Detecting configuration anomaly in user configuration

    公开(公告)号:US11546217B1

    公开(公告)日:2023-01-03

    申请号:US17475289

    申请日:2021-09-14

    Abstract: One aspect of the instant application facilitates detection of configuration anomaly. During operation, a system can convert a set of rules associated with configuration syntax information for a feature in a respective feature document to at least a structured regular expression. Then the system generates a set of configuration templates with a respective configuration template including the structured regular expression corresponding to the feature document. The system can select, based on a target configuration associated with the network device, a subset of the configuration templates and can extract, based on a match between the selected configuration templates and the target configuration, a set of features. The system can determine one or more rules associated with the extracted features. Based on the one or more rules the system can determine an anomaly in the target configuration and generate at least one recommended configuration to alleviate the anomaly.

    Multiple-site private network secured by IPsec using blockchain network for key exchange

    公开(公告)号:US11349653B2

    公开(公告)日:2022-05-31

    申请号:US16224758

    申请日:2018-12-18

    Abstract: In some implementations, a method includes: preparing, at a first networking device, an incoming security key update request transaction, the incoming security key update request transaction including a request by the first networking device to use an incoming security key for incoming communications with other networking devices during an IPsec session, where the first networking device and the other networking devices communicate over a blockchain network including a blockchain; transmitting the incoming security key update request transaction from the first networking device to the blockchain network for validation; updating a copy of the blockchain with a block, the block including a validation of the incoming security key update request transaction that was transmitted to the blockchain network; and using at least the updated blockchain to update an IPsec security association (SA) or an IPsec security policy (SP) used by the first networking device.

Patent Agency Ranking