Providing security in a communication network
First Claim
1. A method comprising:
- receiving, by a network security device protecting a private network, information specifying a set of reputable websites deemed to be trustworthy from one or more web filtering services;
receiving, by the network security device, one or more directives from a network administrator of the private network via a graphical user interface (GUI) of the network security device identifying one or more security features of a plurality of security features implemented by the network security device that are to be disabled for the set of reputable websites;
intercepting, by the network security device, network traffic from an external network responsive to an application protocol request originated by a client device associated with the private network;
determining, by the network security device, whether the external network is among the set of reputable websites; and
when said determining is affirmative, foregoing application, by the network security device, of the one or more identified security features to the network traffic.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for optimizing system resources by selectively enabling various scanning functions of a network security device are provided. According to one embodiment, information specifying a set of reputable websites deemed to be trustworthy by one or more web filtering services is received by a network security device protecting a private network. One or more directives are received by the network security device from a network administrator via a GUI of the network security device identifying one or more security features that are to be disabled for the set of reputable websites. Network traffic is intercepted by the network security device from an external network. When it is determined by the network security device that the external network is among the set of reputable websites, the network security device foregoes application of the one or more identified security features to the network traffic.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a network security device protecting a private network, information specifying a set of reputable websites deemed to be trustworthy from one or more web filtering services; receiving, by the network security device, one or more directives from a network administrator of the private network via a graphical user interface (GUI) of the network security device identifying one or more security features of a plurality of security features implemented by the network security device that are to be disabled for the set of reputable websites; intercepting, by the network security device, network traffic from an external network responsive to an application protocol request originated by a client device associated with the private network; determining, by the network security device, whether the external network is among the set of reputable websites; and when said determining is affirmative, foregoing application, by the network security device, of the one or more identified security features to the network traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A network security device protecting a private network comprising:
-
at least one processor; and a computer-readable medium storing instructions that, when executed by the at least one processor, cause the at least one processor to perform a method comprising; receiving information specifying a set of reputable websites deemed to be trustworthy from one or more web filtering services; receiving one or more directives from a network administrator of the private network via a graphical user interface (GUI) of the network security device identifying one or more security features of a plurality of security features implemented by the network security device that are to be disabled for the set of reputable websites; intercepting network traffic from an external network responsive to an application protocol request originated by a client device associated with the private network; determining whether the external network is among the set of reputable web sites; and when said determining is affirmative, foregoing application of the one or more identified security features to the network traffic.
-
Specification