2008 IEEE Internet Network Management Workshop (INM) 2008
DOI: 10.1109/inetmw.2008.4660329
|View full text |Cite
|
Sign up to set email alerts
|

Towards validated network configurations with NCGuard

Abstract: Abstract-Today, most IP networks are still configured manually on a router-by-router basis. This is error-prone and often leads to misconfiguration. In this paper, we describe the Network Configuration Safeguard (NCGuard), a tool that allows the network architect to apply a safer methodology. The first step is to define his design rules. Based on a survey of the networking literature, we classify the most common types of rules in three main patterns: presence, uniqueness and symmetry and provide several exampl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 14 publications
(22 reference statements)
0
8
0
Order By: Relevance
“…These could be compared to the created overlay graphs to assert deployment success and validate experimental results. Offline verification systems could be applied prior to deployment, applying static checking [38] or stability detection [16]. Integrating pre-and post-deployment verification systems allows testdriven network development [32].…”
Section: Resultsmentioning
confidence: 99%
“…These could be compared to the created overlay graphs to assert deployment success and validate experimental results. Offline verification systems could be applied prior to deployment, applying static checking [38] or stability detection [16]. Integrating pre-and post-deployment verification systems allows testdriven network development [32].…”
Section: Resultsmentioning
confidence: 99%
“…A few works have developed configuration templates in different networking fields (e.g., ISP [4,6,7]), and the present work shares the spirit of the use of templates. In contrast to those work, an originality of this work is the focus on the fundamental and crucial difficulty in creating appropriate templates.…”
Section: Related Workmentioning
confidence: 99%
“…Tenant construction in such datacenters still mostly relies on manual configuration because of the lack of tools that generally meet those various requirements. Manual configuration is substantially time-consuming and error-prone in general as claimed over at least a decade [3,4,5,6,7], and the use of multi-tenancy in datacenter context has unfortunately required more careful and sophisticated management processes than ever due to the increase in risks of misconfigurations in such shared environments.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Template-driven approaches [15,12] are commonly used in production environments. A template program extracts parameters from provisioning databases and generates configuration snippets, optionally with some validation [35]. Unfortunately, the dependencies among templates and between the generated snippets and the existing configurations, still need to be resolved manually.…”
Section: Related Workmentioning
confidence: 99%