H04L61/5014

Network node policy generation and implementation

An operator node is configured to enable the management of nodes communicatively coupled to the operator node via a network. A selection of node objects is received by the operator node, the selected node objects including software components for inclusion within a node configuration. A configuration policy is generated based on the selected objects, the configuration policy including a set of tests (such as scripts or executables) that, when run, test for the presence of one or more of the selected node objects. A target node is scanned to determine the configuration of the target node, and the set of tests are applied to identify a set of objects identified by the policy but not installed at the target node. The target node is then re-configured to install the identified set of objects at the target node.

SYSTEMS AND METHODS FOR THE HANDLING OF BRIDGED VIRTUAL MACHINES

A system and method for onboarding a virtual machine in a bridge host extension mode are provided. The method includes: creating a virtual machine on a host computing device, wherein the host computing device is associated with a first MAC address and a first IP address; assigning the virtual machine a second MAC address by the host computing device; receiving a first DHCP packet from the virtual machine by the host computing device, wherein the first DHCP packet comprises a first field that includes the second MAC address; replacing the second MAC address in the first field with the first MAC address by the host computing device; adding the second MAC address to a second field of the first DHCP packet by the host computing device; and providing the first DHCP packet to a DHCP server through a network by the host computing device.

SYSTEMS AND METHODS FOR THE HANDLING OF BRIDGED VIRTUAL MACHINES

A system and method for onboarding a virtual machine in a bridge host extension mode are provided. The method includes: creating a virtual machine on a host computing device, wherein the host computing device is associated with a first MAC address and a first IP address; assigning the virtual machine a second MAC address by the host computing device; receiving a first DHCP packet from the virtual machine by the host computing device, wherein the first DHCP packet comprises a first field that includes the second MAC address; replacing the second MAC address in the first field with the first MAC address by the host computing device; adding the second MAC address to a second field of the first DHCP packet by the host computing device; and providing the first DHCP packet to a DHCP server through a network by the host computing device.

EXTENDING A LOCAL AREA NETWORK SECURELY
20230030301 · 2023-02-02 ·

A first router obtains a first network address of a first local area network (LAN) implemented by a second router and a first subnet mask associated with the first LAN. The first router causes the establishment of a secure communications channel with the second router. The first router determines that a computing device seeks to join the first LAN. The first router obtains an internet protocol (IP) address that has a same network address as the first network address and sends, to the computing device, the IP address and the first subnet mask for use by the computing device.

EXTENDING A LOCAL AREA NETWORK SECURELY
20230030301 · 2023-02-02 ·

A first router obtains a first network address of a first local area network (LAN) implemented by a second router and a first subnet mask associated with the first LAN. The first router causes the establishment of a secure communications channel with the second router. The first router determines that a computing device seeks to join the first LAN. The first router obtains an internet protocol (IP) address that has a same network address as the first network address and sends, to the computing device, the IP address and the first subnet mask for use by the computing device.

Methods and system for automated ad hoc customer premise equipment bi-directional vulnerability scanning

Methods and systems for automated ad hoc customer premise equipment (CPE) bi-directional vulnerability scanning. A method includes an auto provisioning server receiving CPE information for a designated CPE to initiate a bi-directional vulnerability scan, obtaining telemetry data from a cable modem termination system (CMTS) based on the CPE information, configuring switches to form a virtual local area network channel between a LAN scanner and the designated CPE using the CPE information, provisioning the LAN scanner to obtain a LAN side Internet Protocol (IP) address from the designated CPE, initiating vulnerability scans at a wide area network (WAN) scanner and the LAN scanner using a stored WAN side IP address and a stored LAN side IP address, respectively, and generating a vulnerability scan report based on results from the WAN scanner and the LAN scanner. At least one network device can be configured based on the report.

Methods and system for automated ad hoc customer premise equipment bi-directional vulnerability scanning

Methods and systems for automated ad hoc customer premise equipment (CPE) bi-directional vulnerability scanning. A method includes an auto provisioning server receiving CPE information for a designated CPE to initiate a bi-directional vulnerability scan, obtaining telemetry data from a cable modem termination system (CMTS) based on the CPE information, configuring switches to form a virtual local area network channel between a LAN scanner and the designated CPE using the CPE information, provisioning the LAN scanner to obtain a LAN side Internet Protocol (IP) address from the designated CPE, initiating vulnerability scans at a wide area network (WAN) scanner and the LAN scanner using a stored WAN side IP address and a stored LAN side IP address, respectively, and generating a vulnerability scan report based on results from the WAN scanner and the LAN scanner. At least one network device can be configured based on the report.

Secure zero-touch provisioning of network devices in an offline deployment

Systems and methods are provided for new network device provisioning without Internet access. One method may include a method of network device provisioning without Internet access, the method including entering a pre-shared key (PSK) in a dynamic host configuration protocol (DHCP) message, obtaining the PSK from a set of DHCP message options by an onboarding network device requesting to join a private network, presenting the PSK, by the onboarding network device, to a network management system (NMS) of the private network, validating the PSK by the NMS, and updating an inventory list of the NMS to include the onboarding network device in the inventory list.

Secure zero-touch provisioning of network devices in an offline deployment

Systems and methods are provided for new network device provisioning without Internet access. One method may include a method of network device provisioning without Internet access, the method including entering a pre-shared key (PSK) in a dynamic host configuration protocol (DHCP) message, obtaining the PSK from a set of DHCP message options by an onboarding network device requesting to join a private network, presenting the PSK, by the onboarding network device, to a network management system (NMS) of the private network, validating the PSK by the NMS, and updating an inventory list of the NMS to include the onboarding network device in the inventory list.

DHCP-COMMUNICATIONS MONITORING BY A NETWORK CONTROLLER IN SOFTWARE DEFINED NETWORK ENVIRONMENTS
20230089533 · 2023-03-23 ·

Methods and apparatus to manage a dynamic deployment environment including one or more virtual machines is provided herein. A disclosed example includes involves: scanning, by executing a computer readable instruction with a processor, the virtual machines in the deployment environment to identify a service installed on any of the virtual machines; determining, by executing a computer readable instruction with the processor, the identified service corresponds to a service monitoring rule; determining, by executing a computer readable instruction with the processor, that a monitoring agent identified by the service monitoring rule is installed on the one or more virtual machines on which the service is installed; and configuring the monitoring agent, by executing a computer readable instruction with the processor, to monitor the service in accordance with the service monitoring rule on the at least one of the virtual machines on which the service is installed.