Multi-tunneling virtual network adapter
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, from a virtual adapter operating in a kernel space portion of an operating system running on a computer system, a data packet by a routing component of a virtual private network (VPN) client, the routing component comprising a first routing table, and the VPN client residing in a user space portion of the operating system, wherein a second routing table of the operating system directs network traffic for virtual private networks to the virtual adapter;
identifying, by the routing component using the first routing table, a destination for the data packet;
creating, by the VPN client, a connection to a gateway corresponding to the destination for the data packet; and
transmitting the data packet to the destination via the gateway.
7 Assignments
0 Petitions
Accused Products
Abstract
Multiple virtual private network connections to be created without the need for administrative privileges, and network traffic to be routed using a single virtual adapter instead of a dedicated virtual adapter for each virtual network connection.
-
Citations
10 Claims
-
1. A computer-implemented method comprising:
-
receiving, from a virtual adapter operating in a kernel space portion of an operating system running on a computer system, a data packet by a routing component of a virtual private network (VPN) client, the routing component comprising a first routing table, and the VPN client residing in a user space portion of the operating system, wherein a second routing table of the operating system directs network traffic for virtual private networks to the virtual adapter; identifying, by the routing component using the first routing table, a destination for the data packet; creating, by the VPN client, a connection to a gateway corresponding to the destination for the data packet; and transmitting the data packet to the destination via the gateway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory, computer-readable medium storing instructions that, when executed, cause a computer system to:
-
receive, from a virtual adapter operating in a kernel space portion of an operating system running on the computer system, a data packet by a routing component of a virtual private network (VPN) client, the routing component comprising a first routing table, and the VPN client residing in a user space portion of the operating system, wherein a second routing table of the operating system directs network traffic for virtual private networks to the virtual adapter; identify, by the routing component using the first routing table, a destination for the data packet; create, by the VPN client, a connection to a gateway corresponding to the destination for the data packet; and transmit the data packet to the destination via the gateway.
-
-
10. A computer system comprising:
-
a processor; and non-transitory memory in communication with the processor and storing instructions that, when executed by the processor, cause the computer system to; receive, from a virtual adapter operating in a kernel space portion of an operating system running on the computer system, a data packet by a routing component of a virtual private network (VPN) client, the routing component comprising a first routing table, and the VPN client residing in a user space portion of the operating system, wherein a second routing table of the operating system directs network traffic for virtual private networks to the virtual adapter; identify, by the routing component using the first routing table, a destination for the data packet; create, by the VPN client, a connection to a gateway corresponding to the destination for the data packet; and transmit the data packet to the destination via the gateway.
-
Specification