H04L41/0866

AUTOMATIC SERVICE FUNCTION VALIDATION IN A VIRTUAL NETWORK ENVIRONMENT
20180013841 · 2018-01-11 ·

Systems, methods, and computer-readable media for improving the reliability of service function (SF) application in a service function chain (SFC) are provided. In some aspects, the subject technology facilitates automatic service function type validation by a service function forwarder (SFF), for example, by using a probe configured to query a function type of a SF module associated with the validating SFF.

SYSTEM FOR TRANSLATION-BASED REAL-TIME INCONSISTENCY DETECTION IN NETWORK FUNCTIONS VIRTUALIZATION (NFV)

A method, system and apparatus are disclosed. According to one or more embodiments, a detection node in communication with a network function virtualization, NFV, system operating a NFV stack that is logically separable into a plurality of levels including a first level and a second level is provided. The detection node includes processing circuitry configured to: translate an executed first level event sequence to at least one translated second level event sequence, and compare the at least one translated second level event sequence to an executed second level event sequence to at least in part detect inconsistencies between the at least one translated second level event sequence and the executed second level event sequence where the executed second level event sequence and the executed first level event sequence being part of a multi-level sequence flow.

Detection of overlapping subnets in a network

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

Detection of overlapping subnets in a network

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

Data driven user interface for configuring device settings
11716244 · 2023-08-01 · ·

Examples described here include systems and methods for configuring device settings for a number of user devices across an enterprise. A management server can provide a user interface at an administrator console for creating a profile and identifying an associated device type. The management server can then retrieve a schema file associated with the device type. Based on information in the schema file, the management server can populate the user interface at the administrator console with available configuration options pertaining to the device type. An administrator can configure the options and send instructions to the management server to deploy the profile across the number of user devices. The management server can instruct each user device to download a device configuration application from an application repository and transmit the settings information to an agent application of the user device that has permission to configure the device configuration application.

Data driven user interface for configuring device settings
11716244 · 2023-08-01 · ·

Examples described here include systems and methods for configuring device settings for a number of user devices across an enterprise. A management server can provide a user interface at an administrator console for creating a profile and identifying an associated device type. The management server can then retrieve a schema file associated with the device type. Based on information in the schema file, the management server can populate the user interface at the administrator console with available configuration options pertaining to the device type. An administrator can configure the options and send instructions to the management server to deploy the profile across the number of user devices. The management server can instruct each user device to download a device configuration application from an application repository and transmit the settings information to an agent application of the user device that has permission to configure the device configuration application.

Security mechanisms for data plane extensions of provider network services
11569997 · 2023-01-31 · ·

A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.

METHOD TO CONFIGURE A COMPLEX COLLECTION OF INFORMATION HANDLING SYSTEMS

A topology configuration system receives a graphic representation comprising object images of information handling systems to be configured for operating as a complex collection of information handling systems, uses artificial intelligence and deep learning to analyze images on the graphic representation and determine specific information handling systems present in the complex collection of information handling systems. A requirement list is used to create a configuration job. Sets of user instructions are sent to a user to guide the user and sets of device instructions are sent to each information handling system so that the user can configure the plurality of information handling systems to operate as the complex collection of information handling systems. Validation packets may be sent to each information handling system to confirm the complex collection of information handling systems is set up quickly and with little or no troubleshooting.

Shim layer for extracting and prioritizing underlying rules for modeling network intents

Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.

Shim layer for extracting and prioritizing underlying rules for modeling network intents

Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.