18297253. MULTIFACETED SECURITY GROUP CLASSIFICATION IN OVERLAY FABRIC simplified abstract (Cisco Technology, Inc.)
MULTIFACETED SECURITY GROUP CLASSIFICATION IN OVERLAY FABRIC
Organization Name
Inventor(s)
Rajagopalan Janakiraman of Cupertino CA (US)
Kiran Sasidharan Pillai of Fremont CA (US)
Muralidhar Annabatula of Dublin CA (US)
Murukanandam K. Panchalingam of Dublin CA (US)
MULTIFACETED SECURITY GROUP CLASSIFICATION IN OVERLAY FABRIC - A simplified explanation of the abstract
This abstract first appeared for US patent application 18297253 titled 'MULTIFACETED SECURITY GROUP CLASSIFICATION IN OVERLAY FABRIC
The abstract of this patent application describes techniques for using policies in an overlay communication network. These techniques involve deriving multiple source tags for a flow in the network, each tag corresponding to one or more policies for the flow. A tag pointer is then derived for the flow, encapsulating all the source tags, and transmitted over the network. The tag pointer is used to identify multiple policies for the flow upon egress from the network.
- Deriving multiple source tags for a flow in an overlay communication network
- Deriving a tag pointer for the flow that encapsulates all the source tags
- Transmitting the flow over the network with the tag pointer
- Using the tag pointer to identify multiple policies for the flow upon egress from the network
Potential Applications: - Network traffic management - Quality of Service (QoS) optimization - Security policy enforcement
Problems Solved: - Efficient policy application in overlay communication networks - Simplified policy identification for network flows
Benefits: - Improved network performance - Enhanced security measures - Streamlined policy management
Commercial Applications: Title: "Enhanced Policy Management in Overlay Communication Networks" This technology could be utilized by network service providers, cloud computing companies, and cybersecurity firms to optimize network performance, ensure data security, and streamline policy enforcement.
Questions about the technology: 1. How does this technology improve network traffic management? 2. What are the key advantages of using tag pointers for policy identification in overlay communication networks?
Original Abstract Submitted
Techniques for using policies in an overlay communication network are disclosed. These techniques include deriving a plurality of source tags for a flow relating to an overlay communication network, the plurality of source tags relating to one or more policies for the flow. The techniques further include deriving a tag pointer for the flow, the tag pointer corresponding to all of the plurality of source tags, encapsulating the tag pointer in the flow, and transmitting the flow over the overlay communication network, wherein the tag pointer is configured to be used to identify a plurality of policies for the flow on egress from the overlay communication network.