-
公开(公告)号:US20230040607A1
公开(公告)日:2023-02-09
申请号:US17395766
申请日:2021-08-06
Applicant: Cisco Technology, Inc.
Inventor: Jerome Henry , Robert Edgar Barton , Elango Ganesan , Flemming Stig Andreasen
IPC: H04L29/06
Abstract: A method includes determining a corresponding level of a security model associated with each device of a plurality of devices connected to a network, each level of the security model having a corresponding tag; applying, to each of the plurality of devices, the corresponding tag based on the corresponding level of the security model with which each of the plurality of devices are associated; receiving, over a network connection, network traffic from at least one of the plurality of devices and the corresponding tag; analyzing the corresponding tag associated with the network traffic; determining a destination for the network traffic; applying one or more security measures to the network traffic based on the corresponding tag for the at least one device and a corresponding tag of the destination for the network traffic; and sending the network traffic to the destination with the corresponding tag of the destination.
-
公开(公告)号:US12192096B2
公开(公告)日:2025-01-07
申请号:US18323134
申请日:2023-05-24
Applicant: Cisco Technology, Inc.
Abstract: Provided herein are techniques to facilitate multi-level performance tracing for a mobile network environment. In one instance, a method may include obtaining, by a mobile network, a trigger from an enterprise to initiate an underlay-level trace for a wireless device of the enterprise, wherein the trigger includes a correlation identifier that correlates the underlay-level trace with an enterprise-level trace for the wireless device and providing the underlay-level trace for a session of the wireless device by including a first trace flag for IP packets for the session and including a second trace flag for encapsulations of the IP packets for the session in which the first and second trace flag are unique to the session of the wireless device and enable elements of the mobile network to provide underlay trace information for the underlay-level trace for the session of the wireless device to a trace.
-
13.
公开(公告)号:US20240388914A1
公开(公告)日:2024-11-21
申请号:US18320352
申请日:2023-05-19
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Flemming Stig Andreasen
IPC: H04W12/12 , H04W12/033 , H04W28/02
Abstract: A method to counter vulnerabilities associated with user equipment in operating via a 5G core architecture. The method includes monitoring a session between a user equipment and an endpoint, obtaining a vulnerability score for a vulnerability affecting the user equipment, selecting, based on the vulnerability score, a selected user plane function and a security service, accessible via the selected user plane function, to counter the vulnerability affecting the user equipment, and causing a packet flow of the session to be steered to the security service via the selected user plane function.
-
-