Secure, standards-based communications across a wide-area network
First Claim
Patent Images
1. A method of facilitating secure communications between an enterprise network and a user communicating over a wide-area network accessible to the enterprise network, the method comprising:
- generating a set of encapsulated packets, generating the set of encapsulated packets further including encapsulating, within a first protocol, data packets originating with the user, wherein the user-originated data packets are encoded in a second protocol, and the second protocol is below the first protocol in a hierarchy of protocols;
transmitting the encapsulated packets to the enterprise network over the wide-area network;
receiving the encapsulated packets at the enterprise network;
un-encapsulating the encapsulated packets to retrieve the user-originated data packets encoded in the second protocol;
forwarding the user-originated data packets across the enterprise network via the second protocol.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention includes systems and methods to extend security from enterprise networks to wide-area networks by allowing secure connectivity to the enterprise layer 2 network across a wide-area layer 3 network, such as the Internet
-
Citations
11 Claims
-
1. A method of facilitating secure communications between an enterprise network and a user communicating over a wide-area network accessible to the enterprise network, the method comprising:
-
generating a set of encapsulated packets, generating the set of encapsulated packets further including encapsulating, within a first protocol, data packets originating with the user, wherein the user-originated data packets are encoded in a second protocol, and the second protocol is below the first protocol in a hierarchy of protocols;
transmitting the encapsulated packets to the enterprise network over the wide-area network;
receiving the encapsulated packets at the enterprise network;
un-encapsulating the encapsulated packets to retrieve the user-originated data packets encoded in the second protocol;
forwarding the user-originated data packets across the enterprise network via the second protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification