Method for transparently forming a connection to an element of a private network over an IP-compliant network
First Claim
1. A method for transparently forming a connection to an element of a private network over an IP-compliant network comprising:
- receiving an access request from an external user over the IP-compliant network to access the private network element;
assigning a proxy agent operable within said firewall to process said access request;
determining, by said proxy agent, whether said external user is authorized to access said private network element;
if said user is authorized to access said private network element, then forming, by said proxy agent, a connection to said private network element on behalf of said external user; and
wherein said firewall appears as the source of the connection to said external user.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for transparently forming a connection to an element of a private network over an IP-compliant network are disclosed. In disclosed embodiments, network devices such as firewalls are disclosed that are configured to receive an access request from an external user over the IP-compliant network to access the private network element and assign a proxy agent process said access request. The proxy agent then determines whether the external user is authorized to access the private network element. If the user is authorized, then the proxy agent forms a connection to the private network element on behalf of the external user such that the network device appears as the source of the connection to the external user.
82 Citations
20 Claims
-
1. A method for transparently forming a connection to an element of a private network over an IP-compliant network comprising:
-
receiving an access request from an external user over the IP-compliant network to access the private network element;
assigning a proxy agent operable within said firewall to process said access request;
determining, by said proxy agent, whether said external user is authorized to access said private network element;
if said user is authorized to access said private network element, then forming, by said proxy agent, a connection to said private network element on behalf of said external user; and
wherein said firewall appears as the source of the connection to said external user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network device for transparently forming a connection to an element of a private network over an IP-compliant network comprising:
-
a network device disposed between the IP-compliant network and the element of the private network, said network device configured to;
receive an access request from an external user to access the private network element;
assign a proxy agent to process said access request; and
the proxy agent being configured to determine whether said external user is authorized to access said private network element and form a connection to said private network element on behalf of said external user if said user is authorized to access said private network element; and
wherein said device appears as the source of the connection to said external user. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for transparently forming a connection to an element of a private network over an IP-compliant network comprising:
-
means for receiving an access request from an external user over the IP-compliant network to access the private network element;
means for assigning a proxy agent operable within said apparatus to process said access request;
means for determining, by said proxy agent, whether said external user is authorized to access said private network element;
means for forming a connection to said private network element on behalf of said external user if said user is authorized to access said private network element; and
wherein said apparatus appears as the source of the connection to said external user. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable device containing a set of computer instructions to perform a method for transparently forming a connection to an element of a private network over an IP-compliant network, the method comprising:
-
receiving an access request from an external user over the IP-compliant network to access the private network element;
assigning a proxy agent operable within said firewall to process said access request;
determining, by said proxy agent, whether said external user is authorized to access said private network element;
if said user is authorized to access said private network element, then forming, by said proxy agent, a connection to said private network element on behalf of said external user; and
wherein said firewall appears as the source of the connection to said external user. - View Dependent Claims (17, 18, 19, 20)
-
Specification