Topology Aware Smart Merge
First Claim
1. A configuration change management method, comprising:
- receiving a configuration policy;
identifying a first network device relevant to the configuration policy;
identifying a second network device that is relevant to the configuration policy and topologically related to the first network device;
obtaining configuration data for the second network device, the configuration data representing a configuration of the second network device;
determining if the configuration data complies with the configuration policy; and
generating a command to update the configuration of the second network device to comply with the configuration policy if it is determined that the configuration data does not comply with the configuration policy.
10 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer readable media for managing the configuration of topologically related network devices are described. In general, devices that are “topologically related” are devices that are functionally coupled in some way (e.g., network switches sharing a common trunk line or network routers providing common router services in accordance with an established priority scheme). Specifically, techniques are disclosed for verifying or changing the configuration of a first network device based on the configuration of a second, topologically related, network device. Configuration policies (or rules) are described that are used to “bridge” the configuration of one device with that of another device.
43 Citations
26 Claims
-
1. A configuration change management method, comprising:
-
receiving a configuration policy; identifying a first network device relevant to the configuration policy; identifying a second network device that is relevant to the configuration policy and topologically related to the first network device; obtaining configuration data for the second network device, the configuration data representing a configuration of the second network device; determining if the configuration data complies with the configuration policy; and generating a command to update the configuration of the second network device to comply with the configuration policy if it is determined that the configuration data does not comply with the configuration policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A configuration change management method, comprising:
-
identifying a configuration policy; identifying a first network device relevant to the configuration policy; obtaining first configuration data for the first network device, the first configuration data indicating a configuration of the first network device; evaluating the first configuration data in accordance with the configuration policy; identifying a second network device relevant to the configuration policy and topologically related to the first network device; obtaining second configuration data for the second network device, the second configuration data indicating a configuration of the second network device; and attempting to update the configuration of the second network device in accordance with the configuration policy - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
-
23. A configuration audit method, comprising:
-
identifying a configuration policy; identifying a plurality of only topologically related network devices relevant to the configuration policy; evaluating the configuration policy for each of the plurality of topologically related network devices; and recording a configuration rule violation for each of the plurality of topologically related network devices whose configuration data does not conform to the configuration policy. - View Dependent Claims (24, 25, 26)
-
Specification