SYSTEMS INVOLVING FIREWALL OF VIRTUAL MACHINE TRAFFIC AND METHODS OF PROCESSING INFORMATION ASSOCIATED WITH SAME
First Claim
1. A method for handling traffic over a network regarding communications between one or more virtual machines and the network, the method comprising:
- enabling, via a compute node, a firewall between the one or more virtual machine and at least a portion of a network, the firewall configured to detect undesired traffic based on a list of rules or an Ethernet bridge table associated with communication between the one or more virtual machines and the network; and
locking/stopping/blocking a virtual machine in response to the firewall detecting undesired traffic.
7 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed involving compute nodes configured to define and/or otherwise processing information associated with one or more virtual machines. In one exemplary implementation, a compute node may be configured to enable a firewall between the virtual machine and at least a portion of a network. Moreover, the firewall may be configured to detect undesired traffic based on a list of rules or an Ethernet bridge table associated with communication between the virtual machine and the network. Various features may also relate to the compute node being configured to lock the virtual machine in response to the firewall detecting undesired traffic associated with the virtual machine.
-
Citations
26 Claims
-
1. A method for handling traffic over a network regarding communications between one or more virtual machines and the network, the method comprising:
-
enabling, via a compute node, a firewall between the one or more virtual machine and at least a portion of a network, the firewall configured to detect undesired traffic based on a list of rules or an Ethernet bridge table associated with communication between the one or more virtual machines and the network; and locking/stopping/blocking a virtual machine in response to the firewall detecting undesired traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for handling traffic over a network regarding communications between one or more virtual machines and the network, the method comprising:
-
processing information related to enabling or defining, via a compute node, a firewall between the one or more virtual machine and at least a portion of a network; processing information related to detecting, via the firewall, undesired traffic based on a list of rules or an Ethernet bridge table associated with communication between the one or more virtual machines and the network; and processing information related to locking/stopping/blocking a virtual machine in response to the detection of undesired traffic. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. An system comprising:
a compute node comprising a memory and/or a processing component, the computer node also comprising or having access to a list of rules or an Ethernet bridge table, the compute node configured to; define one or more virtual machines; enable a firewall between at least one virtual machine and at least a portion of a network, the firewall being configured to detect undesired traffic based on a list of rules or an Ethernet bridge table associated with communication between the at least one virtual machine and the at least a portion of the network; and lock, stop or block a virtual machine in response to the firewall detecting undesired traffic. - View Dependent Claims (23, 24, 25, 26)
Specification