会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 10. 发明申请
    • SYSTEM AND METHOD FOR SOFTWARE DEFINED DEPLOYMENT OF SECURITY APPLIANCES USING POLICY TEMPLATES
    • 使用政策模板定义安全设备部署的软件的系统和方法
    • US20160234250A1
    • 2016-08-11
    • US14618943
    • 2015-02-10
    • International Business Machines Corporation
    • Paul Anthony ASHLEYStefan BergerTian Cheng LiuHe Yuan HuangSreekanth Ramakrishna IyerAshish KunduNataraj NagaratnamDimitrios PendarakisRonald Becker Williams
    • H04L29/06
    • H04L63/20H04L63/105
    • A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed. A security template library is accessed to select a security template for each network appliance that will implement the one or more security policy for that network appliance to be deployed.
    • 一种方法包括从可由计算机访问的存储器检索包括工作负载定义文档的文档,所述工作负载定义文档定义预期的虚拟配置以包括至少一个虚拟机和至少一个要与所述虚拟机中的至少一个相关联的网络设备 在预期的虚拟配置中,每个网络设备分别在预期的虚拟配置中起作用以在其到达预期的虚拟机之前转换,检查,过滤或以其他方式操纵所有网络业务,以用于除了数据分组转发之外的目的 虚拟配置。 解析工作负载定义文档以提取每个网络设备的属性,包括要应用于每个网络设备的一个或多个安全策略。 从与要部署的任何网络设备的任何安全策略相关的解析的工作负载定义文档中提取配置数据。 访问安全模板库以为每个网络设备选择一个安全模板,以实现要部署的该网络设备的一个或多个安全策略。