Patent classifications
H04L12/46
METHODS AND APPARATUS TO IMPLEMENT A VIRTUAL PRIVATE NETWORK WITH PROBE FOR NETWORK CONNECTIVITY
Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed. An example non-transitory computer readable storage medium is disclosed comprising instructions which, when executed, cause a machine to at least, in response to a first instruction from an operating system to establish a network tunnel, transmit a probe request to a server; and in response to not receiving, from the server, a probe response to the probe request, report that the network tunnel has been established to prevent the operating system from transmitting subsequent instructions to establish the network connection until a response to a probe request is received.
DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS
Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.
NETWORK DATASET PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM
Methods, devices, and non-transitory computer-readable storage media for network dataset processing are provided. An initial user interface in a terminal is generated. The initial user interface is configured to access a network dataset. A network dataset selected from the at least one network dataset is used as a target network dataset in response to selecting the at least one network dataset. A target virtual private network (VPN) node corresponding to the target network dataset is determined in response to an access operation on the target network dataset. An accelerated access channel between the terminal and the target network dataset is established through the target VPN node. The initial user interface is switched to an accelerated user interface. The network data processing information is displayed on the accelerated user interface. The network data processing information indicates that the accelerated access channel is used for accessing the target network dataset.
TRANSPARENT TCP CONNECTION TUNNELING WITH IP PACKET FILTERING
Described embodiments provide systems and methods for tunneling data packets to a server. A computing device can include a processor and a network interface. The processor is configured to execute a network service, a local application, and a virtual private network (VPN) application. The network service can receive a packet from the local application for transmission via a VPN tunnel, the packet comprising a source address of the computing device and a source port associated with the local application. The network service can determine that the packet matches a first tunnel filter. The network service can encapsulate, responsive to the determination that the packet matches the first tunnel filter, the packet with the header comprising a localhost destination address and a destination port associated with the VPN application. The network service can provide the encapsulated packet to the VPN application.
FEDERATED SERVICE REGISTRIES FOR ACCESS PROVIDERS
Techniques for federated service registries are provided. A first access server determines a first plurality of services available within a local network associated with the first access server, as well as a second plurality of services available at one or more remote networks. A request for a first service is received from a client device, where the first service is not included in the first plurality of services and is included in the second plurality of services. A tunnel is established from the client device to one or more remote networks.
Systems and methods for extending application-aware routing to improve site encryption throughput performance
In one embodiment, a method includes establishing, by an identity agent installed on a device, a connection to a browser installed on the device and generating, by the identity agent, first device information, a public key, and a private key. The method also includes communicating, by the identity agent, the first device information and the public key to an authentication service and receiving, by the identity agent, a unique identifier from the authentication service. The method further includes generating, by the identity agent, a first signature of the first device information and communicating, by the identity agent, the first signature, the first device information, and the unique identifier to the browser.
Scalable mechanism for optimized application performance in SD-WAN
The present disclosure is directed to a mechanism for optimized application performance in SD-WAN, and includes the steps of receiving initial traffic packets at a first site for transmission to a second site; determining whether a direct tunnel is established between the first site and the second site based on a state of the second site, the state comprising an active state indicating that a direct tunnel is established between the first and second sites or an inactive state indicating that the direct tunnel is not established between the first and second sites; and in response to determining that the direct tunnel is not established, determining that the initial packets satisfy a configured trigger; forwarding the initial packets to the second site via a backup path; establishing the direct tunnel between the first and second sites; and forwarding subsequent traffic packets to the second site via the established direct tunnel.
Cyber protections of remote networks via selective policy enforcement at a central network
An enterprise organization may operate a central network and one or more remote networks, each comprising a plurality of computing devices. For protection against malicious actors, the central network may be configured to filter network traffic associated with the computing devices based on identified threats. Traffic corresponding to computing devices connected to the remote network may be tunneled to the central network for filtering by the central network. A tunnel gateway device, associated with the remote network, may efficiently identify which communications are associated with Internet threats, and tunnel such identified traffic to the central network, where actions may be taken to protect the enterprise network.
Systems and methods for convergence of network traffic after an interruption of a network device's link
Systems and methods are provided herein for a mechanism for faster convergence of network traffic after a network device's link is interrupted by leveraging the withdrawal of the ethernet virtual private network (EVPN) auto discovery (AD) route. This may be accomplished by a first device checking an ethernet segment identifier (ESI) status flag before generating an entry in the first device's forwarding table, where the entry is based on an IP route for a host received by a second network device. In response to receiving a withdrawal of an EVPN AD route from the second device, the first device may update the ESI status flag to indicate that the host on the ethernet segment (ES) is reachable only via the third device and update the entry that was based on the IP route for the host received by the second network device to prevent sending traffic to the host via the second device.
System for managing and controlling mesh virtual private network and method associated therewith
A system for managing and controlling a mesh VPN includes a management computing platform, a control computing platform, teleworker computing subsystems, and an office computing subsystem. The management computing platform provides deployment and management services to an organization for operation of a mesh VPN in a WAN in accordance with a service profile. The mesh VPN includes a hub node and a plurality of end nodes. Each end node communicates with the VPN hub node and with other end nodes via peer-to-peer paths. The control computing platform is the hub node and provide a control service for operation of the mesh VPN based on the service profile. The teleworker and office computing subsystems are end nodes. Various methods for operation of the computing platforms and subsystems in the mesh VPN are also provided.