Security overlay network

A device receives an indication of detected attack traffic associated with a network, identifies a victim of the attack traffic, and selects a security platform for processing the attack traffic. The device also advertises a tunnel and routing tag information in the network for the selected security...

Full description

Saved in:
Bibliographic Details
Main Authors Pacella, Dante J, Schiller, Harold J, Solis, Norman R
Format Patent
LanguageEnglish
Published 17.07.2012
Online AccessGet full text

Cover

Loading…
More Information
Summary:A device receives an indication of detected attack traffic associated with a network, identifies a victim of the attack traffic, and selects a security platform for processing the attack traffic. The device also advertises a tunnel and routing tag information in the network for the selected security platform, receives the attack traffic via the advertised tunnel, and forwards the attack traffic to the selected security platform for processing. The device further receives processed traffic from the selected security platform, and forwards, via the network, the processed traffic to the victim.