US 12,218,912 B2
Telemetry collection and policy enforcement using asset tagging
Robert Edgar Barton, Richmond (CA); Thomas Szigeti, Vancouver (CA); Jerome Henry, Pittsboro, NC (US); Ruben Gerald Lobo, Raleigh, NC (US); Laurent Jean Charles Hausermann, Lyons (FR); Maik Guenter Seewald, Nuremberg (DE); and Daniel R. Behrens, Chardon, OH (US)
Assigned to Cisco Technology, Inc., San Jose, CA (US)
Filed by Cisco Technology, Inc., San Jose, CA (US)
Filed on Apr. 21, 2020, as Appl. No. 16/854,616.
Claims priority of provisional application 62/951,645, filed on Dec. 20, 2019.
Prior Publication US 2021/0194815 A1, Jun. 24, 2021
Int. Cl. H04L 43/026 (2022.01); G05B 19/05 (2006.01); G06Q 10/0875 (2023.01); H04L 9/40 (2022.01); H04L 12/46 (2006.01); H04L 41/0803 (2022.01); H04L 41/0893 (2022.01); H04L 47/20 (2022.01); H04L 47/2441 (2022.01); H04L 47/32 (2022.01)
CPC H04L 63/0263 (2013.01) [G05B 19/05 (2013.01); G06Q 10/0875 (2013.01); H04L 12/4641 (2013.01); H04L 41/0803 (2013.01); H04L 41/0893 (2013.01); H04L 43/026 (2013.01); H04L 47/20 (2013.01); H04L 47/2441 (2013.01); H04L 47/323 (2013.01); H04L 63/20 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, at a networking device in a network, a policy for an endpoint device in the network, the policy specifying one or more component tags and one or more activity tags that were assigned to the endpoint device based on deep packet inspection of traffic associated with the endpoint device, wherein the one or more component tags that were assigned to the endpoint device are indicative of at least one of: a device type of the endpoint device or software executed by the endpoint device;
identifying, by the networking device, a set of tags for a particular traffic flow in the network associated with the endpoint device based on receiving, from a telemetry exporter in the network, a traffic flow record for the particular traffic flow, wherein the set of tags are embedded in the traffic flow record, and wherein the set of tags comprises one or more component tags or activity tags associated with the particular traffic flow;
making, by the networking device, a determination that the particular traffic flow violates the policy based on the set of tags for the particular traffic flow comprising a tag that is not in the policy, wherein the determination that the particular traffic flow violates the policy is made by comparing the set of tags for the particular traffic flow with the one or more component tags and the one or more activity tags specified by the policy; and
initiating, by the networking device and based on the determination that the particular traffic flow violates the policy, a corrective measure with respect to the particular traffic flow.