Please download the dossier by clicking on the dossier button x
×

Facilitating enforcement of security policies by and on behalf of a perimeter network security device by providing enhanced visibility into interior traffic flows

  • US 10,038,671 B2
  • Filed: 12/31/2016
  • Issued: 07/31/2018
  • Est. Priority Date: 12/31/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a network security appliance separating a private network from an external network and controlling external network traffic that is transmitted between the private network and the external network, internal network information collected by a plurality of Layer 2 or Layer 3 (Layer 2/3) network devices of the private network that communicatively couple a plurality of internal host devices of the private network and the network security appliance, wherein the plurality of Layer 2/3 network devices switch/route internal network traffic among the plurality of internal host devices without the internal network traffic passing through or being observed by the network security appliance and switch/route the external network traffic between the network security appliance and the plurality of internal host devices, wherein the internal network information includes one or more of (i) information regarding internal network flows and (ii) information extracted from forwarding or routing tables of one or more of the plurality of Layer 2/3 network devices;

    deriving, by the network security appliance, a topology of the private network based on the internal network information; and

    identifying, by the network security appliance, existence of potential malicious activity involving an internal host device of the plurality of internal host devices by evaluating the internal network information;

    responsive to said identifying;

    creating, by the network security appliance, a traffic policy to control transmission of network traffic originated by or directed to the internal host device; and

    causing, by the network security appliance, the traffic policy to be enforced.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×