-
1.
公开(公告)号:US10135841B2
公开(公告)日:2018-11-20
申请号:US14983983
申请日:2015-12-30
Applicant: Juniper Networks, Inc.
Inventor: Lisa M. Beam , Lyubov Nesteroff , Natalia L. Shimuk , Amol Sood , Rene Chavez , Olga M. Towstopiat , Nadeem Khan , Ahzam Ali , Dharmendran Arumugam , Mayank Betala , Shrikanta Sharma
IPC: H04L29/06
Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise. An administrator may, for example, interact with the representation of threats rendered by the threat control module based on the data aggregated from the distributed security devices and, responsive to the interaction, the security management system may identify a relevant set of the security devices, automatically construct security policies having ordered rules within the policies for the identified set of security devices, and automatically communicate and install the policies in the identified set of security devices.
-
公开(公告)号:US20170126727A1
公开(公告)日:2017-05-04
申请号:US14983927
申请日:2015-12-30
Applicant: Juniper Networks, Inc.
Inventor: Lisa M. Beam , Lyubov Nesteroff , Natalia L. Shimuk , Rene Chavez , Sujatha P. Subbarao , Dennis Park
IPC: H04L29/06
CPC classification number: H04L63/14 , H04L63/0263 , H04L63/1408 , H04L63/1433 , H04L63/1441 , H04L63/20
Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise. An administrator may, for example, interact with the representation of threats rendered by the threat control module based on the data aggregated from the distributed security devices and, responsive to the interaction, the security management system may identify a relevant set of the security devices, automatically construct security policies having ordered rules within the policies for the identified set of security devices, and automatically communicate and install the policies in the identified set of security devices.
-
公开(公告)号:US11323330B1
公开(公告)日:2022-05-03
申请号:US16455098
申请日:2019-06-27
Applicant: Juniper Networks, Inc.
Inventor: Amy Chang , Lisa M. Beam , Amol Sood
Abstract: In general, the disclosure describes techniques for a hybrid diagramming application to provide a flexible network diagramming environment while also ensuring that the rules of the network are not violated. A service provider defines rules for various network objects, where the rules define where the various network objects can reside in the network topology, as well as how the various devices can be connected. A computing device executing the application receives an indication of user input assigning a first network device to a first area network in a network topology. The computing device validates, based on one or more characteristics of the first network device, that the first network device does not violate one or more rules for the first area network. The computing device, responsive to validating the first network device, generates a graphical user interface of the network topology and outputs, for display, the graphical user interface.
-
4.
公开(公告)号:US20170126728A1
公开(公告)日:2017-05-04
申请号:US14983983
申请日:2015-12-30
Applicant: Juniper Networks, Inc.
Inventor: Lisa M. Beam , Lyubov Nesteroff , Natalia L. Shimuk , Amol Sood , Rene Chavez , Olga M. Towstopiat , Nadeem Khan , Ahzam Ali , Dharmendran Arumugam , Mayank Betala , Shrikanta Sharma
IPC: H04L29/06
CPC classification number: H04L63/14 , H04L63/0263 , H04L63/1408 , H04L63/1433 , H04L63/1441 , H04L63/20
Abstract: Techniques are described for taking direct actions, such as selectively blocking or allowing traffic and applications, while monitoring events from a graphical representation of threats. As such, the administrator in an enterprise interacts with the graphical representation of threats rendered by the security management system to automatically invoke a policy/rule module of the security management system to configure and update security policies for the security devices deployed throughout the computer networks of the enterprise. An administrator may, for example, interact with the representation of threats rendered by the threat control module based on the data aggregated from the distributed security devices and, responsive to the interaction, the security management system may identify a relevant set of the security devices, automatically construct security policies having ordered rules within the policies for the identified set of security devices, and automatically communicate and install the policies in the identified set of security devices.
-
-
-