-
公开(公告)号:US20240179125A1
公开(公告)日:2024-05-30
申请号:US18072374
申请日:2022-11-30
Applicant: Cisco Technology, Inc.
Inventor: Balaji Sundararajan , Venkatesh Nataraj , Kannan Kumar , Padmanabha Nallur , Abha Jain , Kushal Patel
IPC: H04L9/40
CPC classification number: H04L63/0263 , H04L63/0428
Abstract: This disclosure describes techniques and mechanisms for disclosure describes techniques and mechanisms for optimizing firewall enforcement. The techniques may implement a dynamic detection of Layer 7 processing at one end of the network, alleviating the need to enforce another layer 7 firewall inspection at the other end, thereby saving processing and network resources. The techniques enable firewalls and policies to be statically defined and located in one place.
-
公开(公告)号:US20250071060A1
公开(公告)日:2025-02-27
申请号:US18409701
申请日:2024-01-10
Applicant: Cisco Technology, Inc.
Inventor: Steven Wood , Balaji Sundararajan , Laxmikantha Reddy Ponnuru , Avinash Shah , Pritam Baruah , Venkatesh Nataraj , Ganesh Devendrachar
Abstract: Generally, Software-Defined Wide Area Networks (SD-WAN) generally do not support network segmentation. The concepts disclosed herein connects IPSec SD-WAN fabric to a Virtual Routing and Forwarding (VRF) router and make use of a Software Defined Cloud Interconnect (SDCI) Router to route traffic from IPSec SD-WAN to various cloud services from the SDCI Router in the fabric. The concepts disclosed herein also provides for tunnel multi-plexing that takes incoming and outgoing traffic and maps VPNs to any service VRF associated with the cloud based services.
-
公开(公告)号:US20250039141A1
公开(公告)日:2025-01-30
申请号:US18357934
申请日:2023-07-24
Applicant: Cisco Technology, Inc.
Inventor: Faizan Amjad Mohammed , Venkatesh Nataraj , Gowri Mahendran Lingam Chandramohan , Saravanan Radhakrishnan , Kannan Kumar
IPC: H04L9/40
Abstract: This disclosure describes techniques for orchestrating implementation of a security solution among network devices. The techniques include determining capabilities of routers of the network and capabilities of a cloud security service to perform security features of a security solution. Based at least in part on the capabilities, the techniques include configuring a router of the network to execute a first subset of the security features on data traffic of the network, and configuring the cloud security service to execute a second subset of the security features on the data traffic. The techniques may also include causing the security solution to be presented to a security administrator via a display, the display providing representations of the first subset and the second subset of the security features.
-
公开(公告)号:US20250063360A1
公开(公告)日:2025-02-20
申请号:US18489611
申请日:2023-10-18
Applicant: Cisco Technology, Inc.
Inventor: Venkatesh Nataraj , Angelica Jirina Semenec
IPC: H04W12/069 , H04W12/71
Abstract: This disclosure describes techniques to establish and manage stateful multi-privileged control connections between edge devices and a controller of a SD-WAN. The described techniques may receive request(s) and/or data from edge device(s) that include certificates. The described techniques may utilize criteria to determine validity and acceptability of the certificates during authentication. Where the controller determines a certificate in invalid and acceptable, the described techniques move the edge device to a new quarantine state. In the quarantine state, an edge device maintains the control connection with the controller in order to remediate the certificate, but restricts access to the data plane to reduce security risks. A notification may be generated and displayed to an administrator in response to determining a certificate is invalid and acceptable and/or in response to moving the edge device to the quarantine state. Accordingly, the described techniques improve SD-WAN infrastructure and reduce security risks.
-
公开(公告)号:US11336549B2
公开(公告)日:2022-05-17
申请号:US16743143
申请日:2020-01-15
Applicant: Cisco Technology, Inc.
Inventor: Pradeepan Kannawadi , Venkatesh Nataraj
IPC: H04L12/26 , H04L43/0817 , H04L43/0829 , H04L41/08 , H04L43/10 , H04L41/12 , H04L43/0852 , H04L12/24
Abstract: In one embodiment, a method includes receiving, by a network controller, network characteristics from a network component. The network characteristics are associated with one or more nodes of a network. The method also includes analyzing, by the network controller, the network characteristics to generate configuration parameters for the one or more nodes of the network. The method further includes communicating, by the network controller, the configuration parameters to the one or more nodes of the network.
-
公开(公告)号:US20250030737A1
公开(公告)日:2025-01-23
申请号:US18224220
申请日:2023-07-20
Applicant: Cisco Technology, Inc.
Inventor: Srilatha Tangirala , Venkatesh Nataraj , Ambika Basappa Chandrappa , Kartik Katti , Sasi Veera , Balaji Sundararajan
IPC: H04L9/40
Abstract: Techniques for automatically integrating SD-WAN constructs to security policies are described. The techniques may include defining, by a security cloud provider, a security policy for an entity, the entity represented by a VPN security policy label and the security policy absent source and destination CIDR IP addresses. The security cloud provider notifies an SD-WAN controller of the security policy. The SD-WAN controller maps the VPN security policy label to an IP address pool and a VPN ID. The SD-WAN controller generates an enhanced security policy by automatically adding source and destination CIDR IP addresses to the security policy. The SD-WAN controller deploys the enhanced security policy to an SD-WAN branch router and generates a VPN segment between the SD-WAN branch router and the security cloud provider to establish a common secure internet gateway tunnel for the IP address pool.
-
公开(公告)号:US20210218653A1
公开(公告)日:2021-07-15
申请号:US16743143
申请日:2020-01-15
Applicant: Cisco Technology, Inc.
Inventor: Pradeepan Kannawadi , Venkatesh Nataraj
Abstract: In one embodiment, a method includes receiving, by a network controller, network characteristics from a network component. The network characteristics are associated with one or more nodes of a network. The method also includes analyzing, by the network controller, the network characteristics to generate configuration parameters for the one or more nodes of the network. The method further includes communicating, by the network controller, the configuration parameters to the one or more nodes of the network.
-
-
-
-
-
-