Network configuration manager

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C726S004000, C726S005000, C726S017000, C713S152000

Reexamination Certificate

active

07150037

ABSTRACT:
A policy engine generates configlets that are vendor-neutral, vendor-specific or both, based on a selected target level and a selected device/device group. A translator translates and combines the configlets to form vendor-dependent configuration files. The policy engine generates the configlets using policies associated with the selected target level and its sub-target levels, as defined by a target level hierarchy. A policy includes at least a condition, and an action which the policy engine performs if the condition is true. In performing the action, the policy engine typically writes to at least a partial configlet. A policy may further include a verification clause, which is used to verify a running configuration. Policy dependencies may also be defined such that where a second policy is dependent on a first policy, the second policy must be evaluated after the first policy. This is necessary, where, for example, the first policy generates and stores a value to be used by the second policy. Policies are small programs. A configlet hierarchy is defined, such that a child configlet inherits properties which it does not define from its parent. A mapping function maps infrastructure data in a first format to a second format, so that the second format is recognizable by the policy engine. A loader batches, schedules and loads a configuration file to its intended device. Upon replacing a first device using a first configuration format with a second device using a second configuration format, the first device's configuration is read in or uploaded and reverse-translated into configlets. The configlets are then translated into a configuration formatted for the second device. The system retains device logins and passwords in encrypted format. A user desiring to connect to a device must log in to the system instead. The system in turn logs in or connects to the device and passes information back and forth between the user and the device, as if the user were logged directly into the device.

REFERENCES:
patent: 4991089 (1991-02-01), Shorter
patent: 5109486 (1992-04-01), Seymour
patent: 5159685 (1992-10-01), Kung
patent: 5442791 (1995-08-01), Wrabetz et al.
patent: 5475819 (1995-12-01), Miller et al.
patent: 5491820 (1996-02-01), Belove et al.
patent: 5519704 (1996-05-01), Farinacci et al.
patent: 5557748 (1996-09-01), Noris
patent: 5581764 (1996-12-01), Fitzgerald et al.
patent: 5724509 (1998-03-01), Starkweather et al.
patent: 5726883 (1998-03-01), Levine et al.
patent: 5751967 (1998-05-01), Raab et al.
patent: 5764955 (1998-06-01), Doolan
patent: 5784702 (1998-07-01), Greenstein et al.
patent: 5787246 (1998-07-01), Lichtman et al.
patent: 5796732 (1998-08-01), Mazzola et al.
patent: 5819028 (1998-10-01), Manghirmalani et al.
patent: 5832503 (1998-11-01), Malik et al.
patent: 5838918 (1998-11-01), Prager et al.
patent: 5842040 (1998-11-01), Hughes et al.
patent: 5852740 (1998-12-01), Estes
patent: 5872928 (1999-02-01), Lewis et al.
patent: 5884028 (1999-03-01), Kindell et al.
patent: 5889953 (1999-03-01), Thebaut et al.
patent: 5920701 (1999-07-01), Miller et al.
patent: 5944782 (1999-08-01), Noble et al.
patent: 5948065 (1999-09-01), Eilert et al.
patent: 5956341 (1999-09-01), Galand et al.
patent: 5961594 (1999-10-01), Bouvier et al.
patent: 5968122 (1999-10-01), Schlosser et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974236 (1999-10-01), Sherman
patent: 5980078 (1999-11-01), Krivoshein et al.
patent: 5999948 (1999-12-01), Nelson et al.
patent: 6006035 (1999-12-01), Nabahi
patent: 6016306 (2000-01-01), Le Boudec et al.
patent: 6023586 (2000-02-01), Gaisford et al.
patent: 6028846 (2000-02-01), Cain
patent: 6041347 (2000-03-01), Harsham et al.
patent: 6049828 (2000-04-01), Dev et al.
patent: 6055568 (2000-04-01), Adams
patent: 6097697 (2000-08-01), Yao et al.
patent: 6098094 (2000-08-01), Barnhouse et al.
patent: 6098101 (2000-08-01), Sears
patent: 6098108 (2000-08-01), Sridhar et al.
patent: 6101508 (2000-08-01), Wolff
patent: 6104700 (2000-08-01), Haddock et al.
patent: 6105069 (2000-08-01), Franklin et al.
patent: 6108699 (2000-08-01), Moiin
patent: 6108703 (2000-08-01), Leighton et al.
patent: 6122664 (2000-09-01), Boukobza et al.
patent: 6128729 (2000-10-01), Kimball et al.
patent: 6131118 (2000-10-01), Stupek, Jr. et al.
patent: 6131119 (2000-10-01), Fukui
patent: 6154776 (2000-11-01), Martin
patent: 6167445 (2000-12-01), Gai et al.
patent: 6170009 (2001-01-01), Mandal et al.
patent: 6170011 (2001-01-01), Macleod Beck et al.
patent: 6182094 (2001-01-01), Humpleman et al.
patent: 6198479 (2001-03-01), Humpleman et al.
patent: 6202090 (2001-03-01), Simone
patent: 6243747 (2001-06-01), Lewis et al.
patent: 6260072 (2001-07-01), Rodriguez-Moral
patent: 6269398 (2001-07-01), Leong et al.
patent: 6292889 (2001-09-01), Fitzgerald et al.
patent: 6349306 (2002-02-01), Malik et al.
patent: 6356955 (2002-03-01), Hollberg et al.
patent: 6363411 (2002-03-01), Dugan et al.
patent: 6370119 (2002-04-01), Basso et al.
patent: 6381631 (2002-04-01), Van Hoff
patent: 6393425 (2002-05-01), Kelly
patent: 6418468 (2002-07-01), Ahlstrom et al.
patent: 6438594 (2002-08-01), Bowman-Amuah
patent: 6442608 (2002-08-01), Knight et al.
patent: 6449638 (2002-09-01), Wecker et al.
patent: 6463583 (2002-10-01), Hammond
patent: 6496843 (2002-12-01), Getchius et al.
patent: 6539425 (2003-03-01), Stevens et al.
patent: 6550060 (2003-04-01), Hammond
patent: 6567406 (2003-05-01), Skemer
patent: 6609108 (2003-08-01), Pulliam et al.
patent: 6615166 (2003-09-01), Guheen et al.
patent: 6625590 (2003-09-01), Chen et al.
patent: 6636877 (2003-10-01), Doleac et al.
patent: 6643640 (2003-11-01), Getchius et al.
patent: 6654799 (2003-11-01), Tanaka
patent: 6658526 (2003-12-01), Nguyen et al.
patent: 6678827 (2004-01-01), Rothermel et al.
patent: 6684244 (2004-01-01), Goldman et al.
patent: 6697967 (2004-02-01), Robertson
patent: 6725233 (2004-04-01), Froyd et al.
patent: 6769116 (2004-07-01), Sexton
patent: 6775698 (2004-08-01), Simone
patent: 6826597 (2004-11-01), Lonnroth et al.
patent: 2002/0032769 (2002-03-01), Barkai et al.
patent: 2002/0038320 (2002-03-01), Brook
patent: 2002/0051080 (2002-05-01), Tanaka
patent: 2002/0171762 (2002-11-01), Maxson et al.
patent: 2002/0174091 (2002-11-01), Froyd et al.
patent: 2002/0191619 (2002-12-01), Shafer
patent: 2002/0198974 (2002-12-01), Shafer
patent: 2003/0033589 (2003-02-01), Reyna et al.
patent: 2003/0037040 (2003-02-01), Beadles et al.
patent: 2003/0048287 (2003-03-01), Little et al.
patent: 2003/0135508 (2003-07-01), Chorafakis et al.
patent: 2004/0078695 (2004-04-01), Bowers et al.
patent: 2004/0225865 (2004-11-01), Cox et al.
patent: 0 384 339 (1990-08-01), None
patent: 0 810 755 (1997-12-01), None
patent: 0 762 281 (1999-03-01), None
patent: 0 973 296 (2000-01-01), None
patent: 1 011 230 (2000-06-01), None
patent: 1 012 726 (2000-06-01), None
patent: 1 026 867 (2000-08-01), None
patent: 1 047 226 (2000-10-01), None
patent: 1 090 492 (2001-04-01), None
patent: 1 091 526 (2001-04-01), None
patent: 2 368 692 (2002-05-01), None
patent: WO 95/08794 (1995-03-01), None
patent: WO 95/24802 (1995-09-01), None
patent: WO 97/49214 (1997-12-01), None
patent: WO 98/18235 (1998-04-01), None
patent: WO 98/24208 (1998-06-01), None
patent: WO 99/01968 (1999-01-01), None
patent: WO 99/11003 (1999-03-01), None
patent: WO 99/67931 (1999-12-01), None
patent: WO 00/04665 (2000-01-01), None
patent: WO 00/41091 (2000-07-01), None
patent: WO 01/01293 (2001-01-01), None
patent: WO 01/19031 (2001-03-01), None
patent: WO 01/47185 (2001-06-01), None
patent: WO 01/47186 (2001-06-01), None
patent: WO 02/47332 (2002-06-01), None
Lewis, L., “Policy-Based Configuration Management: A Perspective from a Network Management Vendor,” http://www.simple-times,org./pub/simple-times/issues/8-1.html, pp. 7-27.
Waldbusser, St., et al., “Policy Based Management MIB,” http://www.ietf.org/internet-drafts/draft-ietf-snmpconf-pm-05.txt, pp. 1-102.
“FFST/2 Generic Alert Router for LAN and SNA Transports,” IBM Technical Disclosure Bulletin, IBM Corp. New York, US,

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network configuration manager does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network configuration manager, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network configuration manager will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3719325

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.