PROVIDING APPLICATION VISIBILITY FOR MICRO-SEGMENTATION OF A NETWORK DEPLOYMENT
First Claim
Patent Images
1. A method of creating micro-segmentation policies for a network, the method comprising:
- identifying a set of network nodes as seed nodes;
monitoring network packet traffic flows for the seed nodes to collect traffic flow information;
identifying a set of related nodes for the set of seed nodes based on the collected network flow information; and
analyzing the collected network flow information to identify micro-segmentation policies for the network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of creating micro-segmentation policies for a network is provided. The method identifies a set of network nodes as seed nodes. The method monitors network packet traffic flows for the seed nodes to collect traffic flow information. The method identifies a set of related nodes for the set of seed nodes based on the collected network flow information. The method analyzes the collected network flow information to identify micro-segmentation policies for the network.
66 Citations
20 Claims
-
1. A method of creating micro-segmentation policies for a network, the method comprising:
-
identifying a set of network nodes as seed nodes; monitoring network packet traffic flows for the seed nodes to collect traffic flow information; identifying a set of related nodes for the set of seed nodes based on the collected network flow information; and analyzing the collected network flow information to identify micro-segmentation policies for the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium storing a program for creating micro-segmentation policies for a network, the program executable by a processing unit, the program comprising sets of instructions for:
-
identifying a set of network nodes as seed nodes; monitoring network packet traffic flows for the seed nodes to collect traffic flow information; identifying a set of related nodes for the set of seed nodes based on the collected network flow information; and analyzing the collected network flow information to identify micro-segmentation policies for the network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification