Patents by Inventor Kartik Mohanram
Kartik Mohanram has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240348654Abstract: Security policy analysis is disclosed. Configuration information, including at least one existing policy, is received. The received configuration information is used to build a model, including by normalizing the policy. The model is used to analyze the existing policy. A result of the policy analysis is provided as output.Type: ApplicationFiled: January 31, 2024Publication date: October 17, 2024Inventors: Navneet Yadav, Kartik Mohanram, Nilesh Maheshwari, Kesava Srinivas Vunnava, Nishit Paresh Kothari, Thirumal Reddy Mavillapally
-
Publication number: 20240348627Abstract: Techniques for an Application Access Analyzer are disclosed. In some embodiments, a system/process/computer program product for an Application Access Analyzer includes monitoring access to an application over a network; automatically determining a root cause of an issue (e.g., an anomaly in network connectivity, performance degradation, and/or a permission denial and/or policy blocking) associated with the access to the application over the network for a user (e.g., or a group of users) using an application access analyzer; and performing an action in response to determining the root cause of the issue associated with the access to the application over the network.Type: ApplicationFiled: January 31, 2024Publication date: October 17, 2024Inventors: Sameer D. Merchant, Iqrar Jabbar Patel, Dinesh Ranjit, Rajesh Bhagwat, Shivangi Indradeo Sharma, Kartik Mohanram, Navneet Yadav
-
Publication number: 20240348653Abstract: Security policy analysis is disclosed. Configuration information, including at least one policy, is received. The received configuration information is used to build a model, including by normalizing the policy. The policy is used to perform a policy analysis, including by performing a pre-change analysis associated with a proposed policy change. A result of the policy analysis is provided as output.Type: ApplicationFiled: January 31, 2024Publication date: October 17, 2024Inventors: Navneet Yadav, Kartik Mohanram, Nilesh Maheshwari, Kesava Srinivas Vunnava, Nishit Paresh Kothari, Thirumal Reddy Mavillapally
-
Publication number: 20240348664Abstract: Security policy analysis is disclosed. Configuration information, including at least one policy, associated with a live production security appliance, is received. The received configuration information is used to instantiate the policy in a sandbox environment. The sandbox environment is used to evaluate a proposed change to the configuration information, including by building a model using the received configuration information.Type: ApplicationFiled: January 31, 2024Publication date: October 17, 2024Inventors: Kartik Mohanram, Navneet Yadav
-
Publication number: 20240146774Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: ApplicationFiled: October 26, 2023Publication date: May 2, 2024Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Patent number: 11888603Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: GrantFiled: January 25, 2021Date of Patent: January 30, 2024Assignee: Cisco Technology, Inc.Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20230236912Abstract: Systems, methods, and computer-readable media for fault code aggregation across application-centric dimensions. In an example embodiment, a system obtains respective fault codes corresponding to one or more network devices in a network and maps the one or more network devices and/or the respective fault codes to respective logical policy entities defined in a logical policy model of the network, to yield fault code mappings. The system aggregates the one or more of the fault code mappings along respective logical policy dimensions in the network to yield an aggregation of fault codes across respective logical policy dimensions and, based on the aggregation, presents, for each of the respective logical policy dimensions, one or more hardware-level errors along the respective logical policy dimension.Type: ApplicationFiled: March 7, 2023Publication date: July 27, 2023Inventors: John Thomas Monk, Kartik Mohanram, Ramana Rao Kompella, Sundar Iyer
-
Patent number: 11645131Abstract: Systems, methods, and computer-readable media for fault code aggregation across application-centric dimensions. In an example embodiment, a system obtains respective fault codes corresponding to one or more network devices in a network and maps the one or more network devices and/or the respective fault codes to respective logical policy entities defined in a logical policy model of the network, to yield fault code mappings. The system aggregates the one or more of the fault code mappings along respective logical policy dimensions in the network to yield an aggregation of fault codes across respective logical policy dimensions and, based on the aggregation, presents, for each of the respective logical policy dimensions, one or more hardware-level errors along the respective logical policy dimension.Type: GrantFiled: July 28, 2017Date of Patent: May 9, 2023Assignee: Cisco Technology, Inc.Inventors: John Thomas Monk, Kartik Mohanram, Ramana Rao Kompella, Sundar Iyer
-
Patent number: 11563645Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.Type: GrantFiled: January 20, 2021Date of Patent: January 24, 2023Assignee: Cisco Technology, Inc.Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
-
Patent number: 11303531Abstract: Systems, methods, and computer-readable media for generating counterexamples for equivalence failures between models of network intents. A listing of conflict rules corresponding to an equivalence failure between at least first and seconds model of networks intents describing the operation and communication of network devices in a network is obtained. A logical exclusive disjunction between first conflict rules from the first model and corresponding second conflict rules from the second model is calculated. One or more counterexamples corresponding to the equivalence failure are generated based at least in part on the logical exclusive disjunction, such that a given counterexample comprises network and packet conditions that cause the first conflict rules to trigger a first action and cause the second conflict rules to trigger a second action that is different from the first action. Hot fields that are more likely to be associated with the equivalence failure are identified in the counterexample.Type: GrantFiled: March 2, 2020Date of Patent: April 12, 2022Assignee: CISCO TECHNOLOGIES, INC.Inventor: Kartik Mohanram
-
Patent number: 11218508Abstract: Systems, methods, and computer-readable media for assurance of rules in a network. An example method can include creating a compliance requirement including a first endpoint group (EPG) selector, a second EPG selector, a traffic selector, and a communication operator, the first and second EPG selectors representing sets of EPGs and the communication operator defining a communication condition for traffic associated with the first and second EPG selectors and the traffic selector. The method can include creating, for each distinct pair of EPGs, a first respective data structure representing the distinct pair of EPGs, the communication operator, and the traffic selector; creating a second respective data structure representing a logical model of the network; determining whether the first respective data structure is contained in the second respective data structure to yield a containment check; and determining whether policies on the network comply with the compliance requirement based on the containment check.Type: GrantFiled: December 12, 2018Date of Patent: January 4, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Patent number: 11178009Abstract: Systems, methods, and computer-readable media for static network policy analysis for a network. In one example, a system obtains a logical model based on configuration data stored in a controller on a software-defined network, the logical model including a declarative representation of respective configurations of objects in the software-defined network, the objects including one or more endpoint groups, bridge domains, contexts, or tenants. The system defines rules representing respective conditions of the objects according to a specification corresponding to the software-defined network, and determines whether the respective configuration of each of the objects in the logical model violates one or more of the rules associated with that object. When the respective configuration of an object in the logical model violates one or more of the rules, the system detects an error in the respective configuration associated with that object.Type: GrantFiled: February 10, 2020Date of Patent: November 16, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Kartik Mohanram, Chandra Nagarajan, Sundar Iyer, Shadab Nazar, Ramana Rao Kompella
-
Patent number: 11044273Abstract: Systems, methods, and computer-readable media for configuring and verifying compliance requirements in a network.Type: GrantFiled: December 12, 2018Date of Patent: June 22, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20210152607Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: ApplicationFiled: January 25, 2021Publication date: May 20, 2021Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Publication number: 20210144069Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.Type: ApplicationFiled: January 20, 2021Publication date: May 13, 2021Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
-
Patent number: 10951477Abstract: Systems, methods, and computer-readable media for identifying conflict rules between models of network intents. A first and second model of network intents are obtained, the models describing the operation and communication between one or more network devices in a network. A logical exclusive disjunction between the first and second models is calculated over the space of possible packet conditions and network actions defined by models, without enumerating all possible packet conditions and network actions. It is detected whether the models are in conflict with respect to at least a first network device. If the models are in conflict, it is determined whether a given rule of a plurality of rules associated with the first model is a conflict rule. The determining comprises calculating the intersection between the given rule and the logical exclusive disjunction, wherein the given rule is a conflict rule if the calculated intersection is non-zero.Type: GrantFiled: October 7, 2019Date of Patent: March 16, 2021Assignee: CISCO TECHNOLOGY, INC.Inventor: Kartik Mohanram
-
Patent number: 10911495Abstract: In some examples, a system creates a requirement including EPG selectors representing EPG pairs, a traffic selector, and a communication operator; determines that EPGs in distinct pairs are associated with different network contexts and, for each pair, which network context(s) contains associated policies; creates first data representing the pair, operator, and traffic selector; when only one network context contains the associated policies, creates second data representing a network model portion associated with the only network context and determines whether the first data is contained in the second data to yield a first check; when both network contexts contain the associated policies, also creates third data representing a network model portion associated with a second network context, and determines whether the first data is contained in the second and/or third data to yield a second check; and determines whether policies for the pairs comply with the requirement based on the checks.Type: GrantFiled: December 12, 2018Date of Patent: February 2, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Advait Dixit, Navneet Yadav, Navjyoti Sharma, Ramana Rao Kompella, Kartik Mohanram
-
Patent number: 10904101Abstract: Systems, methods, and computer-readable media for receiving one or more models of network intents, comprising a plurality of contracts between providers and consumers, each contract containing entries with priority values. Each contract is flattened into a listing of rules and a new priority value is calculated. The listing of rules encodes the implementation of the contract between the providers and the consumers. Each entry is iterated over and added to a listing of entries if it is not already present. For each rule, the one or more entries associated with the contract from which the rule was flattened are identified, and for each given entry a flat rule comprising the combination of the rule and the entry is generated, wherein a flattened priority is calculated based at least in part on the priority value of the given one of given entry and the priority value of the rule.Type: GrantFiled: August 31, 2017Date of Patent: January 26, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Advait Dixit, Ramana Rao Kompella, Kartik Mohanram, Sundar Iyer, Shadab Nazar, Chandra Nagarajan
-
Patent number: 10826788Abstract: Systems, methods, and computer-readable media for assurance of quality-of-service configurations in a network. In some examples, a system obtains a logical model of a software-defined network, the logical model including rules specified for the software-defined network, the logical model being based on a schema defining manageable objects and object properties for the software-defined network. The system also obtains, for each node in the software-defined network, a respective hardware model, the respective hardware model including rules rendered at the node based on a respective node-specific representation of the logical model. Based on the logical model and the respective hardware model, the system can perform an equivalency check between the rules in the logical model and the rules in the respective hardware model to determine whether the logical model and the respective hardware model contain configuration inconsistencies.Type: GrantFiled: August 31, 2017Date of Patent: November 3, 2020Assignee: CISCO TECHNOLOGY, INC.Inventors: Chandra Nagarajan, Kartik Mohanram, Ramana Rao Kompella, Divjyot Sethi, Sundar Iyer
-
Publication number: 20200204453Abstract: Systems, methods, and computer-readable media for generating counterexamples for equivalence failures between models of network intents. A listing of conflict rules corresponding to an equivalence failure between at least first and seconds model of networks intents describing the operation and communication of network devices in a network is obtained. A logical exclusive disjunction between first conflict rules from the first model and corresponding second conflict rules from the second model is calculated. One or more counterexamples corresponding to the equivalence failure are generated based at least in part on the logical exclusive disjunction, such that a given counterexample comprises network and packet conditions that cause the first conflict rules to trigger a first action and cause the second conflict rules to trigger a second action that is different from the first action. Hot fields that are more likely to be associated with the equivalence failure are identified in the counterexample.Type: ApplicationFiled: March 2, 2020Publication date: June 25, 2020Inventor: Kartik Mohanram