摘要:
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received at a security manager processor from a security agent. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication. The security manager processor verifies compatibility between the at least one executable security object, the network device, and communication media. The method also includes sending the at least one executable security object to the network device via the security manager processor to provide a protective security measure to the network device against the at least one detected security issue upon execution of the at least one executable security object.
摘要:
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received at a security manager processor from a security agent. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication. The security manager processor verifies compatibility between the at least one executable security object, the network device, and communication media. The method also includes sending the at least one executable security object to the network device via the security manager processor to provide a protective security measure to the network device against the at least one detected security issue upon execution of the at least one executable security object.
摘要:
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received from a security agent at a security manager processor. The method includes polling, via the security manager processor, at least one other network device in response to the indication in order to retrieve additional information when the security manager processor determines that the additional information is needed. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication and the additional information. The method also includes initiating communication of the at least one executable security object to the network device via the security manager processor.
摘要:
A method includes receiving an indication of at least one detected security issue at a network device. The indication is received from a security agent at a security manager processor. The method includes polling, via the security manager processor, at least one other network device in response to the indication in order to retrieve additional information when the security manager processor determines that the additional information is needed. The method includes selecting, via the security manager processor, at least one executable security object responsive to the indication and the additional information. The method also includes initiating communication of the at least one executable security object to the network device via the security manager processor.
摘要:
The present disclosure provides a system and method configured to manage and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.
摘要:
The present disclosure provides a system and method configured to and facilitate network security. When a lack of security in a communication network is detected by a security agent or when a remote device requests security, a security profile can be determined by a security manager based on the detection or the request and the available network equipment. The security profile may contain numerous executable security objects that are selected based on the security issue and parameters of the specific network device(s) that will be implementing the security feature. The system and method may include a plurality of executable security objects configured to provide security for operations associated with multiple network devices communication over the network.
摘要:
A system and method are disclosed for monitoring communications of an individual in a packet network. A system that incorporates teachings of the present disclosure may include, for example, a network monitor having a communications interface coupled to a packet network, and a controller. The controller can be programmed to receive a request from a third party to monitor communications associated with an individual, convey to the third party information monitored on a group of one or more permanent virtual circuits (PVCs) of the packet network associated with the individual, detect an update in the group of one or more PVCs, determine new set of one or more PVCs associated with the individual, and convey to the third party information monitored from the new set of one or more PVCs.
摘要:
A method and apparatus for automatic synchronization of monitoring points for a network management system (“NMS”) along a permanent virtual circuit (“PVC”) is disclosed. A NMS in an synchronous transfer mode (“ATM”) network coupled to a plurality of ATM switches is operative to monitor each of the plurality of ATM switches storied in a monitoring service object corresponding to a PVC. The NMS receives at least one notification from at least one ATM switch of the plurality of ATM switches indicating an ATM switch has been added or removed from the PVC. In response to the at least notification, the NMS adds at least one ATM switch to the monitoring service object or removes at least one ATM switch from the monitoring service object.
摘要:
A method and apparatus for automatic synchronization of monitoring points for a network management system (“NMS”) along a permanent virtual circuit (“PVC”) is disclosed. A NMS in an asynchronous transfer mode (“ATM”) network coupled to a plurality of ATM switches is operative to monitor each of the plurality of ATM switches storied in a monitoring service object corresponding to a PVC. The NMS receives at least one notification from at least one ATM switch of the plurality of ATM switches indicating an ATM switch has been added or removed from the PVC. In response to the at least notification, the NMS adds at least one ATM switch to the monitoring service object or removes at least one ATM switch from the monitoring service object.
摘要:
A system and method are disclosed for monitoring communications of an individual in a packet network. A system that incorporates teachings of the present disclosure may include, for example, a network monitor (100) having a communications interface (110) coupled to a packet network (101), and a controller (102). The controller can be programmed to receive (202) a request from a third party to monitor communications associated with an individual, convey (204) to the third party information monitored on a group of one or more permanent virtual circuits (PVCs) of the packet network associated with the individual, detect (205, 206) an update in the group of one or more PVCs, determine (212) a new set of one or more PVCs associated with the individual, and convey (216) to the third party information monitored from the new set of one or more PVCs.