×

Wireless network having multiple security interfaces

  • US 8,799,991 B2
  • Filed: 08/31/2012
  • Issued: 08/05/2014
  • Est. Priority Date: 02/07/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • identifying, by a network device and upon receipt of network traffic at the network device, a source zone and a destination zone,the network device being associated with the source zone, the destination zone, and another source zone,the network traffic being received from the source zone and being intended for a network resource associated with the destination zone,the network resource being identified using a destination address included in the network traffic,the source zone being associated with a first wireless network and the destination zone being associated with a second wireless network, andthe first wireless network and the second wireless network being established between the network device and a plurality of devices prior to the network traffic being received;

    identifying, by the network device, a first security policy and a second security policy to be applied to the network traffic,the first security policy being associated with the identified source zone,the second security policy being associated with the identified destination zone,the first security policy being different than the second security policy,a third security policy being associated with the other source zone;

    applying, by the network device, the identified first security policy and the identified second security policy to the network traffic to determine whether to permit access to the network resource,the third security policy being applied to additional network traffic, associated with the other source zone and the destination zone, to determine whether the additional network traffic is to be forwarded to the network resource when the additional network traffic is received; and

    selectively forwarding the network traffic to the network resource based on applying the identified first security policy and the identified second security policy to the network traffic.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×