NEGOTIATION OF SECURITY PROTOCOLS AND PROTOCOL ATTRIBUTES IN SECURE COMMUNICATIONS ENVIRONMENT
First Claim
1. A method of communicatively connecting first and second endpoints, the method comprising:
- transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint;
based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints; and
forming the tunnel between the first and second endpoints based on the connection request.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods of communicatively connecting first and second endpoints are disclosed. One method includes transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint. The method further includes, based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints, and forming the tunnel between the first and second endpoints based on the connection request.
12 Citations
20 Claims
-
1. A method of communicatively connecting first and second endpoints, the method comprising:
-
transmitting from a first endpoint to a second endpoint a connection request, the connection request including an IP address of the second endpoint; based at least in part on the IP address of the second endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the first and second endpoints; and forming the tunnel between the first and second endpoints based on the connection request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of communicatively connecting endpoints in a network, the method comprising:
-
selecting an IPsec security protocol from among a plurality of security protocols available at the first endpoint, wherein selecting the IPsec security protocol is based at least in part on an IP address of a second endpoint; transmitting from a first endpoint to a second endpoint a connection request, the connection request identifying the IPsec security protocol; forming an IPsec-based tunnel between the first and second endpoints; selecting an IPsec security protocol from among a plurality of security protocols available at the first endpoint, wherein selecting the IPsec security protocol is based at least in part on an IP address of a third endpoint; receiving an indication from the third endpoint that the third endpoint does not natively support the IPsec security protocol; forming a second tunnel between the first and third endpoints, wherein the second tunnel uses a second security protocol other than the IPsec security protocol. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage device comprising computer-executable instructions stored thereon which, when executed, cause a computing system to perform a method of communicatively connecting to a remote endpoint, the method comprising:
-
transmitting to a remote endpoint a connection request, the connection request including an IP address of the remote endpoint; based at least in part on the IP address of the remote endpoint, selecting IPsec from among a plurality of available security protocols to first attempt to use in forming a tunnel between the computing system and the remote endpoint; and forming the tunnel between the computing system and the remote endpoint based on the connection request. - View Dependent Claims (20)
-
Specification