System and method for securing virtualized networks
First Claim
1. A method of securing a dynamic virtualized network, the method comprising:
- learning, with a network automation device, a current network policy of the dynamic virtualized network by analyzing membership requests communicated to the dynamic virtualized network, wherein a membership request is selected from the group consisting of a request to join the dynamic virtualized network and a request to drop from the dynamic virtualized network, the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network, the current network policy includes a first plurality of network policy elements, each of the first plurality of network policy elements identifies an authorized endpoint in the dynamic virtualized network, and the layer 3 physical network includes a plurality of network access devices;
determining a network security policy for the dynamic virtualized network from the current network policy, wherein the network security policy includes one or more second network policy elements that is a different network policy element than one of the plurality of first network policy elements of the current network policy, and each of the one or more second network policy network elements adds an additional policy on how network traffic in the dynamic virtualized network is processed by a port of one of the plurality of network access devices; and
applying the network security policy to each network access device of the plurality of network access devices that is affected by the network security policy.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus that secures a dynamic virtualized network is described. In an exemplary embodiment, a device learns a current network policy of the dynamic virtualized network, where the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network. In addition, the current network policy includes multiple network policy elements, where each of the multiple network policy elements identifies an authorized endpoint in the dynamic virtualized network. Furthermore, the layer 3 physical network includes multiple network access devices. The device further determines a network security policy for the dynamic virtualized network from the current network policy. The network security policy includes one or more second network policy elements that are a different network policy element than one of the multiple network policy elements of the current network policy. In addition, each of the one or more second network policy network elements adds an additional policy on how network traffic is processed in the dynamic virtualized network by a port of one of the plurality of network access devices. The device further applies the network security policy to each network access device that is affected by the network security policy.
-
Citations
31 Claims
-
1. A method of securing a dynamic virtualized network, the method comprising:
-
learning, with a network automation device, a current network policy of the dynamic virtualized network by analyzing membership requests communicated to the dynamic virtualized network, wherein a membership request is selected from the group consisting of a request to join the dynamic virtualized network and a request to drop from the dynamic virtualized network, the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network, the current network policy includes a first plurality of network policy elements, each of the first plurality of network policy elements identifies an authorized endpoint in the dynamic virtualized network, and the layer 3 physical network includes a plurality of network access devices; determining a network security policy for the dynamic virtualized network from the current network policy, wherein the network security policy includes one or more second network policy elements that is a different network policy element than one of the plurality of first network policy elements of the current network policy, and each of the one or more second network policy network elements adds an additional policy on how network traffic in the dynamic virtualized network is processed by a port of one of the plurality of network access devices; and applying the network security policy to each network access device of the plurality of network access devices that is affected by the network security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method to test a network policy of a dynamic virtualized network, the method comprising:
-
learning a network policy of the dynamic virtualized network by analyzing membership request communicated to the dynamic virtualized network, wherein a membership request is selected from the group consisting of a request to join the dynamic virtualized network and a request to drop from the dynamic virtualized network, the dynamic virtualized network is a virtualized layer 2 network that is overlaid over a layer 3 physical network, the network policy includes a first plurality of network policy elements, each of the first plurality of network policy elements identifies an authorized endpoint in the dynamic virtualized network, and the layer 3 physical network includes a plurality of network access devices; injecting test traffic at one of the plurality of network access devices, the test traffic configured to test a security of the dynamic virtualized network by being communicated in the dynamic virtualized network; detecting an appearance of the test traffic at different one of the plurality of network access devices; and determining if the appearance of the test traffic at the different one of the plurality of network access devices is in violation of the network policy. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium having executable instructions to cause one or more processing units to perform a method of securing a dynamic virtualized network, the method comprising:
-
learning a current network policy of the dynamic virtualized network by analyzing membership request communicated to the dynamic virtualized network, wherein a membership request is selected form the group consisting of a request to join the dynamic virtualized network and a request to drop from the dynamic virtualized network, the dynamic virtualized network is a virtualized layer 2 network that is overlaid on a layer 3 physical network, the current network policy includes a first plurality of network policy elements, each of the first plurality of network policy elements identifies an authorized endpoint in the dynamic virtualized network, and the layer 3 physical network includes a plurality of network access devices; determining a network security policy for the dynamic virtualized network from the current network policy, wherein the network security policy includes one or more second network policy elements that is a different network policy element than one of the plurality of first network policy elements of the current network policy, and each of the one or more second network policy network elements adds an additional policy on how network traffic in the dynamic virtualized network is processed by a port of one of the plurality of network access devices; and applying the network security policy to each network access device of the plurality of network access devices that is affected by the network security policy. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 31)
-
-
26. A system to of secure a dynamic virtualized network, the system comprising:
-
a plurality of network access devices; a layer 3 physical network interconnecting the plurality of physical network access devices; a dynamic virtualized network, wherein the dynamic virtualized network is a virtualized layer 2 network that is overlaid on the layer 3 physical network, the dynamic virtualized network includes the current network policy that further includes a first plurality of network policy elements, and each of the first plurality of network policy elements identifies an authorized endpoint in the dynamic virtualized network; and a network automation element that learns the current network policy by analyzing membership request communicated to the dynamic virtualized network, wherein a membership request is selected from the group consisting of a request to join the dynamic virtualized network and a request to drop from the dynamic virtualized network, determines a network security policy for the dynamic virtualized network from the current network policy, wherein the network security policy includes one or more second network policy elements that are a different network policy element than one of the plurality of first network policy elements of the current network policy, and each of the one or more second network policy network elements adds an additional policy on how network traffic in the dynamic virtualized network is processed by a port of one of the plurality of physical network access devices, and applies the network security policy to each physical network access device of the plurality of network access devices that is affected by the network security policy. - View Dependent Claims (27, 28, 29, 30)
-
Specification