COMMUNICATION OF POLICY CHANGES IN LISP-BASED SOFTWARE DEFINED NETWORKS

    公开(公告)号:WO2021222011A1

    公开(公告)日:2021-11-04

    申请号:PCT/US2021/028790

    申请日:2021-04-23

    Abstract: Systems, methods, and computer-readable media for communicating policy changes in a Locator/ID Separation Protocol (LISP) based network deployment include receiving, at a first routing device, a first notification from a map server, the first notification indicating a change in a policy for LISP based communication between at least a first endpoint device and at least a second endpoint device, the first endpoint device being connected to a network fabric through the first routing device and the second endpoint device being connected to the network fabric through a second routing device. The first routing device forwards a second notification to the second routing device if one or more entries of a first map cache implemented by the first routing device are affected by the policy change, the second notification indicating a set of one or more endpoints connected to the second routing device that are affected by the policy change.

    SYSTEM AND METHOD FOR MIGRATING EXISTING ACCESS CONTROL LIST POLICIES TO INTENT BASED POLICIES AND VICE VERSA

    公开(公告)号:WO2020106475A1

    公开(公告)日:2020-05-28

    申请号:PCT/US2019/060586

    申请日:2019-11-08

    Abstract: Present technology is directed to a system and method for implementing an offline scheme to automatically and efficiently transform a set of conventional IP-based Access Control Entries in a supplied configuration into compressed form that can then be represented as Object-Group based Access Control Entries. The compression is performed on contiguous blocks of the supplied Access Control List having a common prescribed filtering access. The compression is performed by iteratively selecting a data field with mismatching data values across the ACEs and merging the data values into a corresponding data field of the output ACE. The common values of other data fields are then imported to the corresponding data fields of the output ACE. The process is repeated in an iterative manner by assigning a different data field as the selected data field for each iteration round.

    NORMALIZED LOOKUP AND FORWARDING FOR DIVERSE VIRTUAL PRIVATE NETWORKS

    公开(公告)号:WO2022026208A1

    公开(公告)日:2022-02-03

    申请号:PCT/US2021/041930

    申请日:2021-07-16

    Abstract: This technology enables normalized lookup and forwarding for diverse virtual private networks in multi-site network fabric deployments. A source device on a first Layer 2 site transmits a frame to a destination device on the same subnet, but on a second Layer 2 site. The frame is encapsulated and routed to a fabric border node. The fabric border node matches the source subnet to the destination subnet and transmits an address request protocol ("ARP"). In response to not receiving a reply to the ARP, the fabric border node transmits a map request to a Layer 3 transit fabric control plane node. The control plane node extracts a destination identifier from the map request and determines that the destination identifier is a Layer 2 identifier. The control plane node transmits a map reply to the fabric border node, where the frame is re- encapsulated and forwarded to the destination device.

    CLOUD ENABLING OF LEGACY TRUSTED NETWORKING DEVICES FOR ZERO TOUCH PROVISIONING AND ENTERPRISE AS A SERVICE

    公开(公告)号:WO2020205370A1

    公开(公告)日:2020-10-08

    申请号:PCT/US2020/024723

    申请日:2020-03-25

    Abstract: The disclosed technology relates to a process for zero touch provisioning to provide cloud enablement of legacy computing devices. Specifically, the disclosed technology provides the ability to automate the process of connecting computing devices that may not originally have the capabilities to connect to the Internet so that the computing devices can be managed by a cloud network or be provided updates by the cloud network. The cloud enablement for computing devices is performed by modifying the computing device with hardware and software that would direct the computing device to establish secure communications with the cloud network without user involvement.

    DETECTING AND COMMUNICATING WITH SILENT HOSTS IN SOFTWARE-DEFINED NETWORKS

    公开(公告)号:WO2021222010A1

    公开(公告)日:2021-11-04

    申请号:PCT/US2021/028782

    申请日:2021-04-23

    Abstract: Systems, methods, and computer-readable media for discovering silent hosts in a software-defined network and directing traffic to the silent hosts in a scalable and targeted manner include determining interfaces of a fabric device that are connected to respective one or more endpoints, where the fabric device is configured to connect the endpoints to a network fabric of the software-defined network. At least a first interface is identified, where an address of a first endpoint connected to the first interface is not available at the fabric device. A first notification is transmitted to a control plane of the software-defined network based on identifying the first interface, where the control plane may create a flood list which includes the fabric device. Traffic intended for the first endpoint from the network fabric is received by the fabric device can be based on the flood list.

    SECURITY GROUP RESOLUTION AT INGRESS ACROSS VIRTUAL NETWORKS

    公开(公告)号:WO2023086610A1

    公开(公告)日:2023-05-19

    申请号:PCT/US2022/049768

    申请日:2022-11-14

    Abstract: Techniques and architecture are described for providing a service, e.g., a security service such as a firewall, across different virtual networks/VRFs/VPN IDs. The techniques and architecture provide modifications in enterprise computing fabrics by modifying pull-based overlay protocols such as, for example, locator/identifier separation protocol (LISP), border gateway protocol ethernet virtual private network (BGP EVPN), etc. A map request carries additional information to instruct a map-server that even though mapping (destination prefix and firewall service RLOC for the destination) is known within the map-server's own virtual network/VRF for firewall service insertion, the map-server still should do a lookup across virtual networks/VRFs and discover the final destination's DGT (destination group tag) and include that in the map reply.

    SERVICE CHAINING IN FABRIC NETWORKS
    8.
    发明申请

    公开(公告)号:WO2023287596A1

    公开(公告)日:2023-01-19

    申请号:PCT/US2022/035929

    申请日:2022-07-01

    Abstract: Techniques are described herein for service chaining in fabric networks without service nodes needing additional capabilities. The techniques may include storing a first configuration associated with a first VRF instance of a service forwarding node that is connected to a first service of a service chain sequence. The first configuration may indicate an identifier and a type associated with a second service of the service chain sequence where traffic is to be sent after the first service. Additionally, the techniques may also include storing a second configuration associated with a second VRF instance of the service forwarding node that is connected to the second service. The second configuration may indicate that the second service is a last service of the service chain sequence. When traffic is received at the service forwarding nodes, the service forwarding nodes can determine whether the traffic is pre‑service or post‑service traffic.

    DYNAMIC USER PRIVATE VIRTUAL NETWORKS
    9.
    发明申请

    公开(公告)号:WO2022066653A1

    公开(公告)日:2022-03-31

    申请号:PCT/US2021/051327

    申请日:2021-09-21

    Abstract: In one embodiment, dynamic user private networks are virtually segmented within a shared virtual network. A network control system maintains the dynamic logical segmentation of the shared virtual network. User entities (e.g., user devices and/or services) are communicatively coupled to respective personal virtual networks via endpoints of access devices. Each of these endpoints is associated with a corresponding user private network. Responsive in real-time to automated processing of a received electronic particular user request, the network control system automatically modifies the dynamic logical segmentation of the shared virtual network to move a particular user entity on the shared virtual network to newly being on the first dynamic user private network without being disconnected from the shared virtual network. One embodiment uses different user private network identifiers (UPN-IDs) associated with endpoints and received packets to identify their respective user private network.

    GROUP-BASED POLICIES FOR INTER-DOMAIN TRAFFIC

    公开(公告)号:WO2021108143A1

    公开(公告)日:2021-06-03

    申请号:PCT/US2020/060332

    申请日:2020-11-13

    Abstract: In one embodiment, a method includes receiving a data packet from a first host located in the first site, where the data packet may be destined to a second host located in a second site that may be different from the first site, determining that an identity of a second group to which the second host belongs is not available at the first network node, sending a request for an identifier of the second group to a second network node, where the request may comprise an address of the second host, receiving a response comprising the identifier of the second group from the second network node, determining that the second group is a destination group, applying one or more policies associated with the destination group to the data packet, and causing the data packet to be routed to the second host.

Patent Agency Ranking