H04L12/4633

METHODS AND APPARATUS TO IMPLEMENT A VIRTUAL PRIVATE NETWORK WITH PROBE FOR NETWORK CONNECTIVITY
20230049551 · 2023-02-16 ·

Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed. An example non-transitory computer readable storage medium is disclosed comprising instructions which, when executed, cause a machine to at least, in response to a first instruction from an operating system to establish a network tunnel, transmit a probe request to a server; and in response to not receiving, from the server, a probe response to the probe request, report that the network tunnel has been established to prevent the operating system from transmitting subsequent instructions to establish the network connection until a response to a probe request is received.

DEPLOYMENT OF NETWORK-RELATED FEATURES OVER CLOUD NETWORKS

Briefly, methods and/or apparatuses of virtual deployment of network-related features are disclosed.

TRANSPARENT TCP CONNECTION TUNNELING WITH IP PACKET FILTERING

Described embodiments provide systems and methods for tunneling data packets to a server. A computing device can include a processor and a network interface. The processor is configured to execute a network service, a local application, and a virtual private network (VPN) application. The network service can receive a packet from the local application for transmission via a VPN tunnel, the packet comprising a source address of the computing device and a source port associated with the local application. The network service can determine that the packet matches a first tunnel filter. The network service can encapsulate, responsive to the determination that the packet matches the first tunnel filter, the packet with the header comprising a localhost destination address and a destination port associated with the VPN application. The network service can provide the encapsulated packet to the VPN application.

FEDERATED SERVICE REGISTRIES FOR ACCESS PROVIDERS
20230051134 · 2023-02-16 ·

Techniques for federated service registries are provided. A first access server determines a first plurality of services available within a local network associated with the first access server, as well as a second plurality of services available at one or more remote networks. A request for a first service is received from a client device, where the first service is not included in the first plurality of services and is included in the second plurality of services. A tunnel is established from the client device to one or more remote networks.

Systems and methods for extending application-aware routing to improve site encryption throughput performance

In one embodiment, a method includes establishing, by an identity agent installed on a device, a connection to a browser installed on the device and generating, by the identity agent, first device information, a public key, and a private key. The method also includes communicating, by the identity agent, the first device information and the public key to an authentication service and receiving, by the identity agent, a unique identifier from the authentication service. The method further includes generating, by the identity agent, a first signature of the first device information and communicating, by the identity agent, the first signature, the first device information, and the unique identifier to the browser.

Scalable mechanism for optimized application performance in SD-WAN

The present disclosure is directed to a mechanism for optimized application performance in SD-WAN, and includes the steps of receiving initial traffic packets at a first site for transmission to a second site; determining whether a direct tunnel is established between the first site and the second site based on a state of the second site, the state comprising an active state indicating that a direct tunnel is established between the first and second sites or an inactive state indicating that the direct tunnel is not established between the first and second sites; and in response to determining that the direct tunnel is not established, determining that the initial packets satisfy a configured trigger; forwarding the initial packets to the second site via a backup path; establishing the direct tunnel between the first and second sites; and forwarding subsequent traffic packets to the second site via the established direct tunnel.

Cyber protections of remote networks via selective policy enforcement at a central network

An enterprise organization may operate a central network and one or more remote networks, each comprising a plurality of computing devices. For protection against malicious actors, the central network may be configured to filter network traffic associated with the computing devices based on identified threats. Traffic corresponding to computing devices connected to the remote network may be tunneled to the central network for filtering by the central network. A tunnel gateway device, associated with the remote network, may efficiently identify which communications are associated with Internet threats, and tunnel such identified traffic to the central network, where actions may be taken to protect the enterprise network.

System for managing and controlling mesh virtual private network and method associated therewith

A system for managing and controlling a mesh VPN includes a management computing platform, a control computing platform, teleworker computing subsystems, and an office computing subsystem. The management computing platform provides deployment and management services to an organization for operation of a mesh VPN in a WAN in accordance with a service profile. The mesh VPN includes a hub node and a plurality of end nodes. Each end node communicates with the VPN hub node and with other end nodes via peer-to-peer paths. The control computing platform is the hub node and provide a control service for operation of the mesh VPN based on the service profile. The teleworker and office computing subsystems are end nodes. Various methods for operation of the computing platforms and subsystems in the mesh VPN are also provided.

Communication control method, communication control device, and computer program

A communication control method which performs route control in a communication system comprising: a specific network constituting the Internet; a first network configured to accommodate a specific device connected to the specific network; a second network provided between the specific network and the first network; and a processing device configured to perform predetermined processing on the basis of a packet transmitted between the specific network and the first network, the communication control method comprising: causing a path setting device in the communication system to execute a communication route-setting process comprised of, in accordance with first routing information defining a path leading from the first network to the specific network to be branched in the second network, controlling a path so that a first path of the branched path is set as a path via the processing device, and a second path of the branched path is set as a path leading to the specific network.

Techniques for extending a cellular quality of service bearer through an enterprise fabric

Techniques are described for extending a cellular quality of service bearer through an enterprise fabric network. In one example, a method obtaining, by a first switch of a network, a packet to be delivered to a client connected to the network via a cellular access point; identifying quality of service (QoS) bearer information associated with the packet, wherein the QoS bearer information is associated with a radio access bearer for the client and the QoS bearer information comprises a bearer indicator and a QoS class identifier; providing a fabric tunnel encapsulation for the packet, wherein the bearer indicator and the QoS class identifier are included within the fabric tunnel encapsulation of the packet; and forwarding the packet within the fabric tunnel encapsulation toward a second switch of the network via a fabric tunnel, wherein the cellular access point is connected to the network via the second switch.