H04L12/46

Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links

An extended enterprise browser installed on an endpoint device provides protection from ransomware attacks to SaaS and private enterprise applications. The extended enterprise browser monitors for alternate browser installed on the endpoint device. The extended enterprise browser may take one or more actions to block the spread of ransomware by the alternate browser.

OPERATIONS, ADMINISTRATION AND MANAGEMENT (OAM) IN OVERLAY DATA CENTER ENVIRONMENTS
20180013670 · 2018-01-11 ·

Systems, methods, and computer-readable media for OAM in overlay networks. In response to receiving a packet associated with an OAM operation from a device in an overlay network, the system generates an OAM packet. The system can be coupled with the overlay network and can include a tunnel endpoint interface associated with an underlay address and a virtual interface associated with an overlay address. The overlay address can be an anycast address assigned to the system and another device in the overlay network. Next, the system determines that a destination address associated with the packet is not reachable through the virtual interface, the destination address corresponding to a destination node in the overlay network. The system also determines that the destination address is reachable through the tunnel endpoint interface. The system then provides the underlay address associated with the tunnel endpoint interface as a source address in the OAM packet.

OPERATIONS, ADMINISTRATION AND MANAGEMENT (OAM) IN OVERLAY DATA CENTER ENVIRONMENTS
20180013670 · 2018-01-11 ·

Systems, methods, and computer-readable media for OAM in overlay networks. In response to receiving a packet associated with an OAM operation from a device in an overlay network, the system generates an OAM packet. The system can be coupled with the overlay network and can include a tunnel endpoint interface associated with an underlay address and a virtual interface associated with an overlay address. The overlay address can be an anycast address assigned to the system and another device in the overlay network. Next, the system determines that a destination address associated with the packet is not reachable through the virtual interface, the destination address corresponding to a destination node in the overlay network. The system also determines that the destination address is reachable through the tunnel endpoint interface. The system then provides the underlay address associated with the tunnel endpoint interface as a source address in the OAM packet.

Multi-site virtual infrastructure orchestration of network service in hybrid cloud environments

A method of deploying a network service (NS) across multiple data centers includes identifying virtual network functions (VNFs) associated with the NS in response to a request for or relating to the NS, generating commands to deploy VNFs based on VNF descriptors, and issuing the commands to the data centers to deploy VNFs. The data centers each have a cloud management server in which cloud computing management software is run to provision virtual infrastructure resources thereof for a plurality of tenants. The cloud computing management software of a first data center is different from the cloud computing management software of a second data center, and the commands issued to the first and second data centers are each a generic command that is not in a command format of the cloud computing management software of either the first data center or the second data center.

VXLAN Packet Transmission
20180013687 · 2018-01-11 ·

In an example, a SDN controller may acquire a path maximum transmission unit (PMTU) of a Virtual Extensible Local Area Network (VXLAN) tunnel from a source VXLAN tunnel end point (VTEP) to a destination VTEP of a data packet, and may transmit a control entry to the source VTEP in such a way that an individual VXLAN packet has a length within the packet length corresponding to the PMTU.

NETWORK SYSTEM OF RAILCAR

The present invention provides a network system of a railcar, the network system being capable of efficiently performing maintenance work. One example of the network system of the railcar of the present invention includes: intra-car networks (N1 to N3) to which first and second apparatuses are connected; an inter-car network (NA) for transmission of information between the apparatuses mounted on different cars; routers (R1 to R3) each provided and connected between the corresponding intra-car network (N1 to N3) and the inter-car network (NA) and each including a network address translation portion configured to mutually convert a private address of the first apparatus and an IP address of the inter-car network (NA); and a maintenance transmission path forming unit configured to form a transmission path through which the transmission and reception of the information are performed between a maintenance terminal (5) and a maintenance target apparatus selected from the first and second apparatuses, the transmission path not passing through the network address translation portion of the car on which the maintenance target apparatus is mounted.

NETWORK SYSTEM OF RAILCAR

The present invention provides a network system of a railcar, the network system being capable of efficiently performing maintenance work. One example of the network system of the railcar of the present invention includes: intra-car networks (N1 to N3) to which first and second apparatuses are connected; an inter-car network (NA) for transmission of information between the apparatuses mounted on different cars; routers (R1 to R3) each provided and connected between the corresponding intra-car network (N1 to N3) and the inter-car network (NA) and each including a network address translation portion configured to mutually convert a private address of the first apparatus and an IP address of the inter-car network (NA); and a maintenance transmission path forming unit configured to form a transmission path through which the transmission and reception of the information are performed between a maintenance terminal (5) and a maintenance target apparatus selected from the first and second apparatuses, the transmission path not passing through the network address translation portion of the car on which the maintenance target apparatus is mounted.

SYSTEM AND METHOD FOR A GLOBAL VIRTUAL NETWORK

Systems and methods for connecting devices via a virtual global network are disclosed. In one embodiment the network system may comprise a first device in communication with a first endpoint device and a second device in communication with a second endpoint device. The first and second devices may be connected with a communication path. The communication path may comprise one or more intermediate tunnels connecting each endpoint device to one or more intermediate access point servers and one or more control servers.

SOFTWARE DEFINED VISIBILITY FABRIC
20180013697 · 2018-01-11 ·

A fabric manager includes: a processing unit having a service chain creation module configured to create a service chain by connecting some of a plurality of nodes via virtual links; wherein the some of the plurality of nodes represent respective network components of an auxiliary network configured to obtain packets from a traffic production network; and wherein the service chain is configured to control an order of the network components represented by the some of the plurality of nodes packets are to traverse.

Data Packet Transmission Method and Border Routing Bridge Device
20180013679 · 2018-01-11 ·

A data packet transmission method and a border routing bridge device, where the method includes receiving, by a first border routing bridge device of a first area, a first data packet sent by a border routing bridge device of a second area to the first area, determining, a device identifier group of the second area according to the first data packet, determining, from the device identifier group of the second area, according to the first data packet, a device identifier of a border routing bridge device used to forward a return data packet sent by the target device to the source device, and sending, by the first border routing bridge device, a second data packet carrying the determined device identifier to the target device, where the determined device identifier is used as a source routing bridge device identifier of the second data packet.