Abstract: Community based defense, in which multiple security devices operate as a part of a single community in providing security defense i.e. avoiding redundant security checks and enables efficient deployment and utilization of resources. The devices in a community communicate with each other to determine their roles and the security policies to enforce, based on the specific role they have undertaken. Thus primary player may operate with a larger set of security policies. However, the secondary players (operating on smaller policy sets) may periodically check the operational status of the primary player and assumes the role of primary, if needed. Later, it may gracefully relinquish the temporary role back to former primary, once the primary is up and operational.
Abstract: Integrating proxy voice mail server (PVMS) and a switch/router into a single unit. According to another aspect, the PVMS downloads voice mail messages (related to users served in PVMS) when bandwidth utilization is below a pre-specified threshold. According to another aspect, previously recorded voice mail messages are uploaded to a central VMS (CVMS) also when the bandwidth utilization is below a pre-specified threshold. According to one more aspect, the voice mail messages stored locally in a PVMS are provided to a user (instead of from the CVMS) when the bandwidth utilization is above a threshold.
Abstract: A detection system in which a user can indicate the permissible sequences of packets (e.g., by virtue of a state transition table), and the detection system detects packets which are inconsistent with such permissible sequences. As a result, all anomalies (which are inconsistent with the user specified normal behavior) may be reliably detected.
Abstract: Using one set of processors for downloading (and associated processing of) signature data corresponding to security application, and using another set of processors for forwarding/switching. The associated processing may include decompression of the data, authentication (hash computation and verification). Due to the use of separate processors for signature downloads, the forwarding throughput performance of a switching device (e.g., gateway/router) may not be impeded at least substantially during signature data download. Similarly, an out-of-band connection can also optionally be used for signature download.
Abstract: Auto-configuration (i.e., without requiring manual intervention) of network services required to support operation of dependent network services. For example, when an administrator causes instantiation of (or installs) OSPF protocol, the firewall, QoS and NAT services are automatically configured. Due to such configuration, the deployment of additional services may be simplified.
Abstract: According to an aspect of the present invention, routers are notified of occurrence of denial of service (DoS) attack. The DoS attack can be within another router or other user systems contained in an inter-networked environment. The routers may perform actions such as throttling/blocking packets which would continue to cause such DoS attack. Multiple routers may collaboratively mitigate the effect of the DoS attack.
Abstract: Providing fail_over call processing services by sniffing signaling traffic, without the overhead of configuring/provisioning terminals (phones), call servers etc. According to an aspect of the present invention, the integrated device operates as a backup call server when external call servers are unavailable. In one embodiment, the integrated device checks whether a first call server, to which a call setup request is destined to, is available, and forwards the request to another call server if the first call server is unavailable. According to another aspect, the integrated device detects the access information of each terminal registering with a call server, and uses the detected information to provide responses to call setup requests when the call servers are unavailable. As a result, the IP phones in a local network can continue initiating calls even when call servers located at remote sites, become unavailable.
Type:
Application
Filed:
May 24, 2006
Publication date:
October 19, 2006
Applicant:
NETDEVICES, INC.
Inventors:
Parag Pote, Sudhakar Valluru, Ganesh Pai