Security overlay network
A device receives an indication of detected attack traffic associated with a network, identifies a victim of the attack traffic, and selects a security platform for processing the attack traffic. The device also advertises a tunnel and routing tag information in the network for the selected security...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
17.07.2012
|
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!