Configuring a Perimeter Network
First Claim
Patent Images
1. A method of setting up a network for an Internet enabled application comprising:
- determining whether a security server application is present;
if the security server application is not present, installing the security server application;
determining a version of the security server application;
if the version of the security server application is not satisfactory, installing an acceptable version of the security server application;
determining a number of network cards on the network;
if the number of network cards on the network is not a desired number, requesting that the desired number of network cards be installed on the network;
determining if the network cards on the network are active;
if the network cards are not active, requesting that the network cards be made active;
configuring the security server application by collecting internet protocol (IP) addresses of an Internet server and of a domain controller on the network;
storing the IP address for the Internet server and the domain controller;
validating the IP address for the Internet server and the domain controller;
if the IP addresses cannot be validated, requesting that the IP addresses be corrected;
communicating rules for the network to be used by the security server; and
selecting applications to be available over the network.
2 Assignments
0 Petitions
Accused Products
Abstract
Given a three legged network setup, the method will automatically check necessary settings to ensure that a business application can be set up to be available over the Internet.
-
Citations
18 Claims
-
1. A method of setting up a network for an Internet enabled application comprising:
-
determining whether a security server application is present; if the security server application is not present, installing the security server application; determining a version of the security server application; if the version of the security server application is not satisfactory, installing an acceptable version of the security server application; determining a number of network cards on the network; if the number of network cards on the network is not a desired number, requesting that the desired number of network cards be installed on the network; determining if the network cards on the network are active; if the network cards are not active, requesting that the network cards be made active; configuring the security server application by collecting internet protocol (IP) addresses of an Internet server and of a domain controller on the network; storing the IP address for the Internet server and the domain controller; validating the IP address for the Internet server and the domain controller; if the IP addresses cannot be validated, requesting that the IP addresses be corrected; communicating rules for the network to be used by the security server; and selecting applications to be available over the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system comprising a processor for executing computer executable code, a memory for storing data and computer executable code and an input/output circuit comprising computer executable instructions for setting up a network for an Internet enabled application comprising:
-
determining whether a security server application is present; if the security server application is not present; requesting that the security server application be installed; and stopping until the security server application is installed; determining a version of the security server application; if the version of the security server application is not satisfactory; requesting that the proper version of the security server application be installed; and stopping until the proper version of the security server application is installed; determining a number of network cards on the network; if the number of network cards on the network is not a desired number; requesting that the desired number of network cards be installed on the network; and stopping until the desired number of network cards is installed; determining if the network cards on the network are active; if the network cards are not active, requesting that the network cards be made active; configuring the security server application by collecting internet protocol (IP) addresses of an Internet server and of a domain controller on the network; storing the IP addresses for the Internet server and the domain controller; validating the IP addresses for the Internet server and the domain controller; if the IP addressees cannot be validated, requesting that the IP addresses be corrected; storing data related to the progress of the method; offering suggestions on how to validate the IP addresses; and allowing corrections to validate the IP addresses and if the IP addresses cannot be validated, stopping the method; and selecting applications to be available over the network. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer readable medium for storing computer executable code wherein the computer executable code comprises instructions for a method of setting up a network for an Internet enabled application comprising:
-
determining whether an internet security and acceleration (ISA) server application is present; if an ISA server application is not present; storing data related to the progress of the method; requesting that ISA be installed; and stopping the method until ISA is installed; determining a version of the ISA server application; if the version of the ISA server application is not satisfactory storing data related to the progress of the method; requesting that the proper version of the ISA be installed; and stopping the method until the proper version of the ISA is installed; determining if there are three network cards on the network; if the number of network cards on the network is not three; storing data related to the progress of the method; requesting that three network cards be installed on the network; and stopping the method. determining if the network cards on the network are active; if the network cards are not active, requesting that the network cards be made active; configuring the ISA server application by collecting internet protocol (IP) addresses of an internet information services (IIS) server and of a domain controller on the network; storing the IP address for the IIS server and the domain controller; validating the IP address for the IIS server and the domain controller; if the IP addresses cannot be validated, requesting that the P addresses be corrected; storing data related to the progress of the method; offering suggestions on how to validate the IP addresses; and allowing corrections to validate the IP addresses and if the IP addresses cannot be validated, stopping the method; and selecting applications to be available over the network. - View Dependent Claims (17, 18)
-
Specification