-
公开(公告)号:US20230336453A1
公开(公告)日:2023-10-19
申请号:US18213602
申请日:2023-06-23
Applicant: Cisco Technology, Inc.
Inventor: Peter Turi , Zsolt Varga , Thomas Szigeti
IPC: H04L43/0864 , H04L43/0823 , H04L67/561 , H04L43/0829 , H04L69/22
CPC classification number: H04L43/0864 , H04L43/0847 , H04L67/561 , H04L43/0841 , H04L69/22
Abstract: This disclosure describes techniques for providing information associated with an inter-cluster segment. For instance, system(s) may determine dependencies for first services associated with a first cluster and second dependencies for second services associated with a second cluster. The system(s) may then determine information for interconnections between the first cluster and the second cluster. The information may include at least dependencies for third services included in the inter-cluster segment and/or performance information for the third services. The system(s) may then generate a user interface that includes the first dependencies for the first services, the second dependencies for the second services, and the information for the inter-cluster segment. This way, a user is able to use the user interface to identify both problems occurring within the clusters and/or problems that are caused by the third services in the inter-cluster segment.
-
42.
公开(公告)号:US11792230B2
公开(公告)日:2023-10-17
申请号:US17473306
申请日:2021-09-13
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David J. Zacks , Walter Hulick , Shannon McFarland
CPC classification number: H04L63/20 , H04L63/0876 , H04L63/101
Abstract: Techniques for expressing, communicating, de-conflicting, and enforcing consistent access policies between an IBN architecture and a Cloud-Native architecture. Generally, network administrators and/or users of a Cloud-Native architecture and an IBN architecture express access policies independently for the two different domains or architectures. According to the techniques described herein, a Network Service Endpoint (NSE) of the Cloud-Native architecture may exchange access policies with a network device of the IBN architecture. After exchanging access policies, conflicts between the sets of access policies may be identified, such as differences between allowing or denying communications between microservices and/or applications. The conflicts may be de-conflicted using various types of heuristics or rules, such as always selecting an access policy of the IBN architecture when conflicts arise. After the access policies have been de-conflicted, the IBN architecture and Cloud-Native architecture may then apply consistent access policies for traffic and communications in their respective network architectures.
-
公开(公告)号:US20230325478A1
公开(公告)日:2023-10-12
申请号:US17718565
申请日:2022-04-12
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , David John ZACKS , Walter Theodore HULICK, JR. , Nagendra Kumar NAINAR , Carlos M. PIGNATARO
IPC: G06F21/31
CPC classification number: G06F21/31
Abstract: In one embodiment, a device obtains data regarding a transaction attempted by a user within an online application that is captured by instrumentation code that is inserted into the online application at runtime, wherein the user has sufficient privileges within the online application to perform the transaction; The device sends, based on the data regarding the transaction, one or more approval requests to one or more authorizers. The device receives one or more responses to the one or more approval requests. The device blocks, and based on the one or more responses, the transaction attempted by the user within the online application via the instrumentation code.
-
公开(公告)号:US11743160B2
公开(公告)日:2023-08-29
申请号:US17816887
申请日:2022-08-02
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti , Jerome Henry , Robert E. Barton , Malcolm M. Smith
IPC: H04L43/0864 , H04L43/0894 , H04L43/10 , H04W24/04 , H04W24/10 , H04W84/12
CPC classification number: H04L43/0864 , H04L43/0894 , H04L43/10 , H04W24/04 , H04W24/10 , H04W84/12
Abstract: Automating and extending path tracing through wireless links is provided by receiving request to perform a network trace over a wireless link provided by an Access Point (AP) configured as a transparent forwarder between a trace source and a trace target; monitoring a trace packet from a first time of arrival at the AP, a first time of departure from the AP, a second time of arrival at the AP, and a second time of departure from the AP; monitoring a buffer status of the AP at the first time of arrival and the second time of arrival; and in response to identifying a network anomaly based on the trace packet and the buffer status, adjusting a network setting at the AP.
-
公开(公告)号:US11616727B2
公开(公告)日:2023-03-28
申请号:US17223396
申请日:2021-04-06
Applicant: Cisco Technology, Inc.
Inventor: Robert E. Barton , Jerome Henry , Thomas Szigeti , Daniel Eckstein
IPC: H04L47/2416 , H04L41/08 , H04L41/0816 , H04L47/193
Abstract: In one embodiment, a service associates a plurality of descriptive tags with a node in a network, based on an inspection of packets sent by the node that is performed by one or more sensors deployed to the network. The service identifies, based on the plurality of descriptive tags, data to be extracted from traffic of the node by an edge device located at an edge of the network. The service determines, based on the plurality of descriptive tags, an external destination to which the data should be sent by the edge device after extraction. The service sends a data pipeline configuration to the edge device, wherein the data pipeline configuration causes the edge device to extract the data from the traffic sent by the node and to send the data to the external destination.
-
46.
公开(公告)号:US20220255913A1
公开(公告)日:2022-08-11
申请号:US17178234
申请日:2021-02-17
Applicant: Cisco Technology, Inc.
Inventor: David J. Zacks , Carlos M. Pignataro , Thomas Szigeti
Abstract: This disclosure describes techniques for performing enhanced authentication of a device based on physical and logical proximity of the device to one or more other authenticated devices. An example method includes performing, at a first time, a first authentication of a first device or a first user of the first device and determining that the first device is connected to at least one second device in a communication session. The at least one second device or at least one second user of the at least one second device are authenticated. The example method further includes determining a reauthentication interval based on the first device being connected to the at least one second device in the communication session and initiating, at a second time that is after the first time by the reauthentication interval, a second authentication of the first device or the first user of the first device.
-
公开(公告)号:US20210194760A1
公开(公告)日:2021-06-24
申请号:US16853622
申请日:2020-04-20
Applicant: Cisco Technology, Inc.
Inventor: Robert Edgar Barton , Thomas Szigeti , Jerome Henry , Ruben Gerald Lobo , Laurent Jean Charles Hausermann , Maik Guenter Seewald , Daniel R. Behrens
Abstract: According to one or more embodiments of the disclosure, a service obtains one or more component tags and one or more activity tags that were assigned to an endpoint device in a network based on deep packet inspection of traffic associated with the endpoint device. The service determines an intent of the endpoint device, using the one or more component tags and the one or more activity tags that were assigned to the endpoint device. The service translates the intent of the endpoint device into a network segmentation policy. The service configures a network overlay in the network that implements the network segmentation policy.
-
公开(公告)号:US10911458B2
公开(公告)日:2021-02-02
申请号:US16551040
申请日:2019-08-26
Applicant: Cisco Technology, Inc.
Inventor: Roland Arthur Saville , Thomas Szigeti
IPC: H04L29/06 , H04L12/801 , H04L12/851 , H04L12/833 , H04L12/891
Abstract: Exemplified system and method optimizes dynamic Quality of Service (QoS) operation across a network infrastructure to alleviate time constraints when applying dynamic QoS policy on newly initiated traffic flow, particularly for various data streams. Initially, and by default, the exemplified system and method temporarily applies a high QoS policy to a newly initiated traffic flow and then verifies the QoS legitimacy of the flow to which the high QoS policy for the newly initiated traffic flow is maintained or is reduced to a lower-priority QoS policy. This trust-but-verify QoS operation allows new traffic, e.g., with voice and video components, to receive a high QoS PHB treatment as transmission of the traffic is initiated without having a nominal delay at the beginning of the call before QoS is applied while allowing the QoS legitimacy to be validated and maintained.
-
公开(公告)号:US10897412B2
公开(公告)日:2021-01-19
申请号:US16367043
申请日:2019-03-27
Applicant: Cisco Technology, Inc.
Inventor: Thomas Szigeti
Abstract: Systems and methods provide for a bifocal timescales graph for viewing a network health history at a single glance.
-
公开(公告)号:US12299097B2
公开(公告)日:2025-05-13
申请号:US17390610
申请日:2021-07-30
Applicant: Cisco Technology, Inc.
Inventor: Walter Theodore Hulick, Jr. , David John Zacks , Thomas Szigeti
Abstract: According to one or more embodiments of the disclosure, the techniques herein are directed toward a dynamic transaction-aware web application authentication using call intercepts. In one embodiment, a method comprises: intercepting, by a monitoring process, calls made for transactions within an executing application; determining, by the monitoring process, whether a particular intercepted call triggers an enhanced user authentication requirement for a particular transaction; initiating, by the monitoring process in response to the particular intercepted call triggering the enhanced user authentication requirement, a corresponding challenge to adequately authenticate a user for the particular transaction; and allowing, by the monitoring process, the particular intercepted call to proceed for the particular transaction in response to an adequately authenticated user for the particular transaction.
-
-
-
-
-
-
-
-
-