H04L41/0883

System for generating computing network segmentation and isolation schemes using dynamic and shifting classification of assets

A system is provided for generating computing network segmentation and isolation schemes using dynamic and shifting classification of assets. In particular, the system may comprise various components that may identify and classify assets (e.g., computing devices) within a network, network topology, and vectors that may compromise one or more assets. The system may further comprise a component for mitigating and rectifying the effects of such vectors. Each asset within the network may be assigned a classification which may be dynamically modified and/or shifted by the system based on changing requirements and/or environments. In this way, the system may provide a more comprehensive way to protect the integrity and security of computing devices and/or electronic data.

Network change verification based on observed network flows

A network change verification (NCV) system is disclosed for checking whether a proposed configuration change on a network alters the way that the network controls recently observed network flows. In embodiments, the system builds an observed flow control model (OFCM) from logs of recent flows observed in the network. The OFCM, which may be periodically updated based on newly observed flows, provides a compact representation of how individual network flows were ostensibly controlled by the network. When a proposed configuration change is received, the system analyzes the change against the OFCM to check whether the change will alter how the network controls recently observed flows. If so, the proposed change is blocked, and an alert is generated identifying flows that are affected by the change. The NCV system thus prevents network operators from accidentally making changes on the network that will materially alter the behavior of the network.

ACTIVE ASSURANCE FOR VIRTUALIZED SERVICES
20220158926 · 2022-05-19 ·

An example method includes receiving, by a computing system, a declarative testing descriptor for active testing of a virtualized service; obtaining, from an orchestration layer, metadata associated with the virtualized service, wherein the metadata specifies a unique name for a virtualized service within the namespace of a cluster managed by the orchestration layer; determining, by the computing system using the declarative testing descriptor and the metadata, an active testing configuration for an instance of the virtualized service; and starting an active test according to the active testing configuration and determining service level violations for the instance of the virtualized service based on a result of the active test.

Disaster recovery for cloud-based private application access

Systems and methods include receiving one or more disaster recovery configurations via a cloud-based system; storing the one or more received disaster recovery configurations in one or more components of the cloud-based system; identifying activation of a disaster recovery mode; and providing private application access based on one or more disaster recovery configurations.

Data center troubleshooting mechanism

A system to facilitate troubleshooting a hardware device in a network switching fabric is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a message from a hardware device indicating that a problem has been detected at the device, perform a troubleshooting operation to determine the problem at the hardware device and generate a report including the results of the troubleshooting operation.

Co-management eligibility and enrollment

This document relates to a process for managing remote devices within an organization. Upon receiving device state information from the remote device, a cloud-based management server can analyze the device state information of the remote devices, and categorize the remote devices into a number of categories that reflect each device's state with respect to co-management enrollment. The categories can be presented to a user in order to provide a comprehensive view of the state of various remote devices in relation to their co-management state. Various co-management enrollment actions can then be issued to the remote devices in order to enroll a device in co-management, or upgrade a co-management category associated with the device.

MULTIPLE LEVELS OF LOGICAL ROUTERS
20220150112 · 2022-05-12 ·

Some embodiments provide a managed network for implementing a logical network for a tenant. The managed network includes a first set of host machines and a second set of host machines. The first set of host machines is for hosting virtual machines (VMs) for the logical network. Each of the first set of host machines operates a managed forwarding element that implements a first logical router for the tenant logical network and a second logical router to which the first logical router connects. The implementation of the second logical router is for processing packets entering and exiting the tenant logical network. The second set of host machines is for hosting L3 gateways for the second logical router. The L3 gateways connect the tenant logical network to at least one external network.

Teaming applications executing on machines operating on a computer with different interfaces of the computer
11736356 · 2023-08-22 · ·

Some embodiments provide a method for associating data message flows from applications executing on a host computer with network interfaces of the computer. The method of some embodiments identifies a set of applications operating on a machine executing on the host computer, identifies candidate teaming policies for associating each identified application with a subset of one or more interfaces, and generates a report to display the identified candidate teaming policies per application to a user. In response to user input selecting a first teaming policy for a first application, the method generates a rule, and distributes the rule, to the host computer to associate the first application with a first subset of the network interfaces specified by the first teaming policy. Similarly, in response to user input selecting a second teaming policy for a second application executing on the machine, the method generates a second rule, and distributes the second rule, to the host computer to associate the second application with a second subset of the network interfaces specified by the second teaming policy.

ZERO TOUCH DEPLOYMENT AND DYNAMIC CONFIGURATION

Disclosed herein are system, method, and device embodiments for zero touch deployment and dynamic configuration. A management server receives a dynamic configuration value for a configuration setting via a configuration service, and generates configuration information including a mapping of a configuration setting to the dynamic configuration value. Further, the management server receives a configuration information request including an identifier associated with a remote client device, and sends the configuration information to the remote client device.

QUALITY ISSUE MANAGEMENT FOR ONLINE MEETINGS
20230261893 · 2023-08-17 ·

A system and method for managing quality issues experienced by users of an online meeting. A disclosed method includes: receiving a report from a first client of a quality issue associated with a second client; obtaining and evaluating performance data from the first client to determine whether the first client is responsible for the quality issue; in response to a determination that the first client is not responsible for the quality issue, requesting an indication from a set of other clients in the online meeting whether the other clients are experiencing the quality issue with the second client; and in response to a determination that the second client is responsible for the quality issue, notifying the second client of the quality issue.