoint policies. As follows, the one or more first endpoint-specific policies can be applied to control data traffic associated with the first endpoint.