Path Maximum Transmission Unit Handling For Virtual Private Networks
    11.
    发明申请
    Path Maximum Transmission Unit Handling For Virtual Private Networks 有权
    路径最大传输单元处理虚拟专用网络

    公开(公告)号:US20150288603A1

    公开(公告)日:2015-10-08

    申请号:US14246351

    申请日:2014-04-07

    Abstract: Techniques are described herein for optimizing communications in a network. At a router in a virtual private network, a packet is received from a device in a subnetwork protected by the router. The router examines the packet to determine a source address that identifies the device and a destination address that identifies a destination network device for the packet. The router also analyzes the packet to determine a size of the packet and determines whether or not the size of the packet is larger than a maximum transmission unit size. If the size of the packet is larger than the maximum transmission unit size, the router encapsulates the packet with a header that includes the destination address and a new source address that identifies the router.

    Abstract translation: 这里描述了用于优化网络中的通信的技术。 在虚拟专用网络中的路由器处,从由路由器保护的子网络中的设备接收分组。 路由器检查数据包以确定标识设备的源地址和标识数据包的目标网络设备的目标地址。 路由器还分析数据包以确定数据包的大小,并确定数据包的大小是否大于最大传输单元大小。 如果分组的大小大于最大传输单元大小,路由器将包含目标地址的报头和标识路由器的新源地址封装在一起。

    Anomaly detection for a networking device based on monitoring related sets of counters

    公开(公告)号:US11277424B2

    公开(公告)日:2022-03-15

    申请号:US16296373

    申请日:2019-03-08

    Abstract: In one embodiment, a monitoring process identifies a set of counters maintained by a networking device by comparing a configuration of the networking device to an object relationship model. The monitoring process obtains counter values from the identified set of counters maintained by the networking device. The monitoring process detects an anomaly by using the obtained counter values as input to a machine learning-based anomaly detector. The monitoring process generates an anomaly detection alert for the detected anomaly.

    Delegating policy through manufacturer usage descriptions

    公开(公告)号:US10595320B2

    公开(公告)日:2020-03-17

    申请号:US15726961

    申请日:2017-10-06

    Abstract: A process for implementing temporary rules for network devices is described. In one embodiment, the process includes a controller receiving a manufacturer usage description (MUD) identifier from a first device. The controller retrieves a MUD file associated with the MUD identifier. The controller registers a device identifier associated with the first device with a delegated controller determined based on the MUD file. The delegated controller is configured to generate a dynamic policy for the first device. The controller receives a dynamic policy from the delegated controller for the first device. The dynamic policy may be configured to permit a communication session between the first device and a second device. The controller forwards the dynamic policy to an access control device in communication with the first device to enable the access control device to permit the communication session between the first device and the second device.

    TECHNIQUES FOR ENCRYPTION KEY ROLLOVER SYNCHRONIZATION IN A NETWORK

    公开(公告)号:US20190288842A1

    公开(公告)日:2019-09-19

    申请号:US16005990

    申请日:2018-06-12

    Abstract: Techniques are presented for encryption key rollover synchronization in a network. In one embodiment, a method includes generating a new set of public-key encryption keys for a first network element. Based on the new set of public-key encryption keys, a set of new security associations between the first network element and each other network element in the network is generated. The method includes providing a new public key from the new set of public-key encryption keys to a network controller and using security associations associated with a previous set of public-key encryption keys for encrypted communication between the first network element and each other network element. Upon obtaining, from a second network element, traffic protected by a security association from the set of new security associations, the method includes using the new security associations for subsequent encrypted communication between the first network element and the second network element.

    CONTROL OF NETWORK CONNECTED DEVICES
    20.
    发明申请

    公开(公告)号:US20180115611A1

    公开(公告)日:2018-04-26

    申请号:US15333313

    申请日:2016-10-25

    Abstract: Presented herein are techniques in which one or more network devices can use information provided by a special purpose network connected device to retrieve a usage profile (i.e., configuration file) associated with the special purpose network connected device. The retrieved usage profile, which includes/describes preselected (predetermined) usage descriptions associated with the special purpose network connected device, can then be used to configure one or more network devices. For example, the predetermined usage descriptions associated with the special purpose network connected device can be instantiated and enforced at a network device or the predetermined usage descriptions can be used for auditing the special purpose network connected device (e.g., monitoring of traffic within the network).

Patent Agency Ranking