Patent classifications
H04L63/029
SECURING CONTROL/USER PLANE TRAFFIC
A network node selectively encrypts messages between a user plane node and a control plane node in a network system. The user plane node and the control plane node negotiate a connection and indicate an encryption level for the connection. The encryption level is selected from an Information Element (IE) level, a message level, or a feature level. The user plane node and the control plane node selectively encrypt at least a portion of the messages between the user plane node and the control plane node based on the encryption level for the connection.
Distributed Routing Controllers for Multi-Region SDWAN
According to some embodiments, a software defined wide area network (SD-WAN) includes a first region and a second region. The first region includes multiple first routing controllers and multiple first SD-WAN edge routers. The second region includes multiple second routing controllers and multiple second SD-WAN edge routers. Each first SD-WAN edge router of the first region is configured to establish Overlay Management Protocol (OMP) peering connections with the plurality of first routing controllers of the first region but to avoid establishing OMP peering connections with the plurality of second routing controllers of the second region. Each second SD-WAN edge router of the second region is configured to establish OMP peering connections with the plurality of second routing controllers of the second region but to avoid establishing OMP peering connections with the plurality of first routing controllers of the first region.
Packet Transmission Method, Apparatus, and System
A packet transmission method includes that a host obtains a packet, and when a transmission path of the packet is to be pass through a wide area network, the host determines whether to perform optimization on the packet for transmission in the wide area network and performs optimization on the packet for transmission in the wide area network.
SECURITY NETWORK INTEGRATING SECURITY SYSTEM AND NETWORK DEVICES
Systems and methods for a security network integrating security system and network devices are disclosed. A system may comprise a gateway and first and second security panels, each located at a premises. The first and second security panels may be connected, via respective first and second wireless communication protocols, to respective first and second security system components. The first and second security panels may receive respective first and second security data from the respective first and second security system components. The gateway may be configured to receive, via the first and second wireless communication protocols, the respective first and second security data. The gateway may be configured to transmit at least one of the first security data and the second security data to a security server located external to the premises.
Access point name and application identity based security enforcement in service provider networks
Techniques for access point name and application identity based security enforcement in service provider networks (e.g., service provider networks for mobile subscribers) are disclosed. In some embodiments, a system/process/computer program product for access point name (e.g., APN) and application identity (e.g., application identifier) based security enforcement in service provider networks includes monitoring network traffic on a service provider network at a security platform to identify an access point name for a new session; determining an application identifier for user traffic associated with the new session at the security platform; and determining a security policy to apply at the security platform to the new session based on the access point name and the application identifier.
System and method for content fetching using a selected intermediary device and multiple servers
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Dynamic scheduling for live migration between cloud regions and edge locations
This disclosure describes systems, devices, and techniques for migrating virtualized resources between the main region and edge locations. Live migration enables virtualized resources to remain operational during migration. Edge locations are typically separated from secure data centers via the Internet, a direct connection, or some other intermediate network. Accordingly, to place virtualized resources within an edge location, the virtualized resources must be migrated over a secure communication tunnel that can protect virtualized resource data during transmission over the intermediate network. The secure communication tunnel may have limited data throughput. To efficiently utilize resources of the secure communication tunnel, and to reduce the impact of migrations on virtualized resource operations, virtualized resource migrations may be carefully scheduled in advance. For instance, virtualized resources may be selectively migrated at times-of-day in which they are likely to be relatively idle, or at times when the communication tunnel is predicted to have sufficient bandwidth.
Monitoring traffic flows of containers in a segmented network environment
A traffic control and monitoring module includes a firewall operating in a container namespace that is configured to control and monitor traffic to and from a container in the container namespace. The traffic control and monitoring module reports detected traffic to a traffic flow reporting module operating in a host namespace of the host operating system. The traffic control and monitoring module obtains traffic flows associated with a plurality of containers in different container namespaces and reports the traffic flows to a segmentation policy. Based on the reported traffic flows, the segmentation server may update a segmentation policy to improve network security.
Scalable notification delivery for networked computing environments
Disclosed are various embodiments for scalable notification deliveries in computing environments. A subscription request is transmitted along with a user identifier, a service identifier, a subscription identifier, and a channel identifier. Notifications are communicated through a notification multiplexing channel between two nodes of a computing environment. The notification multiplexing channel includes notifications multiplexed by subscription identifiers. The notification multiplexing channel corresponds to the channel identifier. A notification corresponding to the subscription identifier is identified and provided to a client computing device associated with the user identifier.
System for data routing in networks
Systems, methods, and devices for routing data in a network are described. A user device may send a request for video data that has been captured by a premises device. A computing device at the premises may receive the request and determine a capability of the user device. Based on the capability of the user device, the computing device may select a protocol from a plurality of protocols with which the video data is to be transmitted to the user device. Based on determining that the video data cannot be transmitted via the computing device, the video data may be transmitted from the premises device to the user device via the determined protocol.