Patents by Inventor Umamaheswararao Karyampudi

Umamaheswararao Karyampudi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11949602
    Abstract: An endpoint group (EPG) can be stretched between the sites so that endpoints at different sites can be assigned to the same stretched EPG. Because the sites can use different bridge domains when establishing the stretched EPGs, the first time a site transmits a packet to an endpoint in a different site, the site learns or discovers a path to the destination endpoint. The site can use BGP to identify the site with the host and use a multicast tunnel to reach the site. A unicast tunnel can be used to transmit future packets to the destination endpoint. Additionally, a stretched EPG can be segmented to form a micro-stretched EPG. Filtering criteria can be used to identify a subset of the endpoints in the stretched EPG that are then assigned to the micro-stretched EPG, which can have different policies than the stretched EPG.
    Type: Grant
    Filed: September 21, 2021
    Date of Patent: April 2, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Javed Asghar, Sridhar Vallepalli, Umamaheswararao Karyampudi, Srinivas Kotamraju
  • Patent number: 11924160
    Abstract: Techniques for management of traffic in a network. The techniques provide application awareness in a Network Address Translation (NAT) system. In some examples, a first traffic is received at a first switch in a network from a first application hosted behind the first switch. The first switch identifies a first resource tag associated with the application from the first traffic. Further, the first switch identifies a first rule from the first resource tag indicating that the first traffic is to be routed through an intermediate device that performs network address translation. Moreover, the first switch transmits the traffic to an intermediate device, which perform NAT to translate the source IP address of the first traffic to a second IP address. Finally, the intermediate device sends the traffic to a destination device indicated by the first traffic.
    Type: Grant
    Filed: February 22, 2022
    Date of Patent: March 5, 2024
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Sudhakar Chunduru, Junyun Li, Ajay Kumar Modi
  • Publication number: 20240048509
    Abstract: Embodiments herein describe using translation mappings and security contracts to establish interconnects and policies between switching fabrics at different sites to create a unified fabric. In one embodiment, a multi-site controller can stretch endpoint groups (EPGs) between the sites so that a host or application in a first site can communicate with a host or application in a second site which is assigned to the same stretched EPG, despite the two sites have different namespaces. Further, the shadow EPGs can be formed to facilitate security contracts between EPGs in different sites. Each site can store namespace translation mapping that enable the site to convert namespace information in packets received from a different site into its own namespace values. As a result, independent bridging and routing segments in the various sites can be interconnected as well as providing application accessibility across different fabrics with independent and private namespaces.
    Type: Application
    Filed: September 11, 2023
    Publication date: February 8, 2024
    Inventors: Sridhar VALLEPALLI, Javed ASGHAR, Umamaheswararao KARYAMPUDI, Saad MALIK, Amitkumar V. PATEL
  • Patent number: 11863591
    Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.
    Type: Grant
    Filed: November 22, 2022
    Date of Patent: January 2, 2024
    Assignee: Cisco Technology, Inc.
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
  • Patent number: 11838701
    Abstract: In one embodiment, systems and method for detecting the intent of a connected optics/cable to operate in either a breakout mode or a non-breakout mode are provided. When a optics/cable is used to connect a port of a spine node to ports of one or more leaf nodes, initially both the spine node and the leaf nodes may automatically configure themselves to operate in breakout mode depending on the optics. Later, the spine node and one or more leaf nodes may exchange speed and optics information using a link layer discovery protocol or another protocol. If the exchanged speed and optics information indicates a mismatch, then the spine node or the leaf node may retain the breakout mode. If the exchanged speed and optic information do not indicate a mismatch, then the spine nodes and the leaf nodes may automatically re-configure themselves in non-breakout mode.
    Type: Grant
    Filed: June 9, 2021
    Date of Patent: December 5, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Prabhu Balakannan, Shrawan Chittoor Surender, Ashwin Ramani, Eshwar Yedavalli, Srinivas Gaddam, Umamaheswararao Karyampudi
  • Patent number: 11757935
    Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.
    Type: Grant
    Filed: May 4, 2022
    Date of Patent: September 12, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
  • Patent number: 11757793
    Abstract: Embodiments herein describe using translation mappings and security contracts to establish interconnects and policies between switching fabrics at different sites to create a unified fabric. In one embodiment, a multi-site controller can stretch endpoint groups (EPGs) between the sites so that a host or application in a first site can communicate with a host or application in a second site which is assigned to the same stretched EPG, despite the two sites have different namespaces. Further, the shadow EPGs can be formed to facilitate security contracts between EPGs in different sites. Each site can store namespace translation mapping that enable the site to convert namespace information in packets received from a different site into its own namespace values. As a result, independent bridging and routing segments in the various sites can be interconnected as well as providing application accessibility across different fabrics with independent and private namespaces.
    Type: Grant
    Filed: September 15, 2021
    Date of Patent: September 12, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Sridhar Vallepalli, Javed Asghar, Umamaheswararao Karyampudi, Saad Malik, Amitkumar V. Patel
  • Publication number: 20230096045
    Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.
    Type: Application
    Filed: November 22, 2022
    Publication date: March 30, 2023
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
  • Publication number: 20230046070
    Abstract: Techniques for management of traffic in a network. The techniques provide application awareness in a Network Address Translation (NAT) system. In some examples, a first traffic is received at a first switch in a network from a first application hosted behind the first switch. The first switch identifies a first resource tag associated with the application from the first traffic. Further, the first switch identifies a first rule from the first resource tag indicating that the first traffic is to be routed through an intermediate device that performs network address translation. Moreover, the first switch transmits the traffic to an intermediate device, which perform NAT to translate the source IP address of the first traffic to a second IP address. Finally, the intermediate device sends the traffic to a destination device indicated by the first traffic.
    Type: Application
    Filed: February 22, 2022
    Publication date: February 16, 2023
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Sudhakar Chunduru, Junyun Li, Ajay Kumar Modi
  • Publication number: 20230026570
    Abstract: Zero-trust dynamic discovery in provided by identifying a plurality of endpoints, including targets and initiators, connected to a software defined network, wherein the targets are provided on the software defined network according to a network addressable memory standard that lacks a native discovery service; grouping the targets into a plurality of target groups and the initiators into a plurality of initiator groups; and in response to receiving a discovery request from a given initiator grouped in a given initiator group of the plurality of initiator groups, returning addressing information for a target group of the plurality of target groups associated with the given initiator group in a security policy configuration for the software defined network.
    Type: Application
    Filed: September 30, 2022
    Publication date: January 26, 2023
    Inventors: Saravanan SAMPATHKUMAR, Ajay K. MODI, Umamaheswararao KARYAMPUDI, Kamal BAKSHI, Yousuf H. KHAN
  • Patent number: 11553006
    Abstract: A distributed policy proxy system offloads network policy processing from an overloaded network element to policy proxy network elements. A network controller detects that policy resources are overloaded at a network element, and assigns a range of endpoints to each policy proxy network element. Each policy proxy network element is assigned to handle policy processing for traffic belonging to a corresponding assigned range of endpoints. The network controller provides instructions to the policy proxy network elements to enable each policy proxy network element to apply the network policy for its assigned range of endpoints. The network controller also provides instructions to the overloaded network element to redirect a packet from the first endpoint to a first policy proxy network element based on a destination of the packet.
    Type: Grant
    Filed: January 31, 2022
    Date of Patent: January 10, 2023
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Murukanandam Kamalam Panchalingam, Umamaheswararao Karyampudi, Junyun Li, Muralidhar Annabatula, Ronak K. Desai, Thomas J. Edsall
  • Patent number: 11533340
    Abstract: Systems, methods, and computer-readable media for on-demand security provisioning using whitelist and blacklist rules. In some examples, a system in a network including a plurality of pods can configure security policies for a first endpoint group (EPG) in a first pod, the security policies including blacklist and whitelist rules defining traffic security enforcement rules for communications between the first EPG and a second EPG in a second pods in the network. The system can assign respective implicit priorities to the one or more security policies based on a respective specificity of each policy, wherein more specific policies are assigned higher priorities than less specific policies. The system can respond to a detected move of a virtual machine associated with the first EPG to a second pod in the network by dynamically provisioning security policies for the first EPG in the second pod and removing security policies from the first pod.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: December 20, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Murukanandam Panchalingam, Umamaheswararao Karyampudi, Gianluca Mardente, Aram Aghababyan
  • Publication number: 20220400322
    Abstract: In one embodiment, systems and method for detecting the intent of a connected optics/cable to operate in either a breakout mode or a non-breakout mode are provided. When a optics/cable is used to connect a port of a spine node to ports of one or more leaf nodes, initially both the spine node and the leaf nodes may automatically configure themselves to operate in breakout mode depending on the optics. Later, the spine node and one or more more leaf nodes may exchange speed and optics information using a link layer discovery protocol or another protocol. If the exchanged speed and optics information indicates a mismatch, then the spine node or the leaf node may retain the breakout mode. If the exchanged speed and optic information do not indicate a mismatch, then the spine nodes and the leaf nodes may automatically re-configure themselves in non-breakout mode.
    Type: Application
    Filed: June 9, 2021
    Publication date: December 15, 2022
    Inventors: Prabhu Balakannan, Shrawan Chittoor Surender, Ashwin Ramani, Eshwar Yedavalli, Srinivas Gaddam, Umamaheswararao Karyampudi
  • Patent number: 11509536
    Abstract: Relay functionality may be provided. A network device may receive a response packet and may determine that one of Option-82 and Option-18 information is not present in the received response packet. Next, in response to determining that one of Option-82 and Option-18 information is not present in the received response packet, a database may be queried for information associated with the response packet. Then, based on the information associated with the response packet, the response packet may be sent to a client device associated with the response packet.
    Type: Grant
    Filed: October 20, 2020
    Date of Patent: November 22, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Vedashree Bagade, Ajay Kumar Modi, Umamaheswararao Karyampudi, Abhishek Gupta
  • Patent number: 11503077
    Abstract: Zero-trust dynamic discovery in provided by identifying a plurality of endpoints, including targets and initiators, connected to a software defined network, wherein the targets are provided on the software defined network according to a network addressable memory standard that lacks a native discovery service; grouping the targets into a plurality of target groups and the initiators into a plurality of initiator groups; and in response to receiving a discovery request from a given initiator grouped in a given initiator group of the plurality of initiator groups, returning addressing information for a target group of the plurality of target groups associated with the given initiator group in a security policy configuration for the software defined network.
    Type: Grant
    Filed: August 7, 2020
    Date of Patent: November 15, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Saravanan Sampathkumar, Ajay K. Modi, Umamaheswararao Karyampudi, Kamal Bakshi, Yousuf H. Khan
  • Publication number: 20220337503
    Abstract: A network controller maintains network availability between a pair of endpoints. The controller detects a topology of a computer network connecting endpoints. The controller determines a metric of availability between a first endpoint and a second endpoint. The metric of availability is based on non-overlapping paths between the first endpoint and the second endpoint. Responsive to a determination that the metric of availability satisfies a predetermined criterion, the controller adjusts a path between the first endpoint and the second endpoint.
    Type: Application
    Filed: April 14, 2021
    Publication date: October 20, 2022
    Inventors: Saravanan Sampathkumar, Kedhaar Ram Subramanian, Ajay Modi, Umamaheswararao Karyampudi
  • Publication number: 20220263865
    Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.
    Type: Application
    Filed: May 4, 2022
    Publication date: August 18, 2022
    Inventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
  • Patent number: 11368484
    Abstract: Methods to secure against IP address thefts by rogue devices in a virtualized datacenter are provided. Rogue devices are detected and distinguished from a migration of an endpoint in a virtualized datacenter. A first hop network element in a one or more network fabrics intercepts a request that includes an identity of an endpoint and performs a local lookup for the endpoint entity identifier. Based on the lookup not finding the endpoint entity identifier, the first hop network element broadcasts a message such as a remote media access address (MAC) query to other network elements in the one or more network fabrics. Based on the received response, which may include an IP address associated with the MAC address, the first hop network element performs a theft validation process to determine whether the request originated from a migrated endpoint or a rogue device.
    Type: Grant
    Filed: April 26, 2019
    Date of Patent: June 21, 2022
    Assignee: CISCO TECHNOLOGY, INC
    Inventors: Govind Prasad Sharma, Eshwar Rao Yedavalli, Mohammed Javed Asghar, Ashwath Kumar Chandrasekaran, Swapnil Mankar, Umamaheswararao Karyampudi
  • Publication number: 20220159042
    Abstract: A distributed policy proxy system offloads network policy processing from an overloaded network element to policy proxy network elements. A network controller detects that policy resources are overloaded at a network element, and assigns a range of endpoints to each policy proxy network element. Each policy proxy network element is assigned to handle policy processing for traffic belonging to a corresponding assigned range of endpoints. The network controller provides instructions to the policy proxy network elements to enable each policy proxy network element to apply the network policy for its assigned range of endpoints. The network controller also provides instructions to the overloaded network element to redirect a packet from the first endpoint to a first policy proxy network element based on a destination of the packet.
    Type: Application
    Filed: January 31, 2022
    Publication date: May 19, 2022
    Inventors: Murukanandam Kamalam Panchalingam, Umamaheswararao Karyampudi, Junyun Li, Muralidhar Annabatula, Ronak K. Desai, Thomas J. Edsall
  • Patent number: 11336694
    Abstract: Techniques for hierarchical security policies are disclosed. A first network configuration is received, where the first network configuration includes a plurality of subnets and a plurality of security zones. An updated network configuration is generated based on the first network configuration by generating, for a first security zone of the plurality of security zones, a first master class, and generating, for each respective subnet of the plurality of subnets, a respective bridge domain. For each respective bridge domain, a respective local endpoint group (EPG) corresponding to the first security zone is created, and the first master class is assigned to the respective local EPG. Finally, one or more contracts are generated for the first master class based on the first network configuration.
    Type: Grant
    Filed: August 5, 2019
    Date of Patent: May 17, 2022
    Assignee: Cisco Technology, Inc.
    Inventors: Gautam Venkataramanan, Umamaheswararao Karyampudi, Murukanandam K. Panchalingam, Ajay K. Modi, Maurizio Portolani