Patent classifications
H04L41/0869
Network anomaly detection and mitigation simulation tool
One or more network tests for a network are selected, wherein the selected one or more network tests simulate an attempt to establish an anomalous network configuration. A network configuration update is generated based on the selected one or more network tests and the network configuration update is issued to a network-based device. A performance of the network is monitored for establishment of the anomalous network configuration in response to the network configuration update and a configuration of the network is revised based on the monitored performance of the network, to mitigate the establishment of the anomalous network configuration.
Network anomaly detection and mitigation simulation tool
One or more network tests for a network are selected, wherein the selected one or more network tests simulate an attempt to establish an anomalous network configuration. A network configuration update is generated based on the selected one or more network tests and the network configuration update is issued to a network-based device. A performance of the network is monitored for establishment of the anomalous network configuration in response to the network configuration update and a configuration of the network is revised based on the monitored performance of the network, to mitigate the establishment of the anomalous network configuration.
Low-overhead real-time configuration drift detection
A management controller may monitor an information handling system to detect an event associated with a change to a configuration setting by subscribing with an internal event bus to receive the event associated with the change in the configuration setting, and evaluate whether there is a discrepancy between a current configuration setting of the information handling system and a baseline configuration setting. If a configuration drift exists based on the discrepancy, then the configuration drift may be sent to a management console.
Validating configuration changes on a network device
A technique to manage a configuration database (CDB) for a network device is disclosed. Network devices may receive a configuration change request as a configuration change object. To process that request, a current configuration CLI set representative of the current CDB may be generated. The network device creates a shadow CDB initially corresponding to the current CDB and processes the change request against the shadow CDB. An updated configuration CLI set may then be generated from the updated shadow CDB. A differential CLI set indicating the difference between the first CLI set and the second CLI set may be generated to represent a set of CLI commands to transition from one CDB to the other (e.g., implement the request). Authorization of the user to execute the CLI commands of the differential CLI dataset may be verified. Upon verification, the current CDB may be replaced with the updated shadow CDB.
Validating configuration changes on a network device
A technique to manage a configuration database (CDB) for a network device is disclosed. Network devices may receive a configuration change request as a configuration change object. To process that request, a current configuration CLI set representative of the current CDB may be generated. The network device creates a shadow CDB initially corresponding to the current CDB and processes the change request against the shadow CDB. An updated configuration CLI set may then be generated from the updated shadow CDB. A differential CLI set indicating the difference between the first CLI set and the second CLI set may be generated to represent a set of CLI commands to transition from one CDB to the other (e.g., implement the request). Authorization of the user to execute the CLI commands of the differential CLI dataset may be verified. Upon verification, the current CDB may be replaced with the updated shadow CDB.
NETWORK ADAPTIVE MONITORING
A system is disclosed for network management automation using network intent or adaptive monitoring automation. Network intent (NI) represents a network design and baseline configuration for that network or network devices with an ability to diagnose deviation from the baseline configuration. The NI can be automated to update and replicate the diagnosis. The monitoring of the network can be adapted to capture network problems in advance with adaptive monitoring automation.
System and method for delivering modular tools
A system and method are presented for delivering modular tools through a cloud-based remote computing environment. Users may create and customize extensions to the modular tools for integration with the product system without requiring change to product. Using a script tag added to a website, a user is able to install the modular tool to a website. The modular tool extensions are able to directly communicate with handlers and websites and are able to become directly integrated with a premises-based product. This may be done through a multiplexed API exposed to the modular tool extensions that directly couples them to the premises-based product. The modular tools are able to be configured in the premises-based product, however they are hosted in the cloud and as such, the premises-based product is able to receive continuous integration and deployment from the cloud.
STORING CONFIGURATION DATA CHANGES TO PERFORM ROOT CAUSE ANALYSIS FOR ERRORS IN A NETWORK OF MANAGED NETWORK DEVICES
An example application programming interface (API) server device that distributes configuration data to managed network devices includes one or more processing units implemented in circuitry and configured to receive configuration data to be deployed to at least one of the managed network devices; store the configuration data to a configuration database; and send the configuration data to the at least one of the managed network devices. In this manner, the configuration data can be archived for later retrieval and analysis, e.g., to perform root cause analysis in the event of an error.
STORING CONFIGURATION DATA CHANGES TO PERFORM ROOT CAUSE ANALYSIS FOR ERRORS IN A NETWORK OF MANAGED NETWORK DEVICES
An example application programming interface (API) server device that distributes configuration data to managed network devices includes one or more processing units implemented in circuitry and configured to receive configuration data to be deployed to at least one of the managed network devices; store the configuration data to a configuration database; and send the configuration data to the at least one of the managed network devices. In this manner, the configuration data can be archived for later retrieval and analysis, e.g., to perform root cause analysis in the event of an error.
SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION
Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.