Simplified method of configuring internet protocol security tunnels
First Claim
1. A method of providing secure data traffic between a local and remote host systems comprising the steps of:
- defining a first tunnel; and
autogenerating, in response to the definition of the first tunnel, a first filter, said first filter including rules for permitting or denying acceptance of inbound data and for permitting or denying transmission of outbound data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of securing data traffic between a local and remote host systems is provided. The method includes autogenerating a filter having rules associated with a defined tunnel. The filter rules are used to permit or deny acceptance of transmitted data by the host system and to direct traffic to the tunnel. The tunnel, on the other hand, is used to keep data confidential. The method further includes autogeneration of a counterpart tunnel and associated filter to be used by the remote host when in communication with the local host. The method further autogenerates a new filter to reflect changes to any one of the tunnels and autodeactivates the filter associated with a deleted tunnel.
-
Citations
16 Claims
-
1. A method of providing secure data traffic between a local and remote host systems comprising the steps of:
-
defining a first tunnel; and autogenerating, in response to the definition of the first tunnel, a first filter, said first filter including rules for permitting or denying acceptance of inbound data and for permitting or denying transmission of outbound data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for use with a computer system, said computer program product having computer readable program code means embodied in a medium, said computer program code means comprising:
-
program code means for defining a first tunnel; and program code means for autogenerating, in response to the definition of the first tunnel, a first filter, said first filter including rules for permitting or denying acceptance of inbound data and for permitting or denying transmission of outbound data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification