-
公开(公告)号:US20230147790A1
公开(公告)日:2023-05-11
申请号:US18054084
申请日:2022-11-09
Applicant: Cisco Technology, Inc.
Inventor: Hai Vu , Shih-Chun Chang , Varun Malhotra , Shashi Gandham , Navindra Yadav , Allen Chen , Praneeth Vallem , Rohit Prasad
IPC: H04L41/0893 , H04L43/06 , H04L67/02 , H04L41/046
CPC classification number: H04L41/0893 , H04L43/06 , H04L67/02 , H04L41/046 , H04L43/0817
Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
-
公开(公告)号:US11252038B2
公开(公告)日:2022-02-15
申请号:US16730226
申请日:2019-12-30
Applicant: Cisco Technology, Inc.
Inventor: Rohit Prasad , Hai Vu , Shih-Chun Chang , Hoang Nguyen , Shashi Gandham , Navindra Yadav , Praneeth Vallem , Sunil Gupta , Ravi Prasad , Varun Malhotra
Abstract: The disclosed technology relates to a network agent for generating platform specific network policies. A network agent is configured to receive a platform independent network policy from a network policy system, determine implementation characteristics of the network entity, generate platform specific policies from the platform independent network policy based on the implementation characteristics of the network entity, and implement the platform specific policies on the network entity.
-
公开(公告)号:US10999149B2
公开(公告)日:2021-05-04
申请号:US15985520
申请日:2018-05-21
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Michael Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Aiyesha Ma , Tapan Shrikrishna Patwardhan , Kai Zhu , Jothi Prakash Prabakaran
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, flow records of traffic flow segments at a middlebox in a network environment are collected. The flow records can include transaction identifiers assigned to the traffic flow segments. Sources and destinations of the traffic flow segments with respect to the middlebox can be identified using the flow records. Further, the traffic flow segments can be stitched together to form a plurality of stitched traffic flows at the middlebox based on the transaction identifiers and the sources and destinations of the traffic flow segments in the network environment with respect to the middlebox. A configuration of the middlebox operating in the network environment can be identified based on the stitched traffic flows at the middlebox in the network environment.
-
公开(公告)号:US10917438B2
公开(公告)日:2021-02-09
申请号:US16032765
申请日:2018-07-11
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Girish Anant Kalele , Jothi Prakash Prabakaran
Abstract: Aspects of the disclosed technology relate to ways to authenticate customer/subscriber access to a policy update stream. A process of the technology can include steps for instantiating a network monitoring device in response to a request, the request comprising one or more configuration parameters for the network monitoring device, and receiving a first certificate from the network monitoring device, wherein the first certificate is based on the one or more configuration parameters. In some aspects, the steps can further include sending the first certificate to a processing pipeline for authentication, wherein the processing pipeline is configured to authenticate the first certificate based on a second certificate received by the processing pipeline from the network monitoring device. Systems and machine readable media are also provided.
-
公开(公告)号:US10826803B2
公开(公告)日:2020-11-03
申请号:US15982806
申请日:2018-05-17
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Akshay Srirangam , Jothi Prakash Prabakaran
Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.
-
公开(公告)号:US10594560B2
公开(公告)日:2020-03-17
申请号:US15470410
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US10574575B2
公开(公告)日:2020-02-25
申请号:US15966561
申请日:2018-04-30
Applicant: Cisco Technology, Inc.
Inventor: Supreeth Rao , Navindra Yadav , Umamaheswaran Arumugam , Micheal Watts , Shashi Gandham , Prasannakumar Jobigenahally Malleshaiah , Duy Nguyen , Hai Vu , Tapan Shrikrishna Patwardhan , Aiyesha Ma , Xuan Zou , Jothi Prakash Prabakaran
IPC: H04L12/801 , H04L12/24 , H04L12/26 , H04L29/08 , H04L12/721 , H04L12/911
Abstract: Systems, methods, and computer-readable media for flow stitching network traffic flow segments at a middlebox in a network environment. In some embodiments, a method can include collecting flow records of traffic flow segments at a middlebox in a network environment including one or more transaction identifiers assigned to the traffic flow segments. The traffic flow segments can correspond to one or more traffic flows passing through the middlebox and flow directions of the traffic flow segments with respect to the middlebox can be identified using the flow records. The traffic flow segments can be stitched together based on the one or more transaction identifiers and the flow directions of the traffic flow segments to form a stitched traffic flow of the one or more traffic flows passing through the middlebox. The stitched traffic flow can be incorporated as part of network traffic data for the network environment.
-
公开(公告)号:US20190230011A1
公开(公告)日:2019-07-25
申请号:US15982806
申请日:2018-05-17
Applicant: Cisco Technology, Inc.
Inventor: Shashi Gandham , Navindra Yadav , Janardhanan Radhakrishnan , Hoang-Nam Nguyen , Umesh Paul Mahindra , Sunil Gupta , Praneeth Vallem , Supreeth Rao , Darshan Shrinath Purandare , Xuan Zou , Akshay Srirangam , Jothi Prakash Prabakaran
Abstract: Aspects of the subject technology relate to a system configured to receive, from a stream processing service, a first network snapshot segment. The first network snapshot segment is associated with metadata that is used to determine that at least one additional network snapshot segment associated with the output stream has not been previously received. The system is configured to request, from the stream processing service, the at least one additional network snapshot segment and generate a first network snapshot by compiling the first network snapshot segment and the at least one additional network snapshot segment.
-
公开(公告)号:US20180278480A1
公开(公告)日:2018-09-27
申请号:US15470410
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Rohit Prasad , Shashi Gandham , Hoang Nguyen , Abhishek Singh , Shih-Chun Chang , Navindra Yadav , Ali Parandehgheibi , Paul Mach , Rachita Agasthy , Ravi Prasad , Varun Malhotra , Michael Watts , Sunil Gupta
IPC: H04L12/24
Abstract: The disclosed technology relates to intent driven network management. A system is configured to maintain an inventory store comprising records for a set of network entities in a network, wherein each network entity in the set of network entities is associated with a record in the inventory store. The system receives a user intent statement comprising an action and a flow filter representing network data flows on which the action is to be applied and queries, based on the flow filter, the inventory store to identify a plurality of network entities in the set of network entities to which the user intent statement applies. The system generates a plurality of network policies that implement the user intent statement based on the plurality of network entities and the action and enforces the plurality network policies.
-
公开(公告)号:US20180278479A1
公开(公告)日:2018-09-27
申请号:US15469737
申请日:2017-03-27
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Hai Vu , Shih-Chun Chang , Varun Malhotra , Shashi Gandham , Navindra Yadav , Allen Chen , Praneeth Vallem , Rohit Prasad
Abstract: The disclosed technology relates to a network agent for reporting to a network policy system. A network agent includes an agent enforcer and an agent controller. The agent enforcer is configured to implementing network policies on the system, access data associated with the implementation of the network policies on the system, and transmit, via an interprocess communication, the data to the agent controller. The agent controller is configured to generate a report including the data and transmit the report to a network policy system.
-
-
-
-
-
-
-
-
-