Method and apparatus for activating alternative virtual private network protocols
First Claim
1. A method for selecting a Virtual Private Network (VPN) protocol in accessing a communication network, comprising:
- testing a first VPN protocol from a plurality of available VPN protocols to signal to an endpoint device by an edge component of said communication network over an access network; and
selecting an alternative VPN protocol from said plurality of available VPN protocols to signal to said endpoint device by said edge component of said communication network over said access network if said first VPN protocol is blocked by said access network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for enabling enterprise customers to detect VPN protocol blocking by access network providers and provides client VPN software with instructions to activate another VPN protocol such as Secure Socket Layer (SSL) that is less likely to be blocked by their provider are disclosed. For instance, if the access network provider blocks the IPSec VPN protocol, the client VPN software will switch to an alternative VPN protocol, such as Secure Socket Layer (SSL) protocol, Layer 2 Tunneling Protocol (L2TP), or Point-to-Point Tunneling Protocol (PPTP), to connect to the VoIP network. The SSL, L2TP, and PPTP protocols are all VPN protocols designed to enable encrypted and authenticated communications across the public Internet.
18 Citations
20 Claims
-
1. A method for selecting a Virtual Private Network (VPN) protocol in accessing a communication network, comprising:
-
testing a first VPN protocol from a plurality of available VPN protocols to signal to an endpoint device by an edge component of said communication network over an access network; and
selecting an alternative VPN protocol from said plurality of available VPN protocols to signal to said endpoint device by said edge component of said communication network over said access network if said first VPN protocol is blocked by said access network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium having stored thereon a plurality of instructions, the plurality of instructions including instructions which, when executed by a processor, cause the processor to perform the steps of a method for selecting a Virtual Private Network (VPN) protocol in accessing a communication network, comprising:
-
testing a first VPN protocol from a plurality of available VPN protocols to signal to an endpoint device by an edge component of said communication network over an access network; and
selecting an alternative VPN protocol from said plurality of available VPN protocols to signal to said endpoint device by said edge component of said communication network over said access network if said first VPN protocol is blocked by said access network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus for selecting a Virtual Private Network (VPN) protocol in accessing a communication network, comprising:
-
means for testing a first VPN protocol from a plurality of available VPN protocols to signal to an endpoint device by an edge component of said communication network over an access network; and
means for selecting an alternative VPN protocol from said plurality of available VPN protocols to signal to said endpoint device by said edge component of said communication network over said access network if said first VPN protocol is blocked by said access network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification