白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Self-driven and adaptable multi-vBNG management orchestration

專利號
US11159378B2
公開日期
2021-10-26
申請人
Juniper Networks, Inc.(US CA Sunnyvale)
發(fā)明人
Sunil Madhaorao Gandhewar; Nirmal Antony X
IPC分類
H04L12/24; H04L12/803; H04L12/891; H04L29/06; H04L12/26; H04W12/06; H04L12/801; H04L29/08
技術(shù)領(lǐng)域
vbng,bng,nicm,subscriber,nrm,nlb,nsdb,instance,instances,network
地域: CA CA Sunnyvale

摘要

A broadband network gateway (BNG) controller is described that includes a network subscriber database (NSDB) and one or more core applications. The NSDB is configured to store vBNG instance information for one or more subscriber devices. The vBNG instance information specifies vBNG instances operable by one or more edge routers. The vBNG instances are configured to receive requests to access service provider services from the one or more subscriber devices and to selectively authenticate the one or more subscriber devices for network services based on authentication information included in the requests to access services provider services. The one or more core applications include a network instance and configuration manager (NICM). The NICM is configured to modify the vBNG instance information at the NSDB to include an additional vBNG instance and to output, to an edge router, an instruction to generate the additional vBNG instance at the edge router.

說明書

UNSM 53 may manage network wide distributed denial-of-service (DDoS) detection and protection. In some systems, security is considered only at the vBNG instance level. Network-level management of DDoS detection may help to truly mitigating the DDoS attack. In the example of FIG. 2, the security of the entire network may be considered at one centralized place, for instance, UNSM 53. With the data available for the entire network, UNSM 53 may correlate data for mitigating the DDoS attack. UNSM 53 may perform one or more functions of an Intrusion Detection System (IDS) by correlating the security data across the vBNG instances. UNSM 53 may identify suspicious flow at the entire network level and may apply security threat and mitigation techniques across the vBNG instances. UNSM 53 may identify a security threat from one vBNG instance and apply mitigation automatically across all vBNG instances. For example, UNSM 53 may exchange (e.g., receive and/or output) security related information with each vBNG instance of vBNG instances 57 and 58.

權(quán)利要求

1
微信群二維碼
意見反饋