-
公开(公告)号:US11457043B2
公开(公告)日:2022-09-27
申请号:US16731167
申请日:2019-12-31
Applicant: Juniper Networks, Inc.
Inventor: Srinivas Nimmagadda , Rakesh Kumar , Prakash T. Seshadri , Sriram Subramanian
IPC: H04L9/40
Abstract: A device may receive policy information associated with a first application group and a second application group. The device may receive network topology information associated with a network. The device may generate a first policy based on the policy information and the network topology information, and generate a second policy based on the policy information and the network topology information. The device may provide, to the virtual network device, information associated with the first policy to permit the virtual network device to implement the first policy in association with network traffic transferred between the first application group and the second application group. The device may provide, to the physical network device, information associated with the second policy to permit the physical network device to implement the second policy in association with network traffic transferred between the first application group and the second application group.
-
公开(公告)号:US10547644B2
公开(公告)日:2020-01-28
申请号:US15639366
申请日:2017-06-30
Applicant: Juniper Networks, Inc.
Inventor: Srinivas Nimmagadda , Rakesh Kumar , Prakash T. Seshadri , Sriram Subramanian
IPC: H04L29/06
Abstract: A device may receive policy information associated with a first application group and a second application group. The device may receive network topology information associated with a network. The device may generate a first policy based on the policy information and the network topology information, and generate a second policy based on the policy information and the network topology information. The device may provide, to the virtual network device, information associated with the first policy to permit the virtual network device to implement the first policy in association with network traffic transferred between the first application group and the second application group. The device may provide, to the physical network device, information associated with the second policy to permit the physical network device to implement the second policy in association with network traffic transferred between the first application group and the second application group.
-
公开(公告)号:US20190007453A1
公开(公告)日:2019-01-03
申请号:US15637789
申请日:2017-06-29
Applicant: Juniper Networks, Inc.
Inventor: Srinivas NIMMAGADDA , Rakesh Kumar , Prakash T. Seshadri
IPC: H04L29/06
Abstract: A device may receive first information associated with a set of security rules. The first information may identify a set of security actions a device is to implement when the set of security rules applies to traffic. The device may determine a manner in which the set of security rules is to apply using the first information. The device may determine whether the manner in which the set of security rules is to apply and an intent of a network security policy or a manner in which a set of previously defined security rules is to apply match to determine whether the set of security rules conflicts with the network security policy or whether the set of security rules and the set of previously defined security rules are related. The device may perform an action.
-
公开(公告)号:US11979415B2
公开(公告)日:2024-05-07
申请号:US17247461
申请日:2020-12-11
Applicant: Juniper Networks, Inc.
Inventor: Srinivas Nimmagadda , Jeffrey S. Marshall , Sunil G. Rawoorkar , Srinivasan Veeraraghavan , Prakash T. Seshadri
CPC classification number: H04L63/1416 , H04L63/0209 , H04L63/1425 , H04L63/1433 , H04L63/1441 , H04L63/20 , H04L67/52
Abstract: A device receives information identifying a specific host threat to a network, where the information includes a list of network addresses associated with the specific host threat. The device identifies network elements, of the network, associated with the specific host threat to the network, and determines a network control system associated with the identified network elements. The device determines a policy enforcement group of network elements, of the identified network elements, that maps to the list of network addresses associated with the specific host threat, where the network control system is associated with the policy enforcement group of network elements. The device determines a threat policy action to enforce for the specific host threat, and causes, via the network control system, the threat policy action to be enforced by the policy enforcement group of network elements.
-
公开(公告)号:US11700236B2
公开(公告)日:2023-07-11
申请号:US16652643
申请日:2020-02-27
Applicant: Juniper Networks, Inc.
Inventor: Prasad Miriyala , Aniket G. Daptari , Fei Chen , Pranavadatta D N , Kiran K N , Jeffrey S. Marshall , Prakash T. Seshadri
CPC classification number: H04L63/0263 , G06F9/45558 , H04L12/4679 , H04L41/0894 , H04L45/76 , G06F2009/45587 , G06F2009/45595
Abstract: Techniques are disclosed for redirecting network traffic of virtualized application workload to a host-based firewall. For example, a system comprises a software defined networking (SDN) controller of a multi-tenant virtualized data center configured to: receive a security policy expressed as one or more tags to redirect traffic of a virtualized application workload to a host-based firewall (HBF) of the multi-tenant virtualized data center; configure network connectivity to the HBF in accordance with the security policy; a security controller that manages the HBF configured to: obtain the one or more tags from the SDN controller; receive one or more firewall policies expressed in terms of the one or more tags, wherein each of the one or more firewall policies specifies a function of the HBF; and configure the function of the HBF in accordance with the one or more firewall policies.
-
公开(公告)号:US10887327B2
公开(公告)日:2021-01-05
申请号:US16024308
申请日:2018-06-29
Applicant: Juniper Networks, Inc.
Inventor: Srinivas Nimmagadda , Jeffrey S. Marshall , Sunil G. Rawoorkar , Srinivasan Veeraraghavan , Prakash T. Seshadri
Abstract: A device receives information identifying a specific host threat to a network, where the information includes a list of network addresses associated with the specific host threat. The device identifies network elements, of the network, associated with the specific host threat to the network, and determines a network control system associated with the identified network elements. The device determines a policy enforcement group of network elements, of the identified network elements, that maps to the list of network addresses associated with the specific host threat, where the network control system is associated with the policy enforcement group of network elements. The device determines a threat policy action to enforce for the specific host threat, and causes, via the network control system, the threat policy action to be enforced by the policy enforcement group of network elements.
-
公开(公告)号:US11765034B2
公开(公告)日:2023-09-19
申请号:US16948623
申请日:2020-09-25
Applicant: Juniper Networks, Inc.
Inventor: Prakash T. Seshadri , Sunil G. Rawoorkar , Yasmin Zarina , Srinivas Nimmagadda , Jeffrey S. Marshall , Krishnaiah Gogineni , Kartik Krishnan S. Iyyer
CPC classification number: H04L41/0893 , G06F9/5072 , G06F9/54 , H04L63/102 , H04L63/104 , H04L63/20 , H04L41/16
Abstract: A device receives policy information indicating a policy to be implemented for an application hosted by multiple cloud domains, and receives, from the multiple cloud domains, different application resource tags and addresses associated with the application. The device maps the different application resource tags to a generic identifier, and associates the policy with the generic identifier and with the addresses associated with the application. The device provides, based on associating the policy with the generic identifier and with the addresses associated with the application, the policy to the multiple cloud domains to permit the multiple cloud domains to implement the policy.
-
公开(公告)号:US10944793B2
公开(公告)日:2021-03-09
申请号:US15637789
申请日:2017-06-29
Applicant: Juniper Networks, Inc.
Inventor: Srinivas Nimmagadda , Rakesh Kumar , Prakash T. Seshadri
IPC: G06F21/60 , H04L12/851 , H04L12/801 , H04L12/813 , H04L29/06 , G06N5/02
Abstract: A device may receive first information associated with a set of security rules. The first information may identify a set of security actions a device is to implement when the set of security rules applies to traffic. The device may determine a manner in which the set of security rules is to apply using the first information. The device may determine whether the manner in which the set of security rules is to apply and an intent of a network security policy or a manner in which a set of previously defined security rules is to apply match to determine whether the set of security rules conflicts with the network security policy or whether the set of security rules and the set of previously defined security rules are related. The device may perform an action.
-
公开(公告)号:US10771506B1
公开(公告)日:2020-09-08
申请号:US15664989
申请日:2017-07-31
Applicant: Juniper Networks, Inc.
Inventor: Rakesh Kumar , Srinivas Nimmagadda , Prakash T. Seshadri , Moloy K. Chatterjee , Mihir S. Maniar , Rakesh Manocha
Abstract: A device may include one or more processors to receive network topology information of a network and device capability information of devices in the network; detect a threat to the network; determine threat information associated with the threat; select a security policy and an enforcement device of the network to enforce the security policy based on the network topology information, the device capability information, and the threat information; and perform an action associated with the threat based on the security policy and the enforcement device.
-
公开(公告)号:US20190007454A1
公开(公告)日:2019-01-03
申请号:US15637806
申请日:2017-06-29
Applicant: Juniper Networks, Inc.
Inventor: Srinivas NIMMAGADDA , Rakesh Kumar , Prakash T. Seshadri
IPC: H04L29/06
Abstract: A device may receive information identifying a set of conditions related to controlling implementation of a set of security rules. The set of conditions may be associated with a set of security actions that a device is to perform based on whether the set of conditions is satisfied. The device may determine the set of security rules that is to be controlled by the set of conditions using information related to the set of security rules. The device may modify information related to the set of security rules to cause the implementation of the set of security rules to be controlled by the set of conditions. The modification to cause the device to process the set of security rules to dynamically implement the set of security actions based on satisfaction of the set of conditions. The device may perform an action after modifying the information.
-
-
-
-
-
-
-
-
-