摘要 |
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements. |
申请人 |
INTEL CORPORATION;LORTZ, VICTOR;JASON, JAMES, JR.;SAINT-HILAIRE, YLIAN |
发明人 |
LORTZ, VICTOR;JASON, JAMES, JR.;SAINT-HILAIRE, YLIAN |