PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.
9 Citations
57 Claims
-
1-30. -30. (canceled)
-
31. A computer-implemented method comprising:
-
receiving, by one or more computing systems configured to provide a network service, configuration information for a virtual network having multiple computing nodes, the configuration information being received via a programmatic interface of the network service; configuring, by the one or more configured computing systems and based on the received configuration information, a virtual border router to control access of the multiple computing nodes to external nodes that are not part of the virtual network, the configuring of the virtual border router including establishing a private virtual connection between the multiple computing nodes and one or more first external nodes that are part of an indicated remote private computer network; and providing, by the one or more configured computing systems, emulated functionality of the configured virtual border router to manage communications of the multiple computing nodes in accordance with the received configuration information. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A non-transitory computer-readable medium having stored contents that configure a computing device to perform a method, the method comprising:
-
configuring, by the configured computing device, one or more physical computing systems to provide multiple virtual computing nodes as at least part of a virtual network in accordance with configuration information received from a client via a programmatic interface; and establishing, by the configured computing device, a private virtual connection between the multiple virtual computing nodes of the virtual network and one or more computing nodes of a remote private computer network associated with the client, the establishing of the private virtual connection including providing emulated functionality of one or more virtual networking devices in accordance with the received configuration information to manage communications of the provided virtual computing nodes. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A system, comprising:
-
one or more processors; and a memory including instructions that, upon execution by at least one of the one or more processors, cause the system to; configure at least one of multiple virtual computing nodes of a virtual network for a client in accordance with configuration information received from the client via a programmatic interface; provide access to the at least one virtual computing node for a remote computer network of the client, the provided access including a private virtual connection between the at least one virtual computing node of the virtual network and one or more nodes of the remote computer network; and in accordance with the received configuration information, configure one or more virtual networking devices to manage communications of the at least one virtual computing node. - View Dependent Claims (55, 56, 57)
-
Specification