$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Routing device having integrated MPLS-aware firewall with virtual security system support 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
출원번호 US-0271585 (2008-11-14)
등록번호 US-8316435 (2012-11-20)
발명자 / 주소
  • Varadhan, Kannan
  • Gomes, Joao Campelo F. N.
출원인 / 주소
  • Juniper Networks, Inc.
대리인 / 주소
    Shumaker & Sieffert, P.A.
인용정보 피인용 횟수 : 66  인용 특허 : 1

초록

An MPLS-aware firewall allows firewall security policies to be applied to MPLS traffic. The firewall, which may be integrated within a routing device, can be configured into multiple virtual security systems. The routing device provides a user interface by which a user specifies one or more zones to

대표청구항

1. A network router comprising: a plurality of interfaces configured to send and receive packets;a firewall integrated within the network router, the firewall configured to provide a plurality of virtual security systems to apply stateful firewall services to the packets, each of the virtual securit

이 특허에 인용된 특허 (1)

  1. Subramanian, Siva; Lavian, Tal I., Distributed computation in network devices.

이 특허를 인용한 특허 (66)

  1. Abdallah, Mohammad, Accelerated code optimizer for a multiengine microprocessor.
  2. Abdallah, Mohammad A., Apparatus and method for processing an instruction matrix specifying parallel and dependent operations.
  3. Ringen, Deron, Architecture for network management in a multi-service network.
  4. Ringen, Deron, Architecture for network management in a multi-service network.
  5. Abdallah, Mohammad A., Cache storing data fetched by address calculating load instruction with label used as associated name for consuming instruction to refer.
  6. Chen, Yueh-Zen; Xu, Wilson; Gill, Monty Sher, Configuring and managing remote security devices.
  7. Barnes, Philip Lionel; Chin, Hon Wah; Davidson, Howard L.; Hallman, Kimberly D. A.; Hyde, Roderick A.; Ishikawa, Muriel Y.; Kare, Jordin T.; Lee, Brian; Lord, Richard T.; Lord, Robert W.; Mundie, Craig J.; Myhrvold, Nathan P.; Pasch, Nicholas F.; Rudder, Eric D.; Tegreene, Clarence T.; Tremblay, Marc; Tuckerman, David B.; Whitmer, Charles; Wood, Jr., Lowell L., Cost-effective mobile connectivity protocols.
  8. Barnes, Philip Lionel; Chin, Hon Wah; Davidson, Howard L.; Hallman, Kimberly D. A.; Hyde, Roderick A.; Ishikawa, Muriel Y.; Kare, Jordin T.; Lee, Brian; Lord, Richard T.; Lord, Robert W.; Mundie, Craig J.; Myhrvold, Nathan P.; Pasch, Nicholas F.; Rudder, Eric D.; Tegreene, Clarence T.; Tremblay, Marc; Tuckerman, David B.; Whitmer, Charles; Wood, Jr., Lowell L., Cost-effective mobile connectivity protocols.
  9. Barnes, Philip Lionel; Chin, Hon Wah; Davidson, Howard L.; Hallman, Kimberly D. A.; Hyde, Roderick A.; Ishikawa, Muriel Y.; Kare, Jordin T.; Lee, Brian; Lord, Richard T.; Lord, Robert W.; Mundie, Craig J.; Myhrvold, Nathan P.; Pasch, Nicholas F.; Rudder, Eric D.; Tegreene, Clarence T.; Tremblay, Marc; Tuckerman, David B.; Whitmer, Charles; Wood, Jr., Lowell L., Cost-effective mobile connectivity protocols.
  10. Barnes, Philip Lionel; Chin, Hon Wah; Davidson, Howard L.; Hallman, Kimberly D. A.; Hyde, Roderick A.; Ishikawa, Muriel Y.; Kare, Jordin T.; Lee, Brian; Lord, Richard T.; Lord, Robert W.; Mundie, Craig J.; Myhrvold, Nathan P.; Pasch, Nicholas F.; Rudder, Eric D.; Tegreene, Clarence T.; Tremblay, Marc; Tuckerman, David B.; Whitmer, Charles; Wood, Jr., Lowell L., Cost-effective mobile connectivity protocols.
  11. Barnes, Philip Lionel; Chin, Hon Wah; Davidson, Howard L.; Hallman, Kimberly D. A.; Hyde, Roderick A.; Ishikawa, Muriel Y.; Kare, Jordin T.; Lee, Brian; Lord, Richard T.; Lord, Robert W.; Mundie, Craig J.; Myhrvold, Nathan P.; Pasch, Nicholas F.; Rudder, Eric D.; Tegreene, Clarence T.; Tremblay, Marc; Tuckerman, David B.; Whitmer, Charles; Wood, Jr., Lowell L., Cost-effective mobile connectivity protocols.
  12. Abdallah, Mohammad, Decentralized allocation of resources and interconnect structures to support the execution of instruction sequences by a plurality of engines.
  13. Raman, Raj; Dubrovsky, Alex; Karlcut, Akbal Singh, Dynamic bypass of TLS connections matching exclusion list in DPI-SSL in a NAT deployment.
  14. Abdallah, Mohammad, Executing instruction sequence code blocks by using virtual cores instantiated by partitionable engines.
  15. Abdallah, Mohammad, Interconnect system to support the execution of instruction sequences by a plurality of partitionable engines.
  16. Abdallah, Mohammad, Memory fragments for supporting code block execution by using virtual cores instantiated by partitionable engines.
  17. Morris, James, Method and system for sharing labeled information between different security realms.
  18. Abdallah, Mohammad, Method for dependency broadcasting through a block organized source view data structure.
  19. Abdallah, Mohammad, Method for dependency broadcasting through a source organized source view data structure.
  20. Abdallah, Mohammad, Method for emulating a guest centralized flag architecture by using a native distributed flag architecture.
  21. Abdallah, Mohammad, Method for executing multithreaded instructions grouped into blocks.
  22. Abdallah, Mohammad, Method for executing multithreaded instructions grouped into blocks.
  23. Abdallah, Mohammad, Method for implementing a reduced size register view data structure in a microprocessor.
  24. Abdallah, Mohammad A., Method for implementing a reduced size register view data structure in a microprocessor.
  25. Abdallah, Mohammad, Method for performing dual dispatch of blocks and half blocks.
  26. Abdallah, Mohammad, Method for performing dual dispatch of blocks and half blocks.
  27. Abdallah, Mohammad, Method for populating a source view data structure by using register template snapshots.
  28. Abdallah, Mohammad, Method for populating and instruction view data structure by using register template snapshots.
  29. Abdallah, Mohammad, Method for populating register view data structure by using register template snapshots.
  30. Ling, Hui; Chen, Zhong, Method to enable deep packet inspection (DPI) in openflow-based software defined network (SDN).
  31. Ling, Hui; Chen, Zhong, Method to enable deep packet inspection (DPI) in openflow-based software defined network (SDN).
  32. Ling, Hui; Chen, Zhong, Method to enable deep packet inspection (DPI) in openflow-based software defined network (SDN).
  33. Ling, Hui; Chen, Zhong, Method to enable deep packet inspection (DPI) in openflow-based software defined network (SDN).
  34. Abdallah, Mohammad; Rao, Ravishankar; Avudaiyappan, Karthikeyan, Methods, systems and apparatus for predicting the way of a set associative cache.
  35. Abdallah, Mohammad; Rao, Ravishankar; Avudaiyappan, Karthikeyan, Methods, systems and apparatus for predicting the way of a set associative cache.
  36. Abdallah, Mohammad; Rao, Ravishankar; Avudaiyappan, Karthikeyan, Methods, systems and apparatus for predicting the way of a set associative cache.
  37. Abdallah, Mohammad; Groen, Ankur; Gunadi, Erika; Singh, Mandeep; Rao, Ravishankar, Methods, systems and apparatus for supporting wide and efficient front-end operation with guest-architecture emulation.
  38. Kardashov, Timor; Kovalenko, Maxim; Daniel, Haim; Plotnikov, Anatoli, Network discovery apparatus.
  39. Leung, Siu-Wang; Wang, Song; Chen, Yueh-Zen, Policy enforcement using host information profile.
  40. Grant, Clinton, Probabilistic flow management.
  41. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for allocating communication services cost in wireless communications.
  42. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications.
  43. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications.
  44. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications.
  45. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications.
  46. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications.
  47. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Reudink, Douglas O.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications by conditionally authorizing a charge to an account of a third party.
  48. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating broader access in wireless communications responsive to charge authorization statuses.
  49. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating charge-authorized connectivity in wireless communications.
  50. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for facilitating third party authorization for a rooted communication device in wireless communications.
  51. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Protocols for providing wireless communications connectivity maps.
  52. Abdallah, Mohammad, Register file segments for supporting code block execution by using virtual cores instantiated by partitionable engines.
  53. Abdallah, Mohammad, Register file segments for supporting code block execution by using virtual cores instantiated by partitionable engines.
  54. Varadhan, Kannan; Gomes, Joao Campelo F. N., Routing device having integrated MPLS-aware firewall.
  55. Varadhan, Kannan; Frailong, Jean-Marc; Venkatramani, Anjan, Scalable security services for multicast in a router having integrated zone-based firewall.
  56. Liu, Yun Feng; Chen, Zhong; Xiang, Eric; Yang, Yanjun, Secure neighbor discovery (SEND) using pre-shared key.
  57. Liu, Yun Feng; Chen, Zhong; Xiang, Eric; Yang, Yanjun, Secure neighbor discovery (SEND) using pre-shared key.
  58. Liu, Yun Feng; Chen, Zhong; Xiang, Eric; Yang, Yanjun, Secure neighbor discovery (SEND) using pre-shared key.
  59. Abdallah, Mohammad, Single cycle multi-branch prediction including shadow cache for early far branch prediction.
  60. Kumar, Arkesh; Ramachandra, Pratap, Systems and methods for a VPN ICA proxy on a multi-core system.
  61. Kumar, Arkesh; Ramachandra, Pratap, Systems and methods for a VPN ICA proxy on a multi-core system.
  62. Carney, Kevin S, Systems and methods for broadband backup.
  63. Carney, Kevin S., Systems and methods for broadband backup.
  64. Hyde, Roderick A.; Levien, Royce A.; Lord, Richard T.; Lord, Robert W.; Malamud, Mark A.; Tegreene, Clarence T., Systems and methods for communication management.
  65. Morales, Giovanni M. Suarez, Systems for securely connecting to remote networks.
  66. Fernando, Rex; Rao, Dhananjaya; Guichard, Jim; Quinn, Paul, Virtual service topologies in virtual private networks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로