Patent application number | Description | Published |
20080222730 | Network service monitoring - Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding an event to a second network device in response to a determination that the protocol of the packet corresponds to the network service, determining whether the network service is an authorized service by comparing the network service to a list of network services, and executing a remedial action in response to a determination that the network service is an unauthorized service. | 09-11-2008 |
20080320257 | Network message logging and archival - A method includes receiving a message to be logged. The message is written to a stream corresponding to an active archive, wherein the active archive comprises compressed messages. The message is also written to an active log without compression. | 12-25-2008 |
20100157839 | NETWORK SERVICE MONITORING - Network devices, systems, and methods are described that perform network service monitoring. One method includes examining a number of packets received by a first network device to determine whether a protocol of a packet corresponds to a given network service, forwarding packet service type information and packet address information to a second network device in response to a determination that the protocol of the packet corresponds to the network service, comparing the packet service type information and an associated service type address to a list of service types and addresses on the second network device, and executing a remedial action if, based on the comparing, it is determined that the network service is an unauthorized service and that a provider of the network service is an unauthorized provider. | 06-24-2010 |
20110099236 | CESSATION OF SENDING NETWORK STATUS MESSAGES TO A SERVER - A system comprises a processor, a network interface coupled to the processor, and storage accessible to the processor. The network interface is configured to receive network status messages from a plurality of agents across a network. Each network status message indicates a status of a network. The storage comprises a plurality of queues with each queue corresponding to one of the agents. The network status messages from a given agent are stored in a queue corresponding to that agent pending processing by the processor. Upon a number of network status messages in a queue for a particular agent exceeding an agent high water mark, the processor sends a stop message through the network interface to such agent to cause such agent to cease sending network status messages. | 04-28-2011 |
20120033558 | SWITCH THAT MONITORS FOR FINGERPRINTED PACKETS - A switch comprises a switching module coupled to a plurality of ports. The switching module receives and forwards a plurality of packets through the ports. The switch also comprises a management unit comprising a processor and an agent executable by the processor. The agent causes the processor to monitor each packet received by the switching module and determine whether each such packet contains a predetermined fingerprint. Upon determining that a packet contains the predetermined fingerprint, the processor causes additional information to be included in a copy of the fingerprinted packet and forwarded to a predetermined address. The switching module also forwards the packet containing the predetermined fingerprint, but without the additional information, to an address corresponding to a destination address contained in the packet. A method of programming the switches is also described as well as a management workstation used to program the switches and analyze the fingerprinted packets. | 02-09-2012 |
20130031227 | TRANSMISSION OF CONFIGURATION TO A DEVICE FOR PROVISIONING IN A NETWORK - A method is provided that includes receiving a communication from a trusted device indicating that a device to be provisioned has been added to the network; obtaining identifying information of the device to be provisioned; accessing a stored configuration for the device based on the identifying information; and transmitting the configuration to the device for provisioning. Alternatively, a computer-readable medium is provided that stores instructions to perform a method to transmit a discovery communication to a trusted device, receive a communication originating at an administrative device including a configuration; and provision the device via reboot with the configuration. Alternatively, an apparatus is provided including a table of provisioning configurations, the table including a configuration for a device to be provisioned in a network and a provisioning module to retrieve the configuration of the device stored in the table of provisioning configurations based on identifying information received from a discovery communication. | 01-31-2013 |
20130054767 | AUTONOMOUS NETWORK DEVICE CONFIGURATION METHOD - An embodiment of the present invention comprises a method of configuring one or more target network devices for operation, that further comprises the steps of creating an object for deployment to a predetermined target network device, the object having configuration data for configuring the target network device, and at least one of identification data identifying the object, an autonomous encapsulated agent for executing necessary steps for installing the configuration data, identification data identifying the predetermined target network device, and authentication data for authenticating at least one of the predetermined target network device identification data and object identification data, transporting the object to the predetermined target network device, and the autonomous encapsulated agent begins an on-site process of installing the configuration data in the predetermined target network device. | 02-28-2013 |
20130111008 | NETWORK SERVICE MONITORING AT EDGE NETWORK DEVICE | 05-02-2013 |
20130246590 | AUTONOMOUS NETWORK DEVICE CONFIGURATION METHOD - An embodiment of the present invention comprises a method of configuring one or more target network devices for operation, that further comprises the steps of creating an object for deployment to a predetermined target network device, the object having configuration data for configuring the target network device, and at least one of identification data identifying the object, an autonomous encapsulated agent for executing necessary steps for installing the configuration data, identification data identifying the predetermined target network device, and authentication data for authenticating at least one of the predetermined target network device identification data and object identification data, transporting the object to the predetermined target network device, and the autonomous encapsulated agent begins an on-site process of installing the configuration data in the predetermined target network device. | 09-19-2013 |
20140359763 | Determination of Spoofing of a Unique Machine Identifier - In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed. | 12-04-2014 |