-
1.
公开(公告)号:US10609081B1
公开(公告)日:2020-03-31
申请号:US15796948
申请日:2017-10-30
Applicant: Cisco Technology, Inc.
Inventor: Syam Sundar V Appala , Shyamsundar Nandkishor Maniyar , Sanjay Kumar Hooda , Kiran Kumar Yedavalli
Abstract: In one example embodiment, a network appliance is configured to process packets in a network. The network appliance obtains a mapping of a domain name to a security group tag having associated therewith one or more security policies. The network appliance receives a network packet having an Internet Protocol address. The network appliance determines a particular domain name associated with the Internet Protocol address of the packet. Based on the mapping of the domain name to the security group tag and the particular domain name, the network appliance determines whether the network packet is associated with the security group tag. The network appliance applies the one or more security policies to the network packet based on the security group tag when the particular domain name of the network packet matches the domain name.
-
公开(公告)号:US10389594B2
公开(公告)日:2019-08-20
申请号:US15460620
申请日:2017-03-16
Applicant: Cisco Technology, Inc.
IPC: H04L12/24 , H04L12/26 , H04L12/70 , H04L12/701
Abstract: Presented herein are techniques for determining the impact a policy change might have on a network. The techniques include receiving configuration information from a plurality of network devices in a network, receiving traffic flow records from the plurality of network devices, receiving an indication of an intent to apply a new policy on the network devices, and based on the configuration information, traffic flow records and the new policy, determining an impact of the new policy on the network devices and traffic flowing through the network.
-
公开(公告)号:US20180270133A1
公开(公告)日:2018-09-20
申请号:US15460620
申请日:2017-03-16
Applicant: Cisco Technology, Inc.
CPC classification number: H04L41/0893 , H04L41/0853 , H04L43/026 , H04L43/08 , H04L45/00 , H04L47/00
Abstract: Presented herein are techniques for determining the impact a policy change might have on a network. The techniques include receiving configuration information from a plurality of network devices in a network, receiving traffic flow records from the plurality of network devices, receiving an indication of an intent to apply a new policy on the network devices, and based on the configuration information, traffic flow records and the new policy, determining an impact of the new policy on the network devices and traffic flowing through the network.
-
公开(公告)号:US10958622B2
公开(公告)日:2021-03-23
申请号:US15867124
申请日:2018-01-10
Applicant: Cisco Technology, Inc.
Inventor: Syam Sundar V Appala , Kiran Kumar Yedavalli , Shyamsundar Nandkishor Maniyar , Sanjay Kumar Hooda
Abstract: In one example, a network element in a first network receives a network packet including a first security group identifier. The network element identifies the first security group identifier, determines that the first security group identifier is hierarchically correlated with a second security group identifier, and inserts the second security group identifier into the network packet. The network element forwards the network packet including the second security group identifier.
-
公开(公告)号:US20190215303A1
公开(公告)日:2019-07-11
申请号:US15867124
申请日:2018-01-10
Applicant: Cisco Technology, Inc.
Inventor: Syam Sundar V Appala , Kiran Kumar Yedavalli , Shyamsundar Nandkishor Maniyar , Sanjay Kumar Hooda
IPC: H04L29/06
CPC classification number: H04L63/0236 , H04L63/104 , H04L63/20
Abstract: In one example, a network element in a first network receives a network packet including a first security group identifier. The network element identifies the first security group identifier, determines that the first security group identifier is hierarchically correlated with a second security group identifier, and inserts the second security group identifier into the network packet. The network element forwards the network packet including the second security group identifier.
-
-
-
-