NETWORK LOCATION DETERMINATION FOR DIRECT ACCESS NETWORKS
First Claim
1. A method of operating a client device (214, 234) when connected to a network (200) comprising a network firewall defining a network boundary, the client device (214, 234) supporting at least a first (726) and a second (728) behaviors, the method comprising:
- directing (712) a request to a network device (352), the network device (352) being connected to the network (200) and being adapted to provide at least a first response (720) or second response (730), different than the first response (720), to the request, the first response being provided when the request is received from a client device (214) within the network firewall connected to the network (200), and the second response (730) being provided when the request is received from a client device (234) connected to the network (200) outside the network firewall;
when the first response is detected, configuring the client device (214) to operate in accordance with the first behavior (726); and
when the second response is detected, configuring the client device (214) to operate in accordance with the second behavior (728).
4 Assignments
0 Petitions
Accused Products
Abstract
A client computer that supports different behaviors when connected to a private network behind a network firewall than when outside the network firewall and connected indirectly through an access device. The client computer is configured to attempt communication with a device on the network. Based on the response, the client computer can determine that it is behind the network firewall, and therefore can operate with less restrictive security or settings for other parameters appropriate for when the client is directly connected to the network. Alternatively, the client computer may determine that it is indirectly connected to the network through the Internet or other outside network, and therefore, because it is outside the private network firewall, should operate with more restrictive security or settings of other parameters more appropriate for use in that network location. The described approach operates even if the remote client computer has a direct connection to the network that enables it to authenticate with a domain controller.
96 Citations
20 Claims
-
1. A method of operating a client device (214, 234) when connected to a network (200) comprising a network firewall defining a network boundary, the client device (214, 234) supporting at least a first (726) and a second (728) behaviors, the method comprising:
-
directing (712) a request to a network device (352), the network device (352) being connected to the network (200) and being adapted to provide at least a first response (720) or second response (730), different than the first response (720), to the request, the first response being provided when the request is received from a client device (214) within the network firewall connected to the network (200), and the second response (730) being provided when the request is received from a client device (234) connected to the network (200) outside the network firewall; when the first response is detected, configuring the client device (214) to operate in accordance with the first behavior (726); and when the second response is detected, configuring the client device (214) to operate in accordance with the second behavior (728). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A client device 214 adapted for being connected to a network (200), the client device (214) comprising:
a computer storage medium comprising; a component that affects operations on the client device (214), the component operable in at least a first state and a second state; computer-executable instructions that, when executed, perform a method comprising; directing (712) a request to a network device (352), the request comprising a source address, including a source address portion, the network device (352) being adapted to provide at least a first response and a second response (730), the first response (720) to the request being provided when the source address portion matches a network address portion identifying the network and the second response (730) to the request being provided when the source address portion does not match the network address portion; when the first response is detected, configuring the component to operate in the first state (726); and when the second response is detected, configuring the component to operate in the second state (728). - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A system comprising,
a network (200); -
an access device (250) having at least one internal interface (354) and at least one external interface (356), the at least one internal interface being connected to devices within the network, and the at least one external interface being connected to remote devices, the access device adapted to couple network communications between the at least one internal interface and the at least one external interface; at least one network device (352) coupled to the network, the at least one network device being configured to make a first response (720) to a request received through the at least one internal interface and to make a second response (730) to a request from a device received through the at least one external interface; and a client device (234) coupled to the network through the at least one external interface, the client device being configured to; issue (712) the request; when the first response is received, operate in a first mode (726); and when the second response is received, operate in a second mode (728). - View Dependent Claims (17, 18, 19, 20)
-
Specification