Patents by Inventor Umamaheswararao Karyampudi
Umamaheswararao Karyampudi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11949602Abstract: An endpoint group (EPG) can be stretched between the sites so that endpoints at different sites can be assigned to the same stretched EPG. Because the sites can use different bridge domains when establishing the stretched EPGs, the first time a site transmits a packet to an endpoint in a different site, the site learns or discovers a path to the destination endpoint. The site can use BGP to identify the site with the host and use a multicast tunnel to reach the site. A unicast tunnel can be used to transmit future packets to the destination endpoint. Additionally, a stretched EPG can be segmented to form a micro-stretched EPG. Filtering criteria can be used to identify a subset of the endpoints in the stretched EPG that are then assigned to the micro-stretched EPG, which can have different policies than the stretched EPG.Type: GrantFiled: September 21, 2021Date of Patent: April 2, 2024Assignee: Cisco Technology, Inc.Inventors: Javed Asghar, Sridhar Vallepalli, Umamaheswararao Karyampudi, Srinivas Kotamraju
-
Patent number: 11924160Abstract: Techniques for management of traffic in a network. The techniques provide application awareness in a Network Address Translation (NAT) system. In some examples, a first traffic is received at a first switch in a network from a first application hosted behind the first switch. The first switch identifies a first resource tag associated with the application from the first traffic. Further, the first switch identifies a first rule from the first resource tag indicating that the first traffic is to be routed through an intermediate device that performs network address translation. Moreover, the first switch transmits the traffic to an intermediate device, which perform NAT to translate the source IP address of the first traffic to a second IP address. Finally, the intermediate device sends the traffic to a destination device indicated by the first traffic.Type: GrantFiled: February 22, 2022Date of Patent: March 5, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Sudhakar Chunduru, Junyun Li, Ajay Kumar Modi
-
Publication number: 20240048509Abstract: Embodiments herein describe using translation mappings and security contracts to establish interconnects and policies between switching fabrics at different sites to create a unified fabric. In one embodiment, a multi-site controller can stretch endpoint groups (EPGs) between the sites so that a host or application in a first site can communicate with a host or application in a second site which is assigned to the same stretched EPG, despite the two sites have different namespaces. Further, the shadow EPGs can be formed to facilitate security contracts between EPGs in different sites. Each site can store namespace translation mapping that enable the site to convert namespace information in packets received from a different site into its own namespace values. As a result, independent bridging and routing segments in the various sites can be interconnected as well as providing application accessibility across different fabrics with independent and private namespaces.Type: ApplicationFiled: September 11, 2023Publication date: February 8, 2024Inventors: Sridhar VALLEPALLI, Javed ASGHAR, Umamaheswararao KARYAMPUDI, Saad MALIK, Amitkumar V. PATEL
-
Patent number: 11863591Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.Type: GrantFiled: November 22, 2022Date of Patent: January 2, 2024Assignee: Cisco Technology, Inc.Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
-
Patent number: 11838701Abstract: In one embodiment, systems and method for detecting the intent of a connected optics/cable to operate in either a breakout mode or a non-breakout mode are provided. When a optics/cable is used to connect a port of a spine node to ports of one or more leaf nodes, initially both the spine node and the leaf nodes may automatically configure themselves to operate in breakout mode depending on the optics. Later, the spine node and one or more leaf nodes may exchange speed and optics information using a link layer discovery protocol or another protocol. If the exchanged speed and optics information indicates a mismatch, then the spine node or the leaf node may retain the breakout mode. If the exchanged speed and optic information do not indicate a mismatch, then the spine nodes and the leaf nodes may automatically re-configure themselves in non-breakout mode.Type: GrantFiled: June 9, 2021Date of Patent: December 5, 2023Assignee: Cisco Technology, Inc.Inventors: Prabhu Balakannan, Shrawan Chittoor Surender, Ashwin Ramani, Eshwar Yedavalli, Srinivas Gaddam, Umamaheswararao Karyampudi
-
Patent number: 11757935Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.Type: GrantFiled: May 4, 2022Date of Patent: September 12, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
-
Patent number: 11757793Abstract: Embodiments herein describe using translation mappings and security contracts to establish interconnects and policies between switching fabrics at different sites to create a unified fabric. In one embodiment, a multi-site controller can stretch endpoint groups (EPGs) between the sites so that a host or application in a first site can communicate with a host or application in a second site which is assigned to the same stretched EPG, despite the two sites have different namespaces. Further, the shadow EPGs can be formed to facilitate security contracts between EPGs in different sites. Each site can store namespace translation mapping that enable the site to convert namespace information in packets received from a different site into its own namespace values. As a result, independent bridging and routing segments in the various sites can be interconnected as well as providing application accessibility across different fabrics with independent and private namespaces.Type: GrantFiled: September 15, 2021Date of Patent: September 12, 2023Assignee: Cisco Technology, Inc.Inventors: Sridhar Vallepalli, Javed Asghar, Umamaheswararao Karyampudi, Saad Malik, Amitkumar V. Patel
-
Publication number: 20230096045Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.Type: ApplicationFiled: November 22, 2022Publication date: March 30, 2023Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
-
Publication number: 20230046070Abstract: Techniques for management of traffic in a network. The techniques provide application awareness in a Network Address Translation (NAT) system. In some examples, a first traffic is received at a first switch in a network from a first application hosted behind the first switch. The first switch identifies a first resource tag associated with the application from the first traffic. Further, the first switch identifies a first rule from the first resource tag indicating that the first traffic is to be routed through an intermediate device that performs network address translation. Moreover, the first switch transmits the traffic to an intermediate device, which perform NAT to translate the source IP address of the first traffic to a second IP address. Finally, the intermediate device sends the traffic to a destination device indicated by the first traffic.Type: ApplicationFiled: February 22, 2022Publication date: February 16, 2023Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Sudhakar Chunduru, Junyun Li, Ajay Kumar Modi
-
Publication number: 20230026570Abstract: Zero-trust dynamic discovery in provided by identifying a plurality of endpoints, including targets and initiators, connected to a software defined network, wherein the targets are provided on the software defined network according to a network addressable memory standard that lacks a native discovery service; grouping the targets into a plurality of target groups and the initiators into a plurality of initiator groups; and in response to receiving a discovery request from a given initiator grouped in a given initiator group of the plurality of initiator groups, returning addressing information for a target group of the plurality of target groups associated with the given initiator group in a security policy configuration for the software defined network.Type: ApplicationFiled: September 30, 2022Publication date: January 26, 2023Inventors: Saravanan SAMPATHKUMAR, Ajay K. MODI, Umamaheswararao KARYAMPUDI, Kamal BAKSHI, Yousuf H. KHAN
-
Patent number: 11553006Abstract: A distributed policy proxy system offloads network policy processing from an overloaded network element to policy proxy network elements. A network controller detects that policy resources are overloaded at a network element, and assigns a range of endpoints to each policy proxy network element. Each policy proxy network element is assigned to handle policy processing for traffic belonging to a corresponding assigned range of endpoints. The network controller provides instructions to the policy proxy network elements to enable each policy proxy network element to apply the network policy for its assigned range of endpoints. The network controller also provides instructions to the overloaded network element to redirect a packet from the first endpoint to a first policy proxy network element based on a destination of the packet.Type: GrantFiled: January 31, 2022Date of Patent: January 10, 2023Assignee: CISCO TECHNOLOGY, INC.Inventors: Murukanandam Kamalam Panchalingam, Umamaheswararao Karyampudi, Junyun Li, Muralidhar Annabatula, Ronak K. Desai, Thomas J. Edsall
-
Patent number: 11533340Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.Type: GrantFiled: January 11, 2021Date of Patent: December 20, 2022Assignee: Cisco Technology, Inc.Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
-
Publication number: 20220400322Abstract: In one embodiment, systems and method for detecting the intent of a connected optics/cable to operate in either a breakout mode or a non-breakout mode are provided. When a optics/cable is used to connect a port of a spine node to ports of one or more leaf nodes, initially both the spine node and the leaf nodes may automatically configure themselves to operate in breakout mode depending on the optics. Later, the spine node and one or more more leaf nodes may exchange speed and optics information using a link layer discovery protocol or another protocol. If the exchanged speed and optics information indicates a mismatch, then the spine node or the leaf node may retain the breakout mode. If the exchanged speed and optic information do not indicate a mismatch, then the spine nodes and the leaf nodes may automatically re-configure themselves in non-breakout mode.Type: ApplicationFiled: June 9, 2021Publication date: December 15, 2022Inventors: Prabhu Balakannan, Shrawan Chittoor Surender, Ashwin Ramani, Eshwar Yedavalli, Srinivas Gaddam, Umamaheswararao Karyampudi
-
Patent number: 11509536Abstract: Relay functionality may be provided. A network device may receive a response packet and may determine that one of Option-82 and Option-18 information is not present in the received response packet. Next, in response to determining that one of Option-82 and Option-18 information is not present in the received response packet, a database may be queried for information associated with the response packet. Then, based on the information associated with the response packet, the response packet may be sent to a client device associated with the response packet.Type: GrantFiled: October 20, 2020Date of Patent: November 22, 2022Assignee: Cisco Technology, Inc.Inventors: Vedashree Bagade, Ajay Kumar Modi, Umamaheswararao Karyampudi, Abhishek Gupta
-
Patent number: 11503077Abstract: Zero-trust dynamic discovery in provided by identifying a plurality of endpoints, including targets and initiators, connected to a software defined network, wherein the targets are provided on the software defined network according to a network addressable memory standard that lacks a native discovery service; grouping the targets into a plurality of target groups and the initiators into a plurality of initiator groups; and in response to receiving a discovery request from a given initiator grouped in a given initiator group of the plurality of initiator groups, returning addressing information for a target group of the plurality of target groups associated with the given initiator group in a security policy configuration for the software defined network.Type: GrantFiled: August 7, 2020Date of Patent: November 15, 2022Assignee: Cisco Technology, Inc.Inventors: Saravanan Sampathkumar, Ajay K. Modi, Umamaheswararao Karyampudi, Kamal Bakshi, Yousuf H. Khan
-
Publication number: 20220337503Abstract: A network controller maintains network availability between a pair of endpoints. The controller detects a topology of a computer network connecting endpoints. The controller determines a metric of availability between a first endpoint and a second endpoint. The metric of availability is based on non-overlapping paths between the first endpoint and the second endpoint. Responsive to a determination that the metric of availability satisfies a predetermined criterion, the controller adjusts a path between the first endpoint and the second endpoint.Type: ApplicationFiled: April 14, 2021Publication date: October 20, 2022Inventors: Saravanan Sampathkumar, Kedhaar Ram Subramanian, Ajay Modi, Umamaheswararao Karyampudi
-
Publication number: 20220263865Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.Type: ApplicationFiled: May 4, 2022Publication date: August 18, 2022Inventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
-
Patent number: 11368484Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.Type: GrantFiled: April 26, 2019Date of Patent: June 21, 2022Assignee: CISCO TECHNOLOGY, INCInventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
-
Publication number: 20220159042Abstract: A distributed policy proxy system offloads network policy processing from an overloaded network element to policy proxy network elements. A network controller detects that policy resources are overloaded at a network element, and assigns a range of endpoints to each policy proxy network element. Each policy proxy network element is assigned to handle policy processing for traffic belonging to a corresponding assigned range of endpoints. The network controller provides instructions to the policy proxy network elements to enable each policy proxy network element to apply the network policy for its assigned range of endpoints. The network controller also provides instructions to the overloaded network element to redirect a packet from the first endpoint to a first policy proxy network element based on a destination of the packet.Type: ApplicationFiled: January 31, 2022Publication date: May 19, 2022Inventors: Murukanandam Kamalam Panchalingam, Umamaheswararao Karyampudi, Junyun Li, Muralidhar Annabatula, Ronak K. Desai, Thomas J. Edsall
-
Patent number: 11336694Abstract: Techniques for hierarchical security policies are disclosed. A first network configuration is received, where the first network configuration includes a plurality of subnets and a plurality of security zones. An updated network configuration is generated based on the first network configuration by generating, for a first security zone of the plurality of security zones, a first master class, and generating, for each respective subnet of the plurality of subnets, a respective bridge domain. For each respective bridge domain, a respective local endpoint group (EPG) corresponding to the first security zone is created, and the first master class is assigned to the respective local EPG. Finally, one or more contracts are generated for the first master class based on the first network configuration.Type: GrantFiled: August 5, 2019Date of Patent: May 17, 2022Assignee: Cisco Technology, Inc.Inventors: Gautam Venkataramanan, Umamaheswararao Karyampudi, Murukanandam K. Panchalingam, Ajay K. Modi, Maurizio Portolani