POLICY-BASED WORKLOAD ORCHESTRATION FOR ENTERPRISE NETWORKS

    公开(公告)号:US20230269292A1

    公开(公告)日:2023-08-24

    申请号:US18122571

    申请日:2023-03-16

    CPC classification number: H04L41/0894 H04L41/0803

    Abstract: Techniques for operationalizing workloads at edge network nodes, while maintaining centralized intent and policy controls. The techniques may include storing, in a cloud-computing network, a workload image that includes a function capability. The techniques may also include receiving, at the cloud-computing network, a networking policy associated with an enterprise network. Based at least in part on the networking policy, a determination may be made at the cloud-computing network that the function capability is to be operationalized on an edge device of the enterprise network. The techniques may also include sending the workload image to the edge device to be installed on the edge device to operationalize the function capability. In some examples, the function capability may be a security function capability (e.g., proxy, firewall, etc.), a routing function capability (e.g., network address translation, load balancing, etc.), or any other function capability.

    NETWORK FLOW ATTRIBUTION IN SERVICE MESH ENVIRONMENTS

    公开(公告)号:US20230099370A1

    公开(公告)日:2023-03-30

    申请号:US17487100

    申请日:2021-09-28

    Abstract: In one embodiment, a monitoring engine obtains mesh flow data for traffic flows between nodes in a service mesh. The monitoring engine associates the mesh flow data with network traffic between an endpoint device and an edge of the service mesh. The monitoring engine identifies, based on the mesh flow data, a particular container workload associated with the traffic flows. The monitoring engine provides an indication that the particular container workload is associated with the network traffic between the endpoint device and the edge of the service mesh.

    Dynamic split tunneling
    54.
    发明授权

    公开(公告)号:US10931561B2

    公开(公告)日:2021-02-23

    申请号:US15660208

    申请日:2017-07-26

    Abstract: A computing device dynamically excludes/includes traffic from/in a secure tunnel based on the domain name of the destination of the traffic. The computing device establishes a secure tunnel from the computing device, and receives a request to access a remote resource at a domain name. The computing device resolves the domain name at a domain name server and receives a resolved network address associated with the domain name. The computing device determines whether to send the request inside the secure tunnel or outside the secure tunnel by comparing the domain name to a split tunneling policy. Based on the comparison with the split tunneling policy, the computing device sends the request to the resolved network address either outside the secure tunnel or inside the secure tunnel.

    DYNAMIC SPLIT TUNNELING
    56.
    发明申请

    公开(公告)号:US20180309658A1

    公开(公告)日:2018-10-25

    申请号:US15660208

    申请日:2017-07-26

    CPC classification number: H04L45/04 H04L12/4641 H04L45/54 H04L45/745

    Abstract: A computing device dynamically excludes/includes traffic from/in a secure tunnel based on the domain name of the destination of the traffic. The computing device establishes a secure tunnel from the computing device, and receives a request to access a remote resource at a domain name. The computing device resolves the domain name at a domain name server and receives a resolved network address associated with the domain name. The computing device determines whether to send the request inside the secure tunnel or outside the secure tunnel by comparing the domain name to a split tunneling policy. Based on the comparison with the split tunneling policy, the computing device sends the request to the resolved network address either outside the secure tunnel or inside the secure tunnel.

    Context sharing between endpoint device and network security device using in-band communications

    公开(公告)号:US10027627B2

    公开(公告)日:2018-07-17

    申请号:US14877116

    申请日:2015-10-07

    Abstract: A network security device (NSD) is connected between a network and an endpoint device configured to host a client application. The client application communicates with the network through the network security device using a request-response protocol. The NSD receives from the client application a request destined for the network and that seeks a response from the network. The request has a context header including context information about the client application. The NSD determines whether the client application or a file accessed thereby has a suspicious nature based on the context information. If it is determined that the client application or the file accessed thereby has a suspicious nature, the NSD blocks the request from the network, and sends to the client application a response indicating the block.

    DIFFERENTIAL MALWARE DETECTION USING NETWORK AND ENDPOINT SENSORS

    公开(公告)号:US20180026993A1

    公开(公告)日:2018-01-25

    申请号:US15214905

    申请日:2016-07-20

    CPC classification number: H04L63/1425

    Abstract: A method is disclosed in which a system compares a first set of reports characterizing network traffic flows originating from an endpoint device with a second set of reports characterizing network traffic flows originating from the endpoint device and stored at an external network device to determine whether the first set and second set of reports characterizing network traffic flows originating from an endpoint device are different. In response to determining that the first and second reports characterizing network traffic flows are different, the system identifies the network traffic flows originating from the endpoint device and reported by an external network device, but not reported by the endpoint device, as possibly indicative of malware and forwards the network traffic flows originating from the endpoint device to an analyzer for further processing. Thus, an observed difference between network traffic flows originating from an endpoint device and stored at the endpoint device and network traffic flows originating from the endpoint device and stored on an external network device are compared to detect the presence of malware residing on the endpoint device.

    Application services based on dynamic split tunneling
    60.
    发明授权
    Application services based on dynamic split tunneling 有权
    基于动态分割隧道的应用服务

    公开(公告)号:US09455909B2

    公开(公告)日:2016-09-27

    申请号:US14841919

    申请日:2015-09-01

    CPC classification number: H04L45/74 H04L61/1511 H04L61/2007 H04L63/0272

    Abstract: One embodiment provides selectively routing Domain Name System (DNS) request for sub-domains associated with a first network through a tunnel associated with the first network via the interface. DNS requests for sub-domains associated with a second network are selectively routed through a tunnel associated with the second network via the interface. Embodiments include replacing the destination address for DNS requests for sub-domains associated with the second network to match an address of a DNS server associated with the second network. Data representative of DNS requests for sub-domains associated with the second network is stored. Embodiments forward the DNS requests for sub-domains associated with the second network with the address of the DNS server associated with the second network.

    Abstract translation: 一个实施例通过经由接口与第一网络相关联的隧道,为与第一网络相关联的子域选择性地路由域名系统(DNS)请求。 通过经由该接口与第二网络相关联的隧道选择性地路由与第二网络相关联的子域的DNS请求。 实施例包括替换与第二网络相关联的子域的DNS请求的目的地地址以匹配与第二网络相关联的DNS服务器的地址。 存储代表与第二网络相关联的子域的DNS请求的数据。 实施例将与第二网络相关联的子域的DNS请求与与第二网络相关联的DNS服务器的地址转发。

Patent Agency Ranking