-
公开(公告)号:US20230004651A1
公开(公告)日:2023-01-05
申请号:US17662477
申请日:2022-05-09
Applicant: Cisco Technology, Inc.
Inventor: Hendrikus G.P. Bosch , Alessandro Duminuco , Sape Jurriën Mullender
Abstract: According to some embodiments, a method comprises: obtaining an application programming interface (API) specification for an API service; performing one or more tests on the API service to determine an amount of deviation between the API service and the API specification; and determining a deviation score based on the amount of deviation between the API service and the API specification. The method may include transmitting the deviation score to a scoring agent.
-
公开(公告)号:US11516260B2
公开(公告)日:2022-11-29
申请号:US17166921
申请日:2021-02-03
Applicant: Cisco Technology, Inc.
Inventor: Alessandro Duminuco , Hendrikus G. P. Bosch , Jeffrey Michael Napper , Vinny Parla , Julien Barbot , Sape Jurrien Mullender
IPC: G06F17/00 , H04L9/40 , H04L67/141 , H04L67/146 , H04L61/4511 , H04L67/01
Abstract: Techniques for utilizing an enterprise traffic interception service (TIS) to enforce policies that mandate how clients access software as a service (SaaS) offered by service providers and selectively intercept enterprise network traffic utilizing a domain name service (DNS) and a single sign-on (SSO) service on a per-client per-service basis. The TIS may include a DNS server, an identity provider service, a TLS inspecting proxy, and/or a policy server. The DNS server may handle requests to resolve an address of a service, and identify a policy, stored in the policy server, to redirect the client based on the identity of the client and the service. The identity provider service may later query the policy server during client authorization for the service to verify that the client request is in line with the policy and allow or deny access to the service.
-
公开(公告)号:US20220247791A1
公开(公告)日:2022-08-04
申请号:US17166921
申请日:2021-02-03
Applicant: Cisco Technology, Inc.
Inventor: Alessandro Duminuco , Hendrikus G.P. Bosch , Jeffrey Michael Napper , Vinny Parla , Julien Barbot , Sape Jurrien Mullender
Abstract: Techniques for utilizing an enterprise traffic interception service (TIS) to enforce policies that mandate how clients access software as a service (SaaS) offered by service providers and selectively intercept enterprise network traffic utilizing a domain name service (DNS) and a single sign-on (SSO) service on a per-client per-service basis. The TIS may include a DNS server, an identity provider service, a TLS inspecting proxy, and/or a policy server. The DNS server may handle requests to resolve an address of a service, and identify a policy, stored in the policy server, to redirect the client based on the identity of the client and the service. The identity provider service may later query the policy server during client authorization for the service to verify that the client request is in line with the policy and allow or deny access to the service.
-
公开(公告)号:US20210392492A1
公开(公告)日:2021-12-16
申请号:US16901248
申请日:2020-06-15
Applicant: Cisco Technology Inc.
Inventor: Jeffrey Napper , Alessandro Duminuco , Hendrikus G.P. (Peter) Bosch
Abstract: The present disclosure is directed to systems and methods for clientless virtual private network (VPN) roaming with 802.1x authentication and includes one or more processors and one or more computer-readable non-transitory storage media coupled to the one or more processors and comprising instructions that, when executed by the one or more processors, cause one or more components to perform operations including, receiving, at a local proxy, an 802.1x communication including authentication information from a remote device wirelessly connected to a visited network, wherein the remote device requests access to an enterprise network; authenticating the remote device with the enterprise network using the authentication information; establishing an encrypted tunnel between the visited network and the enterprise network; and transmitting data between the remote device and the enterprise network through the encrypted tunnel.
-
公开(公告)号:US11115387B2
公开(公告)日:2021-09-07
申请号:US16373055
申请日:2019-04-02
Applicant: Cisco Technology, Inc.
Inventor: Peter Bosch , Alessandro Duminuco , Jeffrey Napper , Sape Jurrien Mullender , David Delano Ward
Abstract: Systems, methods, and computer-readable storage media are provided for managing application traffic. A routing policy defines the data flow path between the client device (which uses a virtual private network (VPN) client) and the appropriate network-based service. Based on various factors associated with the user, the client device, and the destination (e.g. network-based service), the routing policy will direct the VPN client to communicate with either a public DNS (via the public Internet) or to a private DNS (via the private Intranet). The resulting IP addresses will be used to establish a particular route (either over a public Internet or private Intranet) between the client device and the network-based service in accordance to the routing policy.
-
66.
公开(公告)号:US20210273913A1
公开(公告)日:2021-09-02
申请号:US16855809
申请日:2020-04-22
Applicant: Cisco Technology, Inc.
Inventor: Hendrikus G.P. Bosch , Alessandro Duminuco , Sape Jurriën Mullender , Jeffrey Michael Napper
Abstract: An identity provider (IdP) service interoperates with a Virtual Private Network (VPN) client. The IdP service receives a login request originating from the VPN client to establish a VPN tunnel between the VPN client and a VPN host, the login request indicating a user of the VPN client. The IdP service provides a response to the login request. The response includes at least both first information including an indication that the user of the VPN client is an authorized user and second information including an indication of a VPN policy for the VPN tunnel, the VPN policy including a VPN client policy to be utilized during the VPN tunnel by the VPN client and a VPN host policy to be utilized during the VPN tunnel by the VPN host.
-
公开(公告)号:US11012251B2
公开(公告)日:2021-05-18
申请号:US16149756
申请日:2018-10-02
Applicant: Cisco Technology, Inc.
Inventor: Hendrikus G. P. Bosch , Sape Jurriën Mullender , Ijsbrand Wijnands , Alessandro Duminuco , Jeffrey Michael Napper , Subhasri Dhesikan
IPC: H04L12/18 , H04L12/801 , H04L12/863 , H04L12/931 , H04L12/937
Abstract: In one example embodiment, a server generates a candidate instantiation of virtual applications among a plurality of hosts in a data center to support a multicast stream. The server provides, to a first set of agents corresponding to a first set of the plurality of hosts, a command to initiate a test multicast stream. The server provides, to a second set of agents corresponding to a second set of the plurality of hosts, a command to join the test multicast stream. The server obtains, from the second set of agents, a message indicating whether the second set of agents received the test multicast stream. If the message indicates that the second set of agents received the test multicast stream, the server causes the virtual applications to be instantiated in accordance with the candidate instantiation of the virtual applications.
-
公开(公告)号:US20210044623A1
公开(公告)日:2021-02-11
申请号:US16867642
申请日:2020-05-06
Applicant: Cisco Technology, Inc.
Inventor: Hendrikus G.P. Bosch , Sape Jurriën Mullender , Jeffrey Michael Napper , Alessandro Duminuco , Shivani Raghav
Abstract: Dynamically tailored trust for secure application-server networking and advanced enterprise security is provided. A system can individually assess the security posture of each application connecting to the Internet from each client device in an enterprise. For each application, the system tailors a security mode of the Internet connection based on the security posture of the application. Assessment of the security posture of an application is a comprehensive inventory of the security of the application, the security of the device hosting the application, the rights and security of the user, security attributes of the intended service or website being accessed, the security of the communication channel, and so forth. A network-based controller communicates with an agent running within a secure boot mode of each client device to select a security mode for application-service connection, including lean-trust direct access to the Internet, secure VPN-like access, or no access to the Internet.
-
69.
公开(公告)号:US10904240B2
公开(公告)日:2021-01-26
申请号:US16705652
申请日:2019-12-06
Applicant: Cisco Technology, Inc.
Inventor: Hendrikus G. P. Bosch , Alessandro Duminuco , Jeffrey Napper , David Delano Ward , Syed Khalid Raza , Sape Jurrien Mullender
IPC: H04L29/06 , H04L12/725 , H04L12/721
Abstract: Disclosed are concepts for provided for managing application traffic. A method includes receiving a request to access a service from an application, confirming an entity of a user of the application and, based on the confirmation, generating, via an authentication service, a routing policy for data flows between the application and the service. The routing policy defines a mandated path between the application and the service. The method also can include storing proof-of-transit data in the traffic flow for tracking an actual path from the application to the service and determining whether the data path complies with the mandated path defined in the policy. When the determination indicates that the actual path followed the mandated path defined in the routing policy, the method includes granting access to the user for the service. When the actual path differs from the mandated path, the method includes denying access to the user.
-
公开(公告)号:US10798187B2
公开(公告)日:2020-10-06
申请号:US15627084
申请日:2017-06-19
Applicant: CISCO TECHNOLOGY, INC.
Inventor: Sape Jurriën Mullender , Hendrikus G. P. Bosch , Alessandro Duminuco , Jeffrey Napper
Abstract: In one embodiment, secure service chaining can be implemented efficiently for content delivery systems. An orchestrator can determine a service chain for processing a request from a client for content. The orchestrator can determine a capability identifying nodes of the service chain. The orchestrator can then transmit, to the client, a redirect message having the capability, wherein the redirect message redirects the request to a first node of the service chain. The nodes of the service chain can verify the capability and carry out the service chain. Service functions can be applied to the traffic flow associated with delivering the content to the user.
-
-
-
-
-
-
-
-
-