Method for transparently managing outbound traffic from an internal user of a private network destined for a public network
First Claim
1. A method for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
- receiving a request from an internal user of a private network to access a public network element over an IP-compliant network;
assigning a proxy agent operable within said firewall to process said request;
determining, by said proxy agent, whether said internal user is authorized to access said public network element; and
if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network are disclosed. Embodiments include a firewall device operable between an internal user of a private network and an IP-compliant network. The firewall device being configured to assign a proxy agent to process a request by the internal user to form a connection with a public network element through the IP-compliant network. Disclosed embodiments include the proxy agent forming a connection only if the internal user is authorized to access the public requested network element.
54 Citations
20 Claims
-
1. A method for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
receiving a request from an internal user of a private network to access a public network element over an IP-compliant network;
assigning a proxy agent operable within said firewall to process said request;
determining, by said proxy agent, whether said internal user is authorized to access said public network element; and
if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A firewall device for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
a firewall device operable between an internal user of a private network and an IP-compliant network;
the firewall device being configured to;
assign a proxy agent to process a request by said internal user to form a connection with a public network element through said IP-compliant network; and
wherein the proxy agent forms a connection to said public network element if said internal user is authorized to access said public network element. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
means for receiving a request from an internal user of a private network to access a public network element over an IP-compliant network;
means for assigning a proxy agent operable within said firewall to process said request;
means for determining whether said internal user is authorized to access said public network element; and
means for forming a connection to said IP-compliant network element on behalf of said internal user if said user is authorized to access said public network element. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable device containing a set of instructions for causing a computer to perform a method for transparently managing outbound traffic from an internal user of a private network destined for a public network, the method comprising:
-
receiving a request from an internal user of a private network to access a public network element over an IP-compliant network;
assigning a proxy agent operable within said firewall to process said request;
determining, by said proxy agent, whether said internal user is authorized to access said public network element; and
if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user. - View Dependent Claims (17, 18, 19, 20)
-
Specification