THIRD PARTY REMOTE ACCESS POINT ON ENTERPRISE NETWORK
20220330024 · 2022-10-13
Assignee
Inventors
Cpc classification
International classification
Abstract
A method for network communication is disclosed. The method includes configuring a remote access point to have restricted access to an enterprise network, wherein the remote access point and the enterprise network are disposed in a first physical facility, the restricted access providing a guest Internet service to the remote access point, establishing, via the enterprise network and the Internet, a secure communication tunnel based on the restricted access to connect the remote access point and a remote network disposed in a second physical facility separate from the first physical facility, and transmitting, using the remote access point and through the secure communication tunnel, network communication data packets between a plurality of user devices disposed in the first physical facility and the remote network disposed in the second physical facility.
Claims
1. A method for network communication, comprising: configuring a remote access point to have restricted access to an enterprise network, wherein the remote access point and the enterprise network are disposed in a first physical facility, the restricted access providing a guest Internet service to the remote access point; establishing, via the enterprise network and the Internet, a secure communication tunnel based on the restricted access to connect the remote access point and a remote network disposed in a second physical facility separate from the first physical facility; and transmitting, using the remote access point and through the secure communication tunnel, network communication data packets between a plurality of user devices disposed in the first physical facility and the remote network disposed in the second physical facility.
2. The method of claim 1, wherein the restricted service prevents the remote access point and the plurality of user devices from accessing any resource of the enterprise network except the guest Internet service.
3. The method of claim 1, wherein the remote access point is configured as a guest client to an access point of the enterprise network, wherein the access point is a single point of connection between the remote access point and the enterprise network to provide the restricted access.
4. The method of claim 3, wherein the remote access point and the access point are wireless access points that communicate wirelessly with each other.
5. The method of claim 4, wherein a portion of the secure communication tunnel is encapsulated within an existing network path of the enterprise network and connects between the remote access point and a first Internet gateway of the enterprise network, wherein the secure communication tunnel extends from the encapsulated portion through the Internet to reach a second Internet gateway of the remote network.
6. The method of claim 5, wherein the first Internet gateway and the second Internet gateway are wireless Internet gateways.
7. The method of claim 1, further comprising: configuring, from the remote network via the secure communication tunnel, at least a portion of a guest local area network disposed in the first physical facility and segregate from the enterprise network, wherein the plurality of user devices connect to the remote access point via the guest local area network.
8. A system for network communication, comprising: a remote access point and an enterprise network disposed in a first physical facility; a plurality of user devices coupled to the remote access point and disposed in the first physical facility; and a remote network disposed in a second physical facility separate from the first physical facility, wherein the remote access point is configured to have restricted access to the enterprise network, the restricted access providing a guest Internet service to the remote access point, wherein a secure communication tunnel is established, via the enterprise network and the Internet, to connect the remote access point and the remote network based on the restricted access, and wherein network communication data packets are transmitted, using the remote access point and through the secure communication tunnel, between the plurality of user devices disposed in the first physical facility and the remote network disposed in the second physical facility.
9. The system of claim 8, wherein the restricted service prevents the remote access point and the plurality of user devices from accessing any resource of the enterprise network except the guest Internet service.
10. The system of claim 8, wherein the remote access point is configured as a guest client to an access point of the enterprise network, wherein the access point is a single point of connection between the remote access point and the enterprise network to provide the restricted access.
11. The system of claim 10, wherein the remote access point and the access point are wireless access points that communicate wirelessly with each other.
12. The system of claim 11, wherein a portion of the secure communication tunnel is encapsulated within an existing network path of the enterprise network and connects between the remote access point and a first Internet gateway of the enterprise network, wherein the secure communication tunnel extends from the encapsulated portion through the Internet to reach a second Internet gateway of the remote network.
13. The system of claim 12, wherein the first Internet gateway and the second Internet gateway are wireless Internet gateways.
14. The system of claim 8, wherein the plurality of user devices connect to the remote access point via a guest local area network disposed in the first physical facility and segregate from the enterprise network, wherein the guest local area network is configured and managed from the remote network via the secure communication tunnel.
15. A non-transitory computer readable medium (CRM) storing computer readable program code for network communication, wherein the computer readable program code, when executed by a computer, comprises functionality for: configuring a remote access point to have restricted access to an enterprise network, wherein the remote access point and the enterprise network are disposed in a first physical facility, wherein the restricted access provides a guest Internet service to the remote access point; establishing, via the enterprise network and the Internet, a secure communication tunnel based on the restricted access to connect the remote access point and a remote network disposed in a second physical facility separate from the first physical facility; and transmitting, using the remote access point and through the secure communication tunnel, network communication data packets between a plurality of user devices disposed in the first physical facility and the remote network disposed in the second physical facility.
16. The non-transitory CRM of claim 15, wherein the restricted service prevents the remote access point and the plurality of user devices from accessing any resource of the enterprise network except the guest Internet service.
17. The non-transitory CRM of claim 15, wherein the remote access point is configured as a guest client to an access point of the enterprise network, wherein the access point is a single point of connection between the remote access point and the enterprise network to provide the restricted access.
18. The non-transitory CRM of claim 17, wherein the remote access point and the access point are wireless access points that communicate wirelessly with each other.
19. The non-transitory CRM of claim 18, wherein a portion of the secure communication tunnel is encapsulated within an existing network path of the enterprise network and connects between the remote access point and a first Internet gateway of the enterprise network, wherein the secure communication tunnel extends from the encapsulated portion through the Internet to reach a second Internet gateway of the remote network, and wherein the first Internet gateway and the second Internet gateway are wireless Internet gateways.
20. The non-transitory CRM of claim 15, the computer readable program code, when executed by the computer, comprises functionality for: configuring, from the remote network via the secure communication tunnel, at least a portion of a guest local area network disposed in the first physical facility and segregate from the enterprise network, wherein the plurality of user devices connect to the remote access point via the guest local area network.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0006] Specific embodiments of the disclosed technology will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.
[0007]
[0008]
[0009]
[0010]
DETAILED DESCRIPTION
[0011] Specific embodiments of the disclosure will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.
[0012] In the following detailed description of embodiments of the disclosure, numerous specific details are set forth in order to provide a more thorough understanding of the disclosure. However, it will be apparent to one of ordinary skill in the art that the disclosure may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description.
[0013] Throughout the application, ordinal numbers (e.g., first, second, third, etc.) may be used as an adjective for an element (i.e., any noun in the application). The use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as using the terms “before”, “after”, “single”, and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements. By way of an example, a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or precede) the second element in an ordering of elements.
[0014] Embodiments of the invention provide a method, a system, and a non-transitory computer readable medium for network communication. In one or more embodiments of the invention, a remote access point is configured to have restricted access to an enterprise network, where the remote access point and the enterprise network are disposed in a first physical facility, the restricted access providing a guest Internet service to the remote access point. Via the enterprise network and the Internet, a secure communication tunnel is established based on the restricted access to connect the remote access point and a remote network disposed in a second physical facility separate from the first physical facility. From the remote network via the secure communication tunnel, at least a portion of a guest local area network is configured, which is disposed in the first physical facility and segregate from the enterprise network. Multiple user devices connect to the remote access point via the guest local area network such that network communication data packets are transmitted between the user devices and the remote network using the remote access point and through the secure communication tunnel.
[0015]
[0016] As shown in
[0017] In one or more embodiments of the invention, the third party the remote access point (111a) is configured to have restricted access (112a) to the enterprise network (112), where the restricted access (112a) provides a guest Internet service to the third party remote access point (111a). The restricted service (112a) prevents the third party remote access point (111a) and the third party user devices (111b) from accessing any resource of the enterprise network (112) except the guest Internet service. In one or more embodiments, the third party remote access point (111a) is configured as a guest client to an access point (112b) of the enterprise network (112), where the access point (112b) is a single point of connection between the third party remote access point (111a) and the enterprise network (112) to provide the restricted access (112a). In one or more embodiments, the third party remote access point (111a) and the access point (112b) are wireless access points that communicate wirelessly with each other.
[0018] In one or more embodiments of the invention, a secure communication tunnel (111) is established, via the enterprise network (112) and the Internet (115), to connect the third party remote access point (111a) and the third party network (117) based on the restricted access (112a). In one or more embodiments, a portion of the secure communication tunnel (111) is encapsulated within an existing network path of the enterprise network (112) and connects between the third party remote access point (111a) and an enterprise Internet gateway (112c) of the enterprise network (112). The secure communication tunnel (111) extends from the encapsulated portion through the Internet (115) to reach a third party Internet gateway (116) of the third party network (117). In one or more embodiments, the enterprise Internet gateway (112c) and the third party Internet gateway (116) are wireless Internet gateways.
[0019] In one or more embodiments of the invention, the third party user devices (111b) connect to the third party remote access point (111a) via a guest local area network (111c) disposed in the enterprise facility (110). the guest local area network is segregate from the enterprise network (112) and is configured and managed from the third party network (117) via the secure communication tunnel (111).
[0020] In one or more embodiments of the invention, network communication data packets are transmitted, using the third party remote access point (111a) and through the secure communication tunnel (111), between the third party user devices (111b) and the third party network (117).
[0021] In one or more embodiments, the system (100) performs the functions described above using the method described in reference to
[0022]
[0023] Initially in Block 201, a remote access point is configured to have restricted access to an enterprise network. In particular, the remote access point and the enterprise network are disposed in a first physical facility, and the restricted access provides a guest Internet service to the remote access point.
[0024] In Block 202, via the enterprise network and the Internet, a secure communication tunnel is established based on the restricted access to connect the remote access point and a remote network disposed in a second physical facility separate from the first physical facility.
[0025] In Block 203, from the remote network via the secure communication tunnel, at least a portion of a guest local area network is configured to connect multiple user devices to the remote access point. In particular, the guest local area network and the user devices are disposed in the first physical facility and segregate from the enterprise network.
[0026] In Block 204, using the remote access point and through the secure communication tunnel, network communication data packets are transmitted between the user devices disposed in the first physical facility and the remote network disposed in the second physical facility.
[0027] By way of the system and method of
[0028]
[0029] As shown in
[0030] Within the company A facility (310), the remote access point (311a) is configured as an ethernet guest client based on ethernet standard 802.3 or a wireless guest client based on wireless standard 802.11 that is uplinked to an enterprise guest access point (312a) of the company A enterprise network (314). For example, the enterprise guest access point (312a) may be a wireless access point that connects wirelessly to the remote access point (311a) and controlled by a wireless controller (312b) of the company A enterprise network (314). The remote access point (311a) and the wireless controller (312b) form a guest Internet service interface, referred to as branch company A (312). In another example, the enterprise guest access point (312a) may include an Ethernet port providing a wired connection to the remote access point (311a). Guest Internet service is a limited network service for a user to access Internet via the company A enterprise network (314) without being able to access any other resource of the company A enterprise network (314). Utilizing the guest Internet access of the company A enterprise network (314), the remote access point (311a) connects to the company B network (317) over the Internet (315) via a wireless Internet controller (313c) of the company A network (314) within the company A facility (310) and a wireless Internet controller (316c) of the company B network (317) within the company B facility (318). For example, the wireless Internet controller (313c) and associated firewall devices (313a, 313b) may be part of the company A DMZ (demilitarized zone) (313) for isolating the company A enterprise network (314) from the Internet (315). Similarly, the wireless Internet controller (316c) and associated firewall devices (316a, 316b) may be part of a company B DMZ (316) for isolating the company B network (317) from the Internet (315).
[0031] The remote access point (311a) may be authenticated via a guest account credential (e.g., username/password) provided by the company A or authenticated by configuring the Ethernet port of the enterprise guest access point (312a) with restricted rules to only communicate with the wireless Internet controller (316c) of the company B network (317). In particular, authenticating access requests from computing devices (311b-311f) via the remote access point (311a) by way of the guest account credential or the Ethernet port configuration prevents the computing devices (311b-311f) from accessing any other computing resources of the company A aside from the guest Internet service. Within the guest local area network (311), the remote access point (311a) may be provisioned to have Ethernet connections, Wi-Fi, or both for connecting to the devices (311b-311f). Additional network devices (e.g., firewall, switch, router, etc.) within the guest local area network (311) may also be connected to the remote access point (311a) and managed from the company B network (316).
[0032] To provide segregation between the guest local area network (311) and the company A enterprise network (314), data communications between the computing devices (311b-311f) and the company B network (317) are routed through an IPSec tunnel (321) encapsulated within Generic Routing Encapsulation (GRE) tunnels (322) and (323), as depicted in
[0033] Embodiments may be implemented on a computing system. Any combination of mobile, desktop, server, router, switch, embedded device, or other types of hardware may be used. For example, as shown in
[0034] The computer processor(s) (402) may be an integrated circuit for processing instructions. For example, the computer processor(s) may be one or more cores or micro-cores of a processor. The computing system (400) may also include one or more input devices (410), such as a touchscreen, keyboard, mouse, microphone, touchpad, electronic pen, or any other type of input device.
[0035] The communication interface (412) may include an integrated circuit for connecting the computing system (400) to a network (not shown) (e.g., a local area network (LAN), a wide area network (WAN) such as the Internet, mobile network, or any other type of network) and/or to another device, such as another computing device.
[0036] Further, the computing system (400) may include one or more output devices (408), such as a screen (e.g., a liquid crystal display (LCD), a plasma display, touchscreen, cathode ray tube (CRT) monitor, projector, or other display device), a printer, external storage, or any other output device. One or more of the output devices may be the same or different from the input device(s). The input and output device(s) may be locally or remotely connected to the computer processor(s) (402), non-persistent storage (404), and persistent storage (406). Many different types of computing systems exist, and the aforementioned input and output device(s) may take other forms.
[0037] Software instructions in the form of computer readable program code to perform embodiments of the disclosure may be stored, in whole or in part, temporarily or permanently, on a non-transitory computer readable medium such as a CD, DVD, storage device, a diskette, a tape, flash memory, physical memory, or any other computer readable storage medium. Specifically, the software instructions may correspond to computer readable program code that, when executed by a processor(s), is configured to perform one or more embodiments of the disclosure.
[0038] The computing system (400) in
[0039] Although not shown in
[0040] The nodes (for example, node X (422), node Y (424)) in the network (420) may be configured to provide services for a client device (426). For example, the nodes may be part of a cloud computing system. The nodes may include functionality to receive requests from the client device (426) and transmit responses to the client device (426). The client device (426) may be a computing system, such as the computing system shown in
[0041] While the disclosure has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments can be devised which do not depart from the scope of the disclosure as disclosed herein. Accordingly, the scope of the disclosure should be limited only by the attached claims.