白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Self-driven and adaptable multi-vBNG management orchestration

專利號(hào)
US11159378B2
公開(kāi)日期
2021-10-26
申請(qǐng)人
Juniper Networks, Inc.(US CA Sunnyvale)
發(fā)明人
Sunil Madhaorao Gandhewar; Nirmal Antony X
IPC分類
H04L12/24; H04L12/803; H04L12/891; H04L29/06; H04L12/26; H04W12/06; H04L12/801; H04L29/08
技術(shù)領(lǐng)域
vbng,bng,nicm,subscriber,nrm,nlb,nsdb,instance,instances,network
地域: CA CA Sunnyvale

摘要

A broadband network gateway (BNG) controller is described that includes a network subscriber database (NSDB) and one or more core applications. The NSDB is configured to store vBNG instance information for one or more subscriber devices. The vBNG instance information specifies vBNG instances operable by one or more edge routers. The vBNG instances are configured to receive requests to access service provider services from the one or more subscriber devices and to selectively authenticate the one or more subscriber devices for network services based on authentication information included in the requests to access services provider services. The one or more core applications include a network instance and configuration manager (NICM). The NICM is configured to modify the vBNG instance information at the NSDB to include an additional vBNG instance and to output, to an edge router, an instruction to generate the additional vBNG instance at the edge router.

說(shuō)明書(shū)

Examples of security related information may include, but are not limited to, for example: (1) a configuration template indicating a security configuration profile which is generated by UNSM 53 to indicate one or more malware programs identified by a physical BNG and/or vBNG that are to be denied download or open access; (2) a configuration template indicating a security configuration profile which is generated by UNSM 53 to indicate one or more threatening re-direct sites identified by a physical BNG and/or a vBNG that are to be quarantined; (3) a configuration template indicating a security configuration profile which is generated by UNSM 53 to indicate one or more sites identified by a physical BNG and/or a vBNG to be quarantined; (4) a configuration template indicating a security configuration profile which is generated by UNSM 53 to indicate ransomeware sites identified by a physical BNG and/or a vBNG to be quarantined; and (5) a configuration template indicating a security configuration profile which is generated by UNSM 53 to indicate traffic that is tapped through LI (Lawful Intercept). Such collected UNSM data may be run through artificial intelligence. In some examples, such collected UNSM data may be used by data science to identify criminal activities.

權(quán)利要求

1
微信群二維碼
意見(jiàn)反饋