Techniques to Deliver Security and Network Policies to a Virtual Network Function
First Claim
3-1. The apparatus of claim 1, the policy agent to configure the VNF via a virtual switch.
1 Assignment
0 Petitions
Accused Products
Abstract
Examples may include techniques to securely provision, configure, and de-provision virtual network functions for a software defined network or a cloud infrastructure elements. A policy for a virtual network function may be received, at a secure execution partition of circuitry, and the virtual network function configured to implement the policy by the secure execution partition of the circuitry. The secure execution partition may connect to the virtual network function through a virtual switch and may cause the virtual network function to implement a network function based on the policy.
-
Citations
25 Claims
-
3-1. The apparatus of claim 1, the policy agent to configure the VNF via a virtual switch.
-
13. A method comprising:
-
receiving, at a secure execution partition, a policy for a virtual network function (VNF); and configuring the VNF to implement a network function based on the policy. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. At least one machine readable medium comprising a plurality of instructions that in response to being executed by a secure execution partition of circuitry located with a cloud infrastructure cause the circuitry to:
-
receive a policy for a virtual network function (VNF); validate the policy; and configure the VNF to implement a network function based on the policy. - View Dependent Claims (23, 24)
-
-
25. The at least one machine readable medium of claim 28, wherein the network function comprises a firewall, an intrusion prevention system, data loss prevention, load balancing, or network acceleration, a packet data network gateway, a mobile management entity, or a serving gateway.
Specification