Enforcement firewalls and other security devices are located on a network for a given source node and destination node. Nodes in the network topology are programmatically identified as being part of a non-looping communication path between the source node and the destination node. These nodes may be part of a path closure set. Security devices that are part of the path closure set are identified as the enforcement security devices for the given source and destination node.

 
Web www.patentalert.com

< System and method for managing computer system resources using command control vectors

< Method of making at least one hole in a transparent body and devices made by this method

> Unified voice and data networking having demarcation lines

> Planar optical apparatus for setting the chromatic dispersion in an optical system

~ 00276