Systems and methods for protecting network devices by a firewall
First Claim
Patent Images
1. A computer-implemented method, comprising:
- in response to a request from a client device, establishing, by a computer system, a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network;
in response to an update to a policy after establishing the network tunnel, receiving, by the computer system from the client device, a first token; and
in response to receiving the first token, updating, by the computer system, at least one of the firewall rules in real-time while the network tunnel is active.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method, including: in response to a request from a client device, establishing a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network; in response to an update to a policy after establishing the network tunnel, receiving a first token; and in response to receiving the first token, updating at least one of the firewall rules while the network tunnel is active.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
in response to a request from a client device, establishing, by a computer system, a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network; in response to an update to a policy after establishing the network tunnel, receiving, by the computer system from the client device, a first token; and in response to receiving the first token, updating, by the computer system, at least one of the firewall rules in real-time while the network tunnel is active. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
at least one processor; and a non-transitory computer readable storage medium storing instructions programmed to instruct the at least one processor to; in response to a request from a client device, establish a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network; in response to an update to a policy after establishing the network tunnel, receive a first token; and in response to receiving the first token, update at least one of the firewall rules in real-time while the network tunnel is active. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer readable storage medium storing instructions configured to instruct a computing system to:
-
in response to a request from a client device, establish a network tunnel between the client device and a gateway, the gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in a private network; in response to an update to a policy after establishing the network tunnel, receive a first token; and in response to receiving the first token, update at least one of the firewall rules while the network tunnel is active. - View Dependent Claims (18, 19, 20)
-
Specification