ENTERPRISE NETWORK FABRIC EXTENSION ACROSS MOBILE NETWORKS

    公开(公告)号:US20200344662A1

    公开(公告)日:2020-10-29

    申请号:US16395817

    申请日:2019-04-26

    Abstract: In one illustrative example, network fabric policy data associated with an application, subscriber, and/or device may be received. Mobile network policy data that corresponds to the received network fabric policy data may be selected, based on stored policy mappings between a set of network fabric policy profiles of a fabric network and a set of mobile network policy profiles of a mobile network. A bearer or Quality of Service (QoS) flow of the mobile network may be established in satisfaction of the selected mobile network policy data. In addition, a packet filter of a traffic flow template (TFT) or a packet detection rule (PDR) may be generated and applied in order to direct IP traffic flows associated with the application to the established bearer or QoS flow for communication in the mobile network.

    DYNAMIC VPN POLICY MODEL WITH ENCRYPTION AND TRAFFIC ENGINEERING RESOLUTION
    62.
    发明申请
    DYNAMIC VPN POLICY MODEL WITH ENCRYPTION AND TRAFFIC ENGINEERING RESOLUTION 审中-公开
    具有加密和交通工程分辨率的动态VPN策略模型

    公开(公告)号:US20170054758A1

    公开(公告)日:2017-02-23

    申请号:US15058447

    申请日:2016-03-02

    Abstract: High-level network policies that represent a virtual private network (VPN) as a high-level policy model are received. The VPN is to provide secure connectivity between connection sites of the VPN based on the high-level network policies. The high-level network policies are translated into low-level device configuration information represented in a network overlay and used for configuring a network underlay that provides the connections sites to the VPN. The network underlay is configured with the device configuration information so that the network underlay implements the VPN in accordance with the high-level policies. It is determined whether the network underlay is operating to direct traffic flows between the connection sites in compliance with the high-level network policies. If it is determined that the network underlay is not operating in compliance, the network underlay is reconfigured with new low-level device configuration information so that the network underlay operates in compliance.

    Abstract translation: 收到代表虚拟专用网(VPN)作为高级策略模型的高级网络策略。 VPN是基于高级网络策略在VPN的连接站点之间提供安全连接。 高级网络策略被转换为在网络覆盖中表示的低级设备配置信息,并用于配置向VPN提供连接站点的网络底层。 网络底层配置了设备配置信息,使得网络底层根据高级策略实现VPN。 确定网络底层是否正在操作以在连接站点之间引导符合高级网络策略的业务流。 如果确定网络底层不符合操作,则使用新的低级设备配置信息来重新配置网络底层,使得网络底层符合操作。

    SYSTEMS, METHODS, AND DEVICES FOR SMART MAPPING AND VPN POLICY ENFORCEMENT
    63.
    发明申请
    SYSTEMS, METHODS, AND DEVICES FOR SMART MAPPING AND VPN POLICY ENFORCEMENT 审中-公开
    用于智能映射和VPN策略执行的系统,方法和设备

    公开(公告)号:US20170026417A1

    公开(公告)日:2017-01-26

    申请号:US15217154

    申请日:2016-07-22

    Abstract: Aspects of the embodiments are directed to systems, methods, and computer program products to program, via a northbound interface, a mapping between an endpoint identifier (EID) and a routing locator (RLOC) directly into a mapping database at a mapping system; receive, from a first tunneling router associated with a first virtual network, a mapping request to a second virtual network, the first router compliant with a Locator/ID Separation Protocol, the mapping request comprising an EID tuple that includes a source identifier and a destination identifier; identify an RLOC based, at least in part, on the destination identifier of the EID tuple from the mapping database; and transmit the RLOC to the first tunneling router implementing an high level policy that has been dynamically resolved into a state of the mapping database.

    Abstract translation: 实施例的方面涉及通过北向接口将端点标识符(EID)和路由定位器(RLOC)之间的映射直接编程到映射系统的映射数据库中的系统,方法和计算机程序产品; 从与第一虚拟网络相关联的第一隧道路由器接收对第二虚拟网络的映射请求,所述第一路由器符合定位符/ ID分离协议,所述映射请求包括包含源标识符和目的地的EID元组 标识符 至少部分地基于来自映射数据库的EID元组的目的地标识符来识别RLOC; 并将RLOC发送到实现已经被动态地解析成映射数据库的状态的高级策略的第一隧道路由器。

    Architecture for agentless service insertion
    64.
    发明授权
    Architecture for agentless service insertion 有权
    无代理服务插入架构

    公开(公告)号:US09178828B2

    公开(公告)日:2015-11-03

    申请号:US13872008

    申请日:2013-04-26

    CPC classification number: H04L47/2425 G06F9/45533 G06F2009/45562

    Abstract: An example method for service insertion in a network environment is provided in one example and includes configuring a service node by tagging one or more interface ports of a virtual switch function to which the service node is connected with one or more policy identifiers. When data traffic associated with a policy identifier is received on a virtual overlay path the virtual switch function may then terminate the virtual overlay path and direct raw data traffic to the interface port of the service node that is tagged to the policy identifier associated with the data traffic.

    Abstract translation: 在一个示例中提供了在网络环境中的服务插入的示例方法,并且包括通过标记服务节点与其连接的虚拟交换机功能的一个或多个接口端口与一个或多个策略标识符来配置服务节点。 当在虚拟覆盖路径上接收到与策略标识符相关联的数据流量时,虚拟交换机功能可以终止虚拟覆盖路径,并将原始数据流直接引导到标记为与数据相关联的策略标识符的服务节点的接口端口 交通。

    METHODS AND APPARATUS FOR SECURITY OVER FIBRE CHANNEL
    65.
    发明申请
    METHODS AND APPARATUS FOR SECURITY OVER FIBRE CHANNEL 审中-公开
    用于光纤通道安全的方法和装置

    公开(公告)号:US20150101029A1

    公开(公告)日:2015-04-09

    申请号:US14570902

    申请日:2014-12-15

    CPC classification number: H04L63/123 H04L9/0838 H04L9/3239 H04L63/12

    Abstract: Methods and apparatus are provided for improving both node-based and message-based security in a fibre channel network. Entity to entity authentication and key exchange services can be included in existing initialization messages used for introducing fibre channel network entities into a fibre channel fabric, or with specific messages exchanged over an already initialized communication channel. Both per-message authentication and encryption mechanisms can be activated using the authentication and key exchange services. Messages passed between fibre channel network entities can be encrypted and authenticated using information provided during the authentication sequence. Security services such as per-message authentication, confidentiality, integrity protection, and anti-replay protection can be implemented.

    Abstract translation: 提供了用于改进光纤通道网络中的基于节点和基于消息的安全性的方法和装置。 可以将实体认证和密钥交换服务的实体包括在用于将光纤信道网络实体引入光纤信道结构的现有初始化消息中,或者通过已经初始化的通信信道交换的特定消息。 可以使用认证和密钥交换服务来激活每消息认证和加密机制。 在光纤通道网络实体之间通过的消息可以使用在认证序列期间提供的信息进行加密和认证。 可以实现诸如每消息认证,机密性,完整性保护和反重放保护等安全服务。

    ARCHITECTURE FOR AGENTLESS SERVICE INSERTION
    67.
    发明申请
    ARCHITECTURE FOR AGENTLESS SERVICE INSERTION 有权
    无代理服务插件架构

    公开(公告)号:US20140321459A1

    公开(公告)日:2014-10-30

    申请号:US13872008

    申请日:2013-04-26

    CPC classification number: H04L47/2425 G06F9/45533 G06F2009/45562

    Abstract: An example method for service insertion in a network environment is provided in one example and includes configuring a service node by tagging one or more interface ports of a virtual switch function to which the service node is connected with one or more policy identifiers. When data traffic associated with a policy identifier is received on a virtual overlay path the virtual switch function may then terminate the virtual overlay path and direct raw data traffic to the interface port of the service node that is tagged to the policy identifier associated with the data traffic.

    Abstract translation: 在一个示例中提供了在网络环境中的服务插入的示例方法,并且包括通过标记服务节点与其连接的虚拟交换机功能的一个或多个接口端口与一个或多个策略标识符来配置服务节点。 当在虚拟覆盖路径上接收到与策略标识符相关联的数据流量时,虚拟交换机功能可以终止虚拟覆盖路径,并将原始数据流直接引导到标记为与数据相关联的策略标识符的服务节点的接口端口 交通。

Patent Agency Ranking