Rule-based routing to resources through a network
First Claim
1. A method of creating redirection rules for routing resource access requests from a computer to a network, the method comprising:
- receiving, using a hardware processor, input at a user interface that identifies an inclusion redirection rule to associate with a resource, wherein a processor executing instructions out of a memory creates creating an inclusion redirection rule for at least one existing resource definition that is associated with the resource;
receiving an input over the user interface that identifies an exclusion redirection rule to associate with the resource the input associated with an exclusion resource definition, wherein the processor executing instructions out of the memory creates an exclusion redirection rule for the exclusion resource definition that is associated with the resource;
receiving a request to access an internet protocol (IP) address over a network interface;
ignoring the request to access the IP address after comparing an IP address range size associated with the inclusion redirection rule with an IP address range size associated with the exclusion redirection rule, and when the IP address exclusion rule range size matches the IP address inclusion rule range size.
20 Assignments
0 Petitions
Accused Products
Abstract
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e.g., retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
137 Citations
14 Claims
-
1. A method of creating redirection rules for routing resource access requests from a computer to a network, the method comprising:
-
receiving, using a hardware processor, input at a user interface that identifies an inclusion redirection rule to associate with a resource, wherein a processor executing instructions out of a memory creates creating an inclusion redirection rule for at least one existing resource definition that is associated with the resource; receiving an input over the user interface that identifies an exclusion redirection rule to associate with the resource the input associated with an exclusion resource definition, wherein the processor executing instructions out of the memory creates an exclusion redirection rule for the exclusion resource definition that is associated with the resource; receiving a request to access an internet protocol (IP) address over a network interface; ignoring the request to access the IP address after comparing an IP address range size associated with the inclusion redirection rule with an IP address range size associated with the exclusion redirection rule, and when the IP address exclusion rule range size matches the IP address inclusion rule range size. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification