Hybrid SDN/legacy policy enforcement
First Claim
1. A computer-implemented method comprising:
- obtaining, by one or more processors, at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network, wherein the components of the hybrid network comprise a first component type and a second component type, wherein the first component type and the second component type are configured utilizing different protocols;
responsive to obtaining the requirement, generating, by the one or more processors, based on the requirement, a plan to configure at least one component of the first component type and at least one component of the second component type;
configuring, by the one or more processors, the at least one component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection; and
configuring, by the one or more processors, the at least one component of the second component type according to the second portion of the plan, wherein the at least one component of the first component type comprises a legacy component and the at least one component of the second component type comprises a software-defined networking component, and wherein the legacy component is a layer 3 component, wherein the configuring comprises;
transmitting, by the one or more processor, to a controller of components of the second component type in the hybrid network, a second portion of the plan, wherein the controller configures the at least one component of the second component type according to the second plan portion of the plan, upon receipt of the second portion of the plan.
4 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product configure elements of a hybrid network. The method may include a processor obtaining at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network; the components include a first component type and a second component type. After obtaining the requirement, the processor generates a plan to configure a component of the first component type and a component of the second component type. The processor configures the component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection. The processor configures the component of the second component type according to a second portion of the plan by transmitting this portion to a controller of components of the second component type in the hybrid network. The controller configures the component upon receipt of the portion.
16 Citations
16 Claims
-
1. A computer-implemented method comprising:
-
obtaining, by one or more processors, at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network, wherein the components of the hybrid network comprise a first component type and a second component type, wherein the first component type and the second component type are configured utilizing different protocols; responsive to obtaining the requirement, generating, by the one or more processors, based on the requirement, a plan to configure at least one component of the first component type and at least one component of the second component type; configuring, by the one or more processors, the at least one component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection; and configuring, by the one or more processors, the at least one component of the second component type according to the second portion of the plan, wherein the at least one component of the first component type comprises a legacy component and the at least one component of the second component type comprises a software-defined networking component, and wherein the legacy component is a layer 3 component, wherein the configuring comprises; transmitting, by the one or more processor, to a controller of components of the second component type in the hybrid network, a second portion of the plan, wherein the controller configures the at least one component of the second component type according to the second plan portion of the plan, upon receipt of the second portion of the plan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product comprising:
a non-transitory computer readable storage medium readable by one or more processors and storing instructions for execution by the one or more processors for performing a method comprising; obtaining, by the one or more processors, at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network, wherein the components of the hybrid network comprise a first component type and a second component type, wherein the first component type and the second component type are configured utilizing different protocols; responsive to obtaining the requirement, generating, by the one or more processors, based on the requirement, a plan to configure at least one component of the first component type and at least one component of the second component type; configuring, by the one or more processors, the at least one component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection; and configuring, by the one or more processors, the at least one component of the second component type according to the second portion of the plan, wherein the at least one component of the first component type comprises a legacy component and the at least one component of the second component type comprises a software-defined networking component, and wherein the legacy component is a layer 3 component, wherein the configuring comprises; transmitting, by the one or more processor, to a controller of components of the second component type in the hybrid network, a second portion of the plan, wherein the controller configures the at least one component of the second component type according to the second plan portion of the plan, upon receipt of the second portion of the plan. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A system comprising:
-
a memory; one or more processors in communication with the memory; and program instructions executable by the one or more processors via the memory to perform a method, the method comprising; obtaining, by the one or more processors, at a first controller communicatively coupled to components of a hybrid network, a requirement for the hybrid network, wherein the components of the hybrid network comprise a first component type and a second component type, wherein the first component type and the second component type are configured utilizing different protocols; responsive to obtaining the requirement, generating, by the one or moreprocessors, based on the requirement, a plan to configure at least one component of the first component type and at least one component of the second component type; configuring, by the one or more processors, the at least one component of the first component type according to a first portion of the plan by utilizing a security protocol over an unsecured connection; and configuring, by the one or more processors, the at least one component of the second component type according to the second portion of the plan, wherein the at least one component of the first component type comprises a legacy component and the at least one component of the second component type comprises a software-defined networking component, and wherein the legacy component is a layer 3 component, wherein the configuring comprises; transmitting, by the one or more processor, to a controller of components of the second component type in the hybrid network, a second portion of the plan, wherein the controller configures the at least one component of the second component type according to the second plan portion of the plan, upon receipt of the second portion of the plan.
-
Specification