Techniques for accessing logical networks via a virtualized gateway
First Claim
Patent Images
1. A system comprising:
- a computing device comprising a processor and a memory; and
machine readable instructions stored in the memory that, when executed by the processor of the computing device, cause the computing device to at least;
receive a first request from a client device to create a logical network, the first request comprising authentication credentials for the client device;
determine that the authentication credentials in the first request are valid;
create the logical network, the logical network comprising a logical network gateway;
receive a second request from the client device to connect to a logical network, the second request comprising the authentication credentials for the client device;
determine that the authentication credentials in the second request are valid;
establish an encrypted connection between the logical network gateway and the client device;
assign a logical network address to the client device; and
allocate an available second computing resource to the logical network gateway to augment a first computing resource assigned to the logical network gateway in response to usage of the first computing resource exceeding a threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for receiving, via a network, a request from a client to establish a network tunnel over the network. A credential is received from the client in order to establish the network tunnel. The client is authenticated based upon the credential. The client negotiates, via the network, to establish the network tunnel.
12 Citations
20 Claims
-
1. A system comprising:
-
a computing device comprising a processor and a memory; and machine readable instructions stored in the memory that, when executed by the processor of the computing device, cause the computing device to at least; receive a first request from a client device to create a logical network, the first request comprising authentication credentials for the client device; determine that the authentication credentials in the first request are valid; create the logical network, the logical network comprising a logical network gateway; receive a second request from the client device to connect to a logical network, the second request comprising the authentication credentials for the client device; determine that the authentication credentials in the second request are valid; establish an encrypted connection between the logical network gateway and the client device; assign a logical network address to the client device; and allocate an available second computing resource to the logical network gateway to augment a first computing resource assigned to the logical network gateway in response to usage of the first computing resource exceeding a threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method, comprising:
-
receiving, via a computing device, a first request from a client device to create a logical network, the first request comprising authentication credentials for the client device; determining, via a computing device, that the authentication credentials in the first request are valid; creating, via a computing device, the logical network, the logical network comprising a logical network gateway; receiving, via a computing device, a second request from the client device to connect to a logical network, the second request comprising the authentication credentials for the client device; determining, via a computing device, that the authentication credentials in the second request are valid; establishing, via the computing device, an encrypted connection between the logical network gateway and the client device; assigning, via the computing device, a logical network address to the client device; and allocating, via the computing device, an available second computing resource to the logical network gateway to augment a first computing resource assigned to the logical network gateway in response to usage of the first computing resource exceeding a threshold. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a computing device comprising a processor and a memory; and machine readable instructions stored in the memory that, when executed by the processor, cause the computing device to at least; receive a request from a client to establish an encrypted network tunnel to a logical network; receive a credential over the network from the client; authenticate the client based upon the credential; establish the encrypted network tunnel in response to authentication of the client; allocate a first computing resource to the encrypted network tunnel; monitor usage of the first computing resource to determine that consumption of the first computing resource exceeds a predefined threshold; and allocate an available second computing resource to the encrypted network tunnel to augment the first computing resource assigned to the encrypted network tunnel in response to a determination that consumption of the first computing resource exceeds the predefined threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification