Abstract: At least one development module in communication with at least one processor and at least one memory may assemble at least one network model comprising at least one of a plurality of classes, the assembling being performed using object oriented modeling, each class comprising at least one property defining at least one network concept for at least one network device. At least one control module in communication with the at least one processor and the at least one memory may generate the at least one network concept from the at least one network model. At least one orchestration module in communication with the at least one processor and the at least one memory may transmit the at least one network concept to the at least one network device corresponding to the at least one class in the at least one network model.
Type:
Grant
Filed:
February 29, 2016
Date of Patent:
October 10, 2017
Assignee:
GLUE NETWORKS, INC.
Inventors:
Olivier Huynh Van, Jacob Enoch Locken, John Alfred Anderson, Daniel Roy Bolar, Lee Kevin Frost
Abstract: Systems and methods described herein may perform processing associated with loading, with a boot agent injection module in communication with a processor; a boot agent into a memory of a network device comprising a processor; and perform processing associated with using the boot agent to configure, with the network device, the network device to connect to a remote computer.
Abstract: Systems and Methods for determining endpoint configurations for endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints. Parameters required for building the configurations are accepted from a user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising: endpoint IP addressing scheme information, network design information, and templates used to define profiles of the endpoints. The configurations for the parameters are generated, wherein the parameters comprise endpoint authentication information, and the configurations are set based on endpoint hardware-specific information with no further input required from the user. Each endpoint is queried to verify that the endpoint hardware-specific information is consistent with the configurations for the endpoint. The configurations are deployed to the endpoints of the VPN.