Selection and storage of policies in network management
12 Assignments
0 Petitions
Accused Products
Abstract
User interface and policy loading aspects of a policy-based, outsourced, network management system. In one aspect, a user selects policies using a graphical user interface (GUI) with a two paned window having a tree view of the policies in one pane. In another aspect, the policies are (1) created in the GUI format (e.g., XML), (2) sent over a network (e.g., the internet) to a service center in the same format, and (3) are loaded, manipulated and stored in the same format. In another aspect, the initial loading of the policies is done using a bulk loader in a logic layer. In another aspect, the logic layer also includes a configuration checker which handles changes or additions to policies in a finished network management system. Any aspects of the new or changed policy that are inconsistent with the finished system are parsed and stripped out. In another aspect, where the details of a new policy or change aren'"'"'t specified, a base configuration creator creates a policy with minimal attributes. In another aspect, the logic layer also contains a device control console, which allows bypassing the policy creating and configuring to allow a user to directly access a device for configuration.
54 Citations
21 Claims
-
1-16. -16. (canceled)
-
17. A method of accessing a network device under control of a network management system, the method comprising:
-
disengaging the network device from the network management system so that the network device is not under the control of the network management system without disrupting the control of a plurality of other network devices being controlled by the network management system;
thereafter establishing a communication link to the network device; and
thereafter issuing commands to the network device via the communication link to control the network device. - View Dependent Claims (18, 19)
-
-
20. A method of remotely accessing a network device under control of a network management system, using a telnet proxy tool, the method of operating said telnet proxy tool comprising:
-
authenticating a user with a login and password registered with said network management system;
disengaging the network device from the network management system so that the network device is not under the control of the network management system without disrupting the control of a plurality of other network devices being controlled by the network management system;
thereafter establishing an encrypted communication link to the network device;
limiting said communication link to a single network device;
providing a limited set of commands for said user to use with the network device via the communication link;
eliminating said communication link after completion of a session by said user.
-
-
21. (canceled)
Specification