Validation of layer 3 bridge domain subnets in a network

    公开(公告)号:US11063827B2

    公开(公告)日:2021-07-13

    申请号:US16450869

    申请日:2019-06-24

    Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

    ANOMALY DETECTION AND REPORTING IN A NETWORK ASSURANCE APPLIANCE

    公开(公告)号:US20200213207A1

    公开(公告)日:2020-07-02

    申请号:US16813358

    申请日:2020-03-09

    Abstract: Systems, methods, and computer-readable media for detecting and reporting anomalies in a network environment for providing network assurance. In some embodiments, a system can determine confidence scores for at least one value of parameters of a network environment defining network events occurring in the network environment. The confidences scores can indicate a frequency that the defined network events have a specific event state. The confidence scores can be monitored to detect an anomaly in the network environment. In response to detecting the anomaly in the network environment, the system can determine a relevant network state of the network environment. The relevant network state of the network environment and the anomaly in the network environment can be presented to a user.

    Validating tunnel endpoint addresses in a network fabric

    公开(公告)号:US10700933B2

    公开(公告)日:2020-06-30

    申请号:US15662448

    申请日:2017-07-28

    Abstract: Systems, methods, and computer-readable media are disclosed for validating endpoint information for nodes in a network. A network assurance appliance is configured to retrieve an actual tunnel endpoint address for an endpoint in communication with a network fabric via a leaf node in the network fabric, identify a reference tunnel endpoint address for the endpoint, and determine that there is an inconsistency based on a comparison of the actual tunnel endpoint address with the reference tunnel endpoint address.

    Event clustering for a network assurance platform

    公开(公告)号:US10587456B2

    公开(公告)日:2020-03-10

    申请号:US15702716

    申请日:2017-09-12

    Abstract: Systems, methods, and computer-readable media for clustering events occurring in a network environment for providing network assurance. In one embodiment, a system can identify event states of network events defined by values of parameters of a network environment. The system can determine a confidence score that at least one of the values of parameters is associated with a specific event state using the network events and the identified event states of the network events. The confidence score can be presented to a user for purposes of providing network assurance for the network environment.

    Validating endpoint configurations between nodes

    公开(公告)号:US10567229B2

    公开(公告)日:2020-02-18

    申请号:US15662464

    申请日:2017-07-28

    Abstract: Systems, methods, and computer-readable media are disclosed for validating endpoint information for nodes in a network. A network assurance appliance is configured to retrieve first endpoint information about endpoints in the network from one or more spine nodes in a network and second endpoint information about the endpoints in the network from one or more leaf nodes in the network. The network assurance appliance compares the first endpoint information with the second endpoint information and generates an event based on the comparison.

    Static endpoint validation
    36.
    发明授权

    公开(公告)号:US10560355B2

    公开(公告)日:2020-02-11

    申请号:US15662455

    申请日:2017-07-28

    Abstract: Systems, methods, and computer-readable media are disclosed for validating endpoint information for nodes in a network. A network assurance appliance is configured to retrieve a configured static endpoint information in a logical model of a network from a network controller and connected static endpoint information from one or more nodes in the network. The network assurance appliance determines that there is an inconsistency based on a comparison of the configured static endpoint information and the connected static endpoint information and generating an event specifying the inconsistency.

    Network validation between the logical level and the hardware level of a network

    公开(公告)号:US10432467B2

    公开(公告)日:2019-10-01

    申请号:US15663587

    申请日:2017-07-28

    Abstract: Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

    ANOMALY DETECTION AND REPORTING IN A NETWORK ASSURANCE APPLIANCE

    公开(公告)号:US20190081871A1

    公开(公告)日:2019-03-14

    申请号:US15702374

    申请日:2017-09-12

    CPC classification number: H04L43/04 H04L41/142 H04L41/22 H04L43/0823

    Abstract: Systems, methods, and computer-readable media for detecting and reporting anomalies in a network environment for providing network assurance. In some embodiments, a system can determine confidence scores for at least one value of parameters of a network environment defining network events occurring in the network environment. The confidences scores can indicate a frequency that the defined network events have a specific event state. The confidence scores can be monitored to detect an anomaly in the network environment. In response to detecting the anomaly in the network environment, the system can determine a relevant network state of the network environment. The relevant network state of the network environment and the anomaly in the network environment can be presented to a user.

Patent Agency Ranking