-
公开(公告)号:US10826770B2
公开(公告)日:2020-11-03
申请号:US16046798
申请日:2018-07-26
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan
Abstract: Systems, methods, and computer-readable media for determining a deployment model for deploying rules in a network environment in response to deployment of a contract into the network environment. In some embodiments, a method can include deploying a contract into a network environment. One or more candidate deployment configuration variables can be selected and policy configurations for deploying rules in the network environment as part of implementing policies using the contract can be determined based on the one or more candidate deployment configuration variables. Rule configuration states corresponding to the policy configuration states in the network environment can be identified based on deployment of the one or more contracts in the network environment. Subsequently, a deployment model for implementing the one or more policies in the network environment can be formed based on the policy configurations and the rule configuration states corresponding to the policy configurations.
-
公开(公告)号:US20200186426A1
公开(公告)日:2020-06-11
申请号:US16786349
申请日:2020-02-10
Applicant: Cisco Technology, Inc.
Inventor: Kartik Mohanram , Chandra Nagarajan , Sundar Iyer , Shadab Nazar , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.
-
公开(公告)号:US10574513B2
公开(公告)日:2020-02-25
申请号:US15794111
申请日:2017-10-26
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Divjyot Sethi , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for handling failure scenarios during data collection and analysis for assurance. In some examples, a system can obtain a logical model of a network and, based on the logical model, identify a plurality of controllers on the network and a plurality of nodes on a fabric of the network. The system can probe the plurality of controllers and plurality of nodes for respective status information, including respective reachability information, respective login diagnostics information, and/or respective software information. Based on the respective status information, the system can determine conditions at the plurality of controllers and the plurality of nodes and define one or more assurance operations based on the conditions at the plurality of controllers and the plurality of nodes. The system can then perform the one or more assurance operations.
-
公开(公告)号:US10554483B2
公开(公告)日:2020-02-04
申请号:US15663233
申请日:2017-07-28
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Kartik Mohanram , Sundar Iyer , Ramana Rao Kompella
IPC: G06F15/177 , H04L12/24 , H04L12/46 , H04L29/06
Abstract: Systems, methods, and computer-readable media for performing network assurance in a traditional network. In some examples, a system can collect respective sets of configurations programmed at network devices in a network and, based on the respective sets of configurations, determine a network-wide configuration of the network, the network-wide configuration including virtual local area networks (VLANs), access control lists (ACLs) associated with the VLANs, subnets, and/or a topology. Based on the network-wide configuration of the network, the system can compare the ACLs for each of the VLANs to yield a VLAN consistency check, compare respective configurations of the subnets to yield a subnet consistency check, and perform a topology consistency check based on the topology. Based on the VLAN consistency check, the subnet consistency check, and the topology consistency check, the system can determine whether the respective sets of configurations programmed at the network devices contain a configuration error.
-
公开(公告)号:US20180367396A1
公开(公告)日:2018-12-20
申请号:US15661899
申请日:2017-07-27
Applicant: Cisco Technology, Inc.
IPC: H04L12/24
Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to obtain reference concrete level rules for a node in the network, obtain implemented concrete level rules for the node from the node in the network, compare the reference concrete level rules with the implemented concrete level rules, and determining that the implemented concrete level rules are not appropriately configured based on the comparison.
-
公开(公告)号:US20180367387A1
公开(公告)日:2018-12-20
申请号:US15661889
申请日:2017-07-27
Applicant: Cisco Technology, Inc.
IPC: H04L12/24
Abstract: Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to determine a hit count for a concrete level rule implemented on a node and identify one or more components of a logical model, wherein each of the one or more components are associated with the concrete level rule. The network assurance appliance may attribute the hit count for the concrete level rule to each of the components of the logical model, determine a number of hardware level entries associated with the each of the one or more components, and generate a report comprising the one or more components of the logical model, the hit count attributed to each of the one or more components of the logical model, and the number of hardware level entries associated with the one or more components of the logical model.
-
公开(公告)号:US20180367371A1
公开(公告)日:2018-12-20
申请号:US15794111
申请日:2017-10-26
Applicant: Cisco Technology, Inc.
Inventor: Chandra Nagarajan , Divjyot Sethi , Ramana Rao Kompella
Abstract: Systems, methods, and computer-readable media for handling failure scenarios during data collection and analysis for assurance. In some examples, a system can obtain a logical model of a network and, based on the logical model, identify a plurality of controllers on the network and a plurality of nodes on a fabric of the network. The system can probe the plurality of controllers and plurality of nodes for respective status information, including respective reachability information, respective login diagnostics information, and/or respective software information. Based on the respective status information, the system can determine conditions at the plurality of controllers and the plurality of nodes and define one or more assurance operations based on the conditions at the plurality of controllers and the plurality of nodes. The system can then perform the one or more assurance operations.
-
公开(公告)号:US20180351806A1
公开(公告)日:2018-12-06
申请号:US15663642
申请日:2017-07-28
Applicant: Cisco Technology, Inc.
Inventor: Kartik Mohanram , Chandra Nagarajan , Advait Dixit , Ramana Rao Kompella
IPC: H04L12/24
CPC classification number: H04L41/145 , H04L41/0823 , H04L41/0873 , H04L41/0893
Abstract: Systems, methods, and computer-readable media for intent specification checks. In one example, a system obtains, from one or more controllers in a software-defined network, a logical model of the software-defined network, the logical model including configurations of one or more objects in a hierarchical management information tree that defines manageable objects and object properties for the software-defined network. Based on the hierarchical management information tree, the system performs a policy analysis of configurations in the logical model and determines, based on the policy analysis, whether the configurations in the logical model contain one or more errors.
-
公开(公告)号:US11463316B2
公开(公告)日:2022-10-04
申请号:US16698387
申请日:2019-11-27
Applicant: Cisco Technology, Inc.
Inventor: Divjyot Sethi , Chandra Nagarajan , Ramana Rao Kompella , Gaurav Gupta , Sundar Iyer
IPC: H04L41/12 , H04L41/0853 , H04L43/10 , H04L41/14 , H04L41/0631 , H04L41/0893
Abstract: Systems, methods, and computer-readable media for discovering a network's topology and health. In some examples, a system can obtain, from at least one of a plurality of controllers on a network, a logical model of the network, the logical model including configurations of one or more objects defined for the network. Based on the logical model, the system can identify a respective location of the plurality of controllers in the network and a plurality of nodes in a fabric of the network. Based on the respective location of the plurality of controllers and plurality of nodes, the system can poll the plurality of controllers and plurality of nodes for respective status information, and determine a health and topology of the network based on the logical model, the respective location, and respective status information.
-
40.
公开(公告)号:US10904101B2
公开(公告)日:2021-01-26
申请号:US15693280
申请日:2017-08-31
Applicant: Cisco Technology, Inc.
Inventor: Advait Dixit , Ramana Rao Kompella , Kartik Mohanram , Sundar Iyer , Shadab Nazar , Chandra Nagarajan
IPC: G06F15/173 , H04L12/24
Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.
-
-
-
-
-
-
-
-
-