Method for transparently managing outbound traffic from an internal user of a private network destined for a public network
First Claim
1. A method for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
- receiving a request by a firewall from an internal user of a private network to access a public network element over an IP-compliant network;
assigning a proxy agent operable within said firewall to process said request;
determining, by said proxy agent, whether said internal user is authorized to access said public network element;
if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user; and
wherein a proxy agent is assigned to each request received by said firewall.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network are disclosed. Embodiments include a firewall device operable between an internal user of a private network and an IP-compliant network. The firewall device being configured to assign a proxy agent to process a request by the internal user to form a connection with a public network element through the IP-compliant network. Disclosed embodiments include the proxy agent forming a connection only if the internal user is authorized to access the public requested network element.
50 Citations
20 Claims
-
1. A method for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
receiving a request by a firewall from an internal user of a private network to access a public network element over an IP-compliant network; assigning a proxy agent operable within said firewall to process said request; determining, by said proxy agent, whether said internal user is authorized to access said public network element; if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user; and wherein a proxy agent is assigned to each request received by said firewall. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A firewall device for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
a firewall device operable between an internal user of a private network and an IP-compliant network; the firewall device being configured to; assign a proxy agent to process a request by said internal user to form a connection with a public network element through said IP-compliant network; wherein the proxy agent forms a connection to said public network element if said internal user is authorized to access said public network element; and wherein a proxy agent is assigned to each request received by said firewall. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for transparently managing outbound traffic from an internal user of a private network destined for a public network comprising:
-
means for receiving a request by a firewall from an internal user of a private network to access a public network element over an IP-compliant network; means for assigning a proxy agent operable within said firewall to process said request; means for determining whether said internal user is authorized to access said public network element; means for forming a connection to said IP-compliant network element on behalf of said internal user if said user is authorized to access said public network element; and means for assigning a proxy agent to each request received by said firewall. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable device containing a set of instructions for causing a computer to perform a method for transparently managing outbound traffic from an internal user of a private network destined for a public network, the method comprising:
-
receiving a request by a firewall from an internal user of a private network to access a public network element over an IP-compliant network; assigning a proxy agent operable within said firewall to process said request; determining, by said proxy agent, whether said internal user is authorized to access said public network element; if said user is authorized to access said public network element, then forming, by said proxy agent, a connection to said IP-compliant network element on behalf of said internal user; and wherein a proxy agent is assigned to each request received by said firewall. - View Dependent Claims (17, 18, 19, 20)
-
Specification