CLOUD-BASED SECURITY POLICY CONFIGURATION
First Claim
Patent Images
1. A method comprising:
- logging into a cloud account by a first network appliance;
fetching from the cloud account, by the first network appliance, one or more security parameters shared by a second network appliance to the cloud account;
automatically creating, by the first network appliance, a security policy that controls a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for configuring security policies based on cloud are provided. According to one embodiment, security parameters are shared on cloud by security devices. A first network appliance may fetch one or more security parameters shared by a second network appliance from a cloud account. Then the first network appliance automatically creates a security policy that controlling a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters.
143 Citations
32 Claims
-
1. A method comprising:
-
logging into a cloud account by a first network appliance; fetching from the cloud account, by the first network appliance, one or more security parameters shared by a second network appliance to the cloud account; automatically creating, by the first network appliance, a security policy that controls a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
logging into a cloud account by a first network appliance; sharing, by the first network appliance, one or more security parameters with a second network appliance by storing the one or more security parameters within the cloud account; automatically creating, by the first network appliance, a security policy that controls a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer system comprising:
-
non-transitory storage device having tangibly embodied therein instructions representing a security application; and one or more processors coupled to the non-transitory storage device and operable to execute the security application to perform a method comprising; logging into a cloud account by a first network appliance; fetching by the first network appliance, by the first network appliance, one or more security parameters shared by a second network appliance to the cloud account; automatically creating, by the first network appliance, a security policy that controls a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer system comprising:
-
non-transitory storage device having tangibly embodied therein instructions representing a security application; and one or more processors coupled to the non-transitory storage device and operable to execute the security application to perform a method comprising; logging into a cloud account by a first network appliance; sharing, by the first network appliance, one or more security parameters with a second network appliance by storing the one or more security parameters within the cloud account; automatically creating, by the first network appliance, a security policy that controls a connection between the first network appliance and the second network appliance based at least in part on the one or more security parameters. - View Dependent Claims (29, 30, 31, 32)
-
Specification