-
公开(公告)号:US20230275814A1
公开(公告)日:2023-08-31
申请号:US18051632
申请日:2022-11-01
Applicant: Juniper Networks, Inc.
Inventor: Ojas Gupta , Lyubov Nesteroff , Arda Akman , Yelena Kozlova , Jeremy Alan Tidemann , Georgios Oikonomou , Marc-Andre Bordeleau , Constantine Dimitrios Polychronopoulos , Edward Wai Hong Choh
IPC: H04L41/22 , G06F3/04817 , G06F3/04842
CPC classification number: H04L41/22 , G06F3/04817 , G06F3/04842
Abstract: An example network provisioning system displays a user interface comprising a first plurality of icons, each icon of the first plurality of icons representing a cloud provider or a data center associated with a network slice. The network provisioning system receives, via the user interface, a selection of a first icon of the first plurality of icons. Responsive to the selection of the first icon, the network provisioning system displays a second plurality of icons via the user interface. Each icon of the second plurality of icons represents a resource group hosted by a cloud provider or data center represented by the first icon. In some examples, the network slice is a 5G communication slice.
-
公开(公告)号:US20170126727A1
公开(公告)日:2017-05-04
申请号:US14983927
申请日:2015-12-30
Applicant: Juniper Networks, Inc.
Inventor: Lisa M. Beam , Lyubov Nesteroff , Natalia L. Shimuk , Rene Chavez , Sujatha P. Subbarao , Dennis Park
IPC: H04L29/06
CPC classification number: H04L63/14 , H04L63/0263 , H04L63/1408 , H04L63/1433 , H04L63/1441 , H04L63/20
Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise. An administrator may, for example, interact with the representation of threats rendered by the threat control module based on the data aggregated from the distributed security devices and, responsive to the interaction, the security management system may identify a relevant set of the security devices, automatically construct security policies having ordered rules within the policies for the identified set of security devices, and automatically communicate and install the policies in the identified set of security devices.
-