×

VENDOR-INDEPENDENT NETWORK CONFIGURATION TOOL

  • US 20090216867A1
  • Filed: 02/04/2009
  • Published: 08/27/2009
  • Est. Priority Date: 02/15/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • connecting, with a computing device that executes a network configuration tool, to a first network device from a first vendor, wherein the first network device stores a first set of configuration information;

    adaptively extracting, with the network configuration tool, the first set of configuration information stored to the first network device by issuing vendor-specific commands to and receiving, in response to the commands, the first set of configuration information from a first management software interface presented by the first network device;

    parsing, with the network configuration tool, from the first set of configuration information a first tag, wherein the first tag_defines a configuration property for the first network device;

    connecting, with the computing device, to a second network device from a second vendor, wherein the second network device stores a second set of configuration information;

    adaptively extracting, with the network configuration tool, the second set of configuration information stored to the second network device by issuing commands to and receiving, in response to the commands, the second set of configuration information from a second management software interface presented by the second network device;

    parsing, with the network configuration tool, from the second set of configuration information a second tag, wherein the second tag_defines a configuration property for the second network device;

    determining, with the network device, a relationship between the first and second tags; and

    presenting, with the network device, aggregate configuration information in a manner that organizes a least a portion of the first and second sets of configuration information based primarily on the determined relationships between the first and second tags and secondarily on the network devices from which the first and second sets of configuration information was received.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×