-
公开(公告)号:US20230147790A1
公开(公告)日:2023-05-11
申请号:US18054084
申请日:2022-11-09
Applicant: Cisco Technology, Inc.
Inventor: Hai Vu , Shih-Chun Chang , Varun Malhotra , Shashi Gandham , Navindra Yadav , Allen Chen , Praneeth Vallem , Rohit Prasad
IPC: H04L41/0893 , H04L43/06 , H04L67/02 , H04L41/046
CPC classification number: H04L41/0893 , H04L43/06 , H04L67/02 , H04L41/046 , H04L43/0817
Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
-
公开(公告)号:US11252038B2
公开(公告)日:2022-02-15
申请号:US16730226
申请日:2019-12-30
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Hai Vu , Shih-Chun Chang , Hoang Nguyen , Shashi Gandham , Navindra Yadav , Praneeth Vallem , Sunil Gupta , Ravi Prasad , Varun Malhotra
Abstract: The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.
-
公开(公告)号:US10917438B2
公开(公告)日:2021-02-09
申请号:US16032765
申请日:2018-07-11
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Girish Anant Kalele , Jothi Prakash Prabakaran
Abstract: Aspects of the disclosed technology relate to ways to authenticate customer/subscriber access to a policy update stream. A process of the technology can include steps for instantiating a network monitoring device in response to a request, the request comprising one or more configuration parameters for the network monitoring device, and receiving a first certificate from the network monitoring device, wherein the first certificate is based on the one or more configuration parameters. In some aspects, the steps can further include sending the first certificate to a processing pipeline for authentication, wherein the processing pipeline is configured to authenticate the first certificate based on a second certificate received by the processing pipeline from the network monitoring device. Systems and machine readable media are also provided.
-
公开(公告)号:US10826803B2
公开(公告)日:2020-11-03
申请号:US15982806
申请日:2018-05-17
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Akshay Srirangam , Jothi Prakash Prabakaran
Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.
-
公开(公告)号:US20190230011A1
公开(公告)日:2019-07-25
申请号:US15982806
申请日:2018-05-17
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Akshay Srirangam , Jothi Prakash Prabakaran
Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.
-
公开(公告)号:US20180278479A1
公开(公告)日:2018-09-27
申请号:US15469737
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Hai Vu , Shih-Chun Chang , Varun Malhotra , Shashi Gandham , Navindra Yadav , Allen Chen , Praneeth Vallem , Rohit Prasad
Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
-
公开(公告)号:US20180278459A1
公开(公告)日:2018-09-27
申请号:US15470340
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Hai Vu , Shih-Chun Chang , Hoang Nguyen , Shashi Gandham , Navindra Yadav , Praneeth Vallem , Sunil Gupta , Ravi Prasad , Paul Lesiak
Abstract: The disclosed technology relates to assigning network agents to communication modules. A network policy system is configured to assign network agents to buckets based on an agent identifier of each agent. The network policy system can assign buckets to communication modules. When a failed communication module is detected, the network policy system can reassigning buckets assigned to the failed communication module to operational communication modules.
-
-
-
-
-
-