Patent classifications
H04L41/0843
CONFIGURATION TECHNIQUES FOR MANAGED HOST OPERATING SYSTEMS AND CONTAINERIZED APPLICATIONS INSTANTIATED THEREBY
Embodiments described herein are directed to configuring managed computing devices utilizing containerized applications. For instance, a mobile device manager may provide configuration settings to a computing device via, for example, an enterprise network. A host operating system (OS) executing on the computing device determines and applies the settings that are applicable to the host OS. The configuration settings are stored for configuring containerized applications executing on the computing device. For instance, as new containerized applications are launched by the host OS, the containerized applications retrieve the configuration settings and determine and apply the settings that are applicable to the containerized applications. Results of applying the configuration settings to the host OS and the containerized applications are merged and sent to the mobile device manager. The host OS and the containerized application may, for example, implement the settings in order to be compliant with an enterprise's policy.
DEEP LEARNING BASED SYSTEM AND METHOD FOR INLINE NETWORK ANALYSIS
Described herein are a device and a method for performing a network analysis. In one aspect, the device includes a reconfigurable neural network circuit to determine an indication of a predicted network characteristic. In one aspect, the reconfigurable neural network circuit includes a control circuit to select a packet attribute or a flow attribute of a raw packet stream from a pipeline, and determine a configuration setting corresponding to the packet attribute or the flow attribute. The configuration setting may indicate a configuration of the reconfigurable neural network circuit to implement a neural network. In one aspect, the reconfigurable neural network circuit includes a storage to provide neural network parameters of the neural network, according to the configuration setting. In one aspect, the reconfigurable neural network circuit includes computational circuits to perform computations based on the neural network parameters from the storage to determine the indication of the predicted network characteristic.
Method and apparatus for deploying security access control policy
A method and an apparatus are provided for deploying a security access control policy in the field of network security. The method, executed by a cloud management platform, includes: determining, according to an application creation instruction, an application template used for an application that needs to be created and a security profile corresponding to the application template; instructing a virtualization platform to create, according to the application template, a corresponding virtual machine for each application component in the application, and obtaining an IP address of each virtual machine created by the virtualization platform; generating a group of security access control policies corresponding to the application according to the IP address of each virtual machine and by using the security profile; and delivering the group of security access control policies to a corresponding firewall. Therefore, a security access control policy is automatically deployed.
Communication system, provider node, communication node, and method for providing a virtual network function to a customer node
The disclosure is directed to providing virtual network functions to a customer node by a communication system with a provider node in an automatic, traceable, and auditable way. The provider node includes a retrieving module, a validation module, and a deployment module. The retrieving module is configured to retrieve a notification signal, wherein the notification signal is indicative of a selected one of a plurality of virtual network functions and the customer node. The validation module is configured to establish service level agreement data and to validate the agreement service level data, based on the notification signal. The deployment module is configured to selectively transmit a deployment signal to a communication node depending on the validation of the service level agreement data for providing the selected virtual network function to the customer node.
Systems and methods for discovering and monitoring devices using search patterns for object identifiers and values
The present disclosure is directed to systems and methods of managing remote devices. The system can include a server with memory, a detection module, and a collection module. The memory can store a management information base (MIB) having a hierarchical tree of object identifiers and corresponding object values. The detection module can query devices and receive a first object identifier and its first object value, which can vary from those in the MIB; and use patterns to match the first object identifier and object value; and generate an identification of the device from the matches. The collection module can use the identification to select a collection template, which can indicate a subtree of the MIB and a collection pattern; traverse the subtree and identify a second object identifier that matches the collection pattern, and its second object value; and associate the second object value with the first object value.
User defined objects for network devices
Provided are systems and methods for configuring a network servicing node with user-defined instruction scripts. A method for configuring a network servicing node with user-defined instruction scripts may commence with receiving, from a user of the network servicing node, a user loadable program. The user loadable program may include at least the user-defined instruction scripts. The method may continue with receiving a data packet from a data network associated with the user. The method may further include determining a condition associated with the data packet. The method may continue with identifying, in a name table, a program name associated with a program using the condition. The program may be the user loadable program. The method may further include processing the data packet by getting an instruction of the user-defined instruction scripts from a storage module and applying the instruction to the data packet.
Automated command assistance for a cloud service
An automated command assistance tool is provided for a browser-enabled command line interface of a cloud service. The automated command assistance tool provides examples illustrating the correct syntax for commands used to manage the resources of a cloud service. The command assistance tool learns the syntax of a command from usage patterns found in telemetric data, scripts and user documentation and forms templates containing a command's usage pattern and related information. The templates are used to generate examples that respond to a user query for assistance with usage of a particular command.
Method and control system for monitoring plurality of equipment in SNMP based network
The present invention discloses a method and control system for monitoring plurality of equipment in industrial plant connected over SNMP based network. Each of plurality of equipment is associated with a server which is communicatively connected with client. One or more equipment which are capable of reporting monitoring objects are identified using a configuration file. Further, polling for monitoring objects based on capability data associated with one or more equipment is performed. Secure configuration of plurality of equipment in SNMP based network is achieved. Management of network traffic is performed. Unauthorized extraction of monitoring objects is reduced in the network.
Learning by inference from previous deployments
The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.
Automated Deployment of Control Nodes at Remote Locations
A control node can be automatically deployed at a remote location according to some examples described herein. In one example, a system can automatically set up a control node at a remote location by performing various operations. The operations can include interacting with the remote location to deploy an instance of the control node at the remote location. The operations can include providing a configuration script to the remote location for use by the instance in configuring one or more managed nodes. The operations can include providing connection information to the remote location for use by the instance in establishing a network connection to the one or more managed nodes. The system can then initiate a configuration process in which the control node establishes the network connection to the one or more managed nodes and then configures the one or more managed nodes in accordance with the configuration script.