POLICY-BASED APPLICATION OF A POINT-TO-POINT SECURITY PROTOCOL TO A NETWORK FLOW FROM A SOURCE APPLICATION

    公开(公告)号:US20250071146A1

    公开(公告)日:2025-02-27

    申请号:US18493015

    申请日:2023-10-24

    Abstract: Some examples relate to applying a point-to-point security protocol to a network flow from a source application. In an example, in an example implementation, a network device can receive a network flow from a network client on a network. The network device can analyze a network packet of the network flow. Based on the analysis, the network device can identify a source application of the network flow. The network device can then refer to a lookup table in an integrated circuit (IC) on the network device that includes a point-to-point security protocol (PSP)-related policy for the source application. Based on the PSP policy in the lookup table, the network device can abstain from applying PSP-based encryption to the network flow from the source application.

Patent Agency Ranking