Method and systems for securing remote access to private networks
First Claim
1. A method of accessing a server via an intermediary device between a client in a first network and the server in a second network, the method comprising:
- (a) establishing a secure application layer tunnel over a first transport layer connection between a client application executing on a client on a first network and a device intermediary between a server of a second network and the client, the device having a second transport layer connection between the device and the server;
(b) receiving, by the device from the client application via the secure application layer tunnel, a request of an application of the client to access the server, the client application receiving the request intercepted from a third transport layer connection of the application by a driver of the client,(c) forwarding, by the device via the second transport layer connection, the request to the server; and
(d) intercepting, by the device at a data link layer of the device, a response to the request transmitted from the server to the client.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets destined for a first system on a private network. A filter intercepts from the data link layer a packet in a second plurality of packets transmitted from a second system on the private network, destined for an system on a second network. A transmitter in communication with the receiver and the filter performing a network address translation on at least one intercepted packet and transmitting the at least one intercepted packet to a destination.
-
Citations
20 Claims
-
1. A method of accessing a server via an intermediary device between a client in a first network and the server in a second network, the method comprising:
-
(a) establishing a secure application layer tunnel over a first transport layer connection between a client application executing on a client on a first network and a device intermediary between a server of a second network and the client, the device having a second transport layer connection between the device and the server; (b) receiving, by the device from the client application via the secure application layer tunnel, a request of an application of the client to access the server, the client application receiving the request intercepted from a third transport layer connection of the application by a driver of the client, (c) forwarding, by the device via the second transport layer connection, the request to the server; and (d) intercepting, by the device at a data link layer of the device, a response to the request transmitted from the server to the client. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system of accessing a server via an intermediary device between a client in a first network and the server in a second network, the system comprising:
-
a client application executing on a client on a first network; a device intermediary between a server of a second network and the client a secure application layer tunnel established over a first transport layer connection between the client and the device, the device having a second transport layer connection between the device and the server; wherein the device receives from the client application via the secure application layer tunnel a request of an application of the client to access the server, the client application receiving the request intercepted from a third transport layer connection of the application by a driver of the client, and forwards the request to the server via the second transport layer connection; and wherein the device intercepts, at a data link layer of the device, a response to the request transmitted from the server to the client. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification