Patent classifications
H04L41/0866
Cybersecurity hardening for networked systems
A computer-readable medium contains cybersecurity configuration settings (CCS) generating file(s) including instructions when executed cause a processor of a computer located at a node in a networked system having computers including at least one computer system class to generate CCS. The CCS generating file includes group policy objects (GPOs) applicable to all computers, policy setting scripts that are applicable to <all the computer s, and group policy definition files which provide a policy setting library for the computer class. Execution of the CCS generating file at the node automatically generates the CCS for cybersecurity protection of the node. The computer class can include computer classes that include ≥2 different operating systems, and there can be a CCS generating file for each computer class. The CCS generating file can be a single multi-class CCS generating file that includes a plurality of CCS generating files.
Network node memory utilization analysis
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.
Network node memory utilization analysis
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.
Transportation of configuration data with error mitigation
A method for mitigating errors in the transportation of configuration data may include identifying, at a development system, dependent configuration data associated with a first transport request. The dependent configuration data may implement a customization to a software application hosted at a production system. A reference table identifying the dependent configuration data may be sent to the production system. A missing object list identifying dependent configuration data absent from the production system may be generated at the production system based on the reference table. The missing object list may be sent to the development system where a corrective action may be performed such that the dependent configuration data identified by the missing object list as being absent from the production system is sent to the production system in the first transport request and/or a second transport request. Related systems and articles of manufacture, including computer program products, are also provided.
CONFIGURING NETWORK NODES IN COMMUNICATION NETWORK
A cluster computing device is defined, associated with a plurality of network nodes of the communications network, and it generates a performance model relating configuration parameters of a network node to at least one energy performance parameter of the network node. The cluster computing device transfers the generated performance model to the plurality of network nodes, and then receives information from network nodes, indicating configuration parameters and at least one energy performance parameter of the respective network node. When the cluster computing device identifies a first network node as having a poor performance, it also identifies a second network node as having a good performance, and it causes the first network node to operate with cloned configuration parameters of the second network node.
CONFIGURING NETWORK NODES IN COMMUNICATION NETWORK
A cluster computing device is defined, associated with a plurality of network nodes of the communications network, and it generates a performance model relating configuration parameters of a network node to at least one energy performance parameter of the network node. The cluster computing device transfers the generated performance model to the plurality of network nodes, and then receives information from network nodes, indicating configuration parameters and at least one energy performance parameter of the respective network node. When the cluster computing device identifies a first network node as having a poor performance, it also identifies a second network node as having a good performance, and it causes the first network node to operate with cloned configuration parameters of the second network node.
Methods and systems for distributed network verification
Methods and systems for partially or fully distributed network verification are described. In partially distributed network verification, each network device generates a respective device-level binary decision diagram (BDD) representing the logical behavior of the respective network device for a network property of interest. The device-level BDDs from each network device are received by a verification service that performs verification by generating an input BDD representing an input header space, and applies each device-level BDD in a logical path from a source device to a destination device, and reports the output BDD. In fully distributed network verification, each network device is responsible for calculating a device-specific output BDD by applying a device-specific BDD, which represents the logical behavior of the network device, to a device-specific input BDD.
Validation of cross logical groups in a network
Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.
Validation of cross logical groups in a network
Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.
CONFIGURING METHOD AND CORRESPONDING COMMUNICATION NETWORK DEVICE, SYSTEM, COMPUTER READABLE PROGRAM PRODUCT AND COMPUTER READABLE STORAGE MEDIUM
The disclosure relates to a method for configuring an WLAN (Wireless Local Area Network) access point adapted to use at least one operational frequency channel to transmit or receive data when the access point is in an operational mode. The configuring includes checking an availability of at least one restricted frequency channel, a use of the restricted frequency channel being restricted by the availability, choosing the operational frequency channel from a set of frequency channels according to the checked availability, a first configuring comprising a first checking of restricted frequency channels belonging to a first proper sub-set of the set being performed before entering into the operational mode. At least one second checking of at least one restricted frequency channel of the set, that has not been checked as available, is performed after the first configuring.