POLICY ENFORCEMENT FOR BARE METAL SERVERS BY TOP OF RACK SWITCHES

    公开(公告)号:US20220385570A1

    公开(公告)日:2022-12-01

    申请号:US17305117

    申请日:2021-06-30

    Abstract: A plurality of switches may be arranged according to a spine and leaf topology in which each spine switch is connected to all leaf switches. A leaf switch includes a memory configured to store a plurality of policies, each of the plurality of policies being associated with a respective source identifier value and a respective destination address; a network interface communicatively coupled to one of the spine switches; and a processor implemented in circuitry and configured to: receive a packet from the spine switch via the network interface, the packet being encapsulated with a Virtual Extensible Local Area Network (VXLAN) header; extract a source identifier value from the VXLAN header; determine a destination address for the packet; determine a policy of the plurality of policies to apply to the packet according to the source identifier value and the destination address; and apply the policy to the packet.

    SECURE FORWARDING OF TENANT WORKLOADS IN VIRTUAL NETWORKS

    公开(公告)号:US20220124077A1

    公开(公告)日:2022-04-21

    申请号:US17646632

    申请日:2021-12-30

    Abstract: In general, techniques are described for enhancing operations of virtual networks. In some examples, a network system includes a plurality of servers interconnected by a switch fabric comprising a plurality of switches interconnected to form a physical network. Each of the servers comprises an operating environment executing one or more virtual machines in communication via one or more virtual networks. The servers comprise a set of virtual routers configured to extend the virtual networks to the operating environments of the virtual machines. A virtual router of the set of virtual routers is configured to prepare tunnel packets by forwarding packets received from virtual machines to an IPSec kernel executing in a host operating network stack, receiving the ESP packets back from the IPSec kernel and forwarding the ESP packets across the virtual networks.

    INTENT-BASED POLICY GENERATION FOR VIRTUAL NETWORKS

    公开(公告)号:US20210243163A1

    公开(公告)日:2021-08-05

    申请号:US17301279

    申请日:2021-03-30

    Abstract: Techniques are disclosed for generating intent-based policies and applying the policies to traffic of a computer network. In one example, a policy controller for the computer network receives traffic statistics for traffic flows among a plurality of application workloads executed by a first set of computing devices. The policy controller correlates the traffic statistics into session records for the plurality of application workloads. The policy controller generates, based on the session records for the application workloads, application firewall policies for the application workloads. Each of the application firewall policies define whether traffic flows between application workloads are to be allowed or denied. The policy controller distributes the application firewall policies to a second set of one or more computing devices for application to traffic flows between instances of the application workloads.

    Scalable port range management for security policies

    公开(公告)号:US10778724B1

    公开(公告)日:2020-09-15

    申请号:US16023978

    申请日:2018-06-29

    Abstract: Techniques are disclosed for implementing scalable port range policies across a plurality of categories that support application workloads. In one example, a policy agent receives, from a centralized controller for a computer network, a plurality of policies. Each policy of the plurality of policies includes one or more policy rules, and each of the one or more policy rules specifies one or more tags specifying one or more dimensions for application workloads executed by the one or more computing devices and a corresponding port range. The policy agent assigns, based on a policy rule, a port range specified by the policy rule to objects of the one or more computing devices that belong to categories described by the one or more dimensions of the one or more tags of the policy rule. The categories support the application workloads and are assigned to the tags by a centralized controller.

    SCALABLE POLICY MANAGEMENT FOR VIRTUAL NETWORKS

    公开(公告)号:US20190158541A1

    公开(公告)日:2019-05-23

    申请号:US15819522

    申请日:2017-11-21

    CPC classification number: H04L63/205 H04L63/0263 H04L67/10

    Abstract: Techniques are disclosed for implementing scalable policies across a plurality of categories that support application workloads. In one example, a policy controller assigns to the plurality of categories tags specifying one or more of a plurality of dimensions. The policy controller distributes a plurality of policies to policy agents for the plurality of categories. Each policy includes one or more policy rules, and each policy rule includes one or more tags specifying one or more of the plurality of dimensions. For each policy rule, the policy agents allow or deny a traffic flow between objects that belong to categories of the plurality of categories described by the one or more dimensions of a respective tag of the policy rule.

    POLICY-DRIVEN WORKLOAD LAUNCHING BASED ON SOFTWARE DEFINED NETWORKING ENCRYPTION POLICIES

    公开(公告)号:US20190158537A1

    公开(公告)日:2019-05-23

    申请号:US16024412

    申请日:2018-06-29

    Inventor: Prasad Miriyala

    Abstract: Techniques are disclosed for implementing scalable policies across a plurality of categories that support application workloads. In one example, the policy is a security policy that indicates which types of virtualized application workloads are required to communicate with encryption and groups computing devices into zones that communicate via respective tunnels configured to carry encrypted communication. An orchestration engine selects a computing device based on the zones fined in the security policy to ensure that the virtualized application workloads requiring encrypted communication communicate via tunnels configured to carry encrypted communication.

    NETWORK POLICY VALIDATION
    38.
    发明申请

    公开(公告)号:US20250023787A1

    公开(公告)日:2025-01-16

    申请号:US18893090

    申请日:2024-09-23

    Abstract: In an example, a validation system comprises processing circuitry having access to a storage device and is configured to obtain flow records indicative of packet flows among workloads deployed to a cluster of one or more computing devices configured with a network policy, wherein each flow record of the flow records indicates a corresponding packet flow was allowed or denied by the cluster; receive an updated network policy; determine whether a corresponding packet flow for a flow record of the flow records has a discrepancy with the updated network policy; and in response to determining the corresponding packet flow for the flow record of the flow records has a discrepancy with the updated network policy, output an indication of an error.

    Network policy generation for continuous deployment

    公开(公告)号:US12177069B2

    公开(公告)日:2024-12-24

    申请号:US18341186

    申请日:2023-06-26

    Abstract: In an example, a method comprises obtaining, by a policy controller from a first SDN architecture system, flow metadata for packet flows exchanged among workloads of a distributed application deployed to the first SDN architecture system; identifying, using flow metadata for a packet flow of the packet flows, a source endpoint workload and a destination endpoint workload of the packet flow; generating a network policy rule to allow packet flows from the source endpoint workload to the destination endpoint workload of the packet flow; and adding the network policy rule to a configuration repository as configuration data for a second SDN architecture system to cause a deployment system to configure the second SDN architecture system with the network policy rule to allow packet flows from the source endpoint workload to the destination endpoint workload when the distributed application is deployed to the second SDN architecture system.

    ROLE-BASED ACCESS CONTROL AUTOGENERATION IN A CLOUD NATIVE SOFTWARE-DEFINED NETWORK ARCHITECTURE

    公开(公告)号:US20240422167A1

    公开(公告)日:2024-12-19

    申请号:US18815417

    申请日:2024-08-26

    Abstract: A network controller for a software-defined networking (SDN) architecture system may receive a request to generate an access control policy for a role in a container orchestration system, where the request specifies a plurality of functions. The network controller may execute the plurality of functions and may log execution of the plurality of functions in an audit log. The network controller may parse the audit log to determine a plurality of resources of the container orchestration system accessed from executing the plurality of functions and, for each resource of the plurality of resources, a respective one or more types of operations performed on the respective resource. The network controller may create, based at least in part on the parsed audit log, the access control policy for the role that permits a role to perform, on each of the plurality of resources, the respective one or more types of operations.

Patent Agency Ranking