METHODS AND APPARATUS FOR PROVIDING A SECURE OVERLAY NETWORK BETWEEN CLOUDS
First Claim
1. A method for providing network communication, comprising:
- receiving a first request from a dashboard managed by an orchestrator for establishing a secure overlay network (“
SON”
) able to facilitate a point-to-point connection from a first node in a first cloud over a communication network;
receiving a second request for connecting to the SON from a second node in a second cloud over the communication network; and
establishing a first connection between a first port of the first node and the second port of the second node utilizing a network security protocol.
6 Assignments
0 Petitions
Accused Products
Abstract
A process capable of automatically establishing a secure overlay network (“SON”) across different clouds is disclosed. The process, in one aspect, receives a first request from a first node in a first cloud for establishing a SON. After receiving a second request for connecting to the SON from a second node in a second cloud, a first connection is established connecting between the first node and the second node utilizing a network security protocol such as Internet Protocol Security (“IPSec”). After receiving a third request for connecting to the SON from a third node in a third cloud, a second connection is used to connect between the first node and the third node. A third connection is used to connect between the second node and the third node. Each subsequent request for connecting to the SON from a new node results in new connections between the new node and each existing node in the SON forming a full-mesh.
163 Citations
21 Claims
-
1. A method for providing network communication, comprising:
-
receiving a first request from a dashboard managed by an orchestrator for establishing a secure overlay network (“
SON”
) able to facilitate a point-to-point connection from a first node in a first cloud over a communication network;receiving a second request for connecting to the SON from a second node in a second cloud over the communication network; and establishing a first connection between a first port of the first node and the second port of the second node utilizing a network security protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A communication network having a plurality of virtual machines (“
- VMs”
), comprising;a first private cloud able to provide network services to a plurality of users, the first private cloud configured to contain at least a first server having a first input and output (“
I/O”
) port;a public cloud coupled to the first private network cloud via a communication network and configured to provide cloud computing service to users; and an orchestrator coupled to the first private cloud and the public cloud, wherein the orchestrator is able to establish a first point-to-point connection between the first I/O port of the first server and a second I/O port of a second server in the public cloud in accordance with network security protocol. - View Dependent Claims (11, 12, 13, 14, 15)
- VMs”
-
16. A method for generating network connections, comprising:
-
presenting a dashboard including an option of creating a secure overlay network (“
SON”
) to a user by an orchestrator via a communication network;receiving a first selection requesting a first SON for point-to-point connections from a first virtual server in a first cloud over the communication network; receiving a second selection requesting the first SON and a second SON from a second virtual server in a second cloud over the communication network; and establishing a first point-to-point connection between the first virtual server and the second virtual server in accordance with the first SON utilizing a network security protocol. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification