Systems and methods for cloud bridging between public and private clouds
First Claim
Patent Images
1. A method comprising:
- establishing between a first intermediary device deployed for a private network and a second intermediary device deployed for a cloud network a secure layer 2 tunnel, wherein the cloud network is independent and disparate from the private network;
establishing, via the first intermediary device and the second intermediary device, a network bridge over the secure layer 2 tunnel, the network bridge extending internet protocol (IP) addressing of the private network to the cloud network to access resources hosted on the cloud network using an IP address of the private network; and
communicating, via the network bridge, a request from a first device on the private network to access a resource identified via the IP address of the private network, the resource hosted on a second device on the cloud network.
7 Assignments
0 Petitions
Accused Products
Abstract
The cloud bridge may comprise a tunnel between a datacenter network via a WAN to a cloud network. The cloud bridge makes cloud-hosted applications appear as though they are running on one contiguous enterprise network. With a cloud bridge in place, administrators, tools and the applications believe that the application resides on the enterprise network.
27 Citations
20 Claims
-
1. A method comprising:
-
establishing between a first intermediary device deployed for a private network and a second intermediary device deployed for a cloud network a secure layer 2 tunnel, wherein the cloud network is independent and disparate from the private network; establishing, via the first intermediary device and the second intermediary device, a network bridge over the secure layer 2 tunnel, the network bridge extending internet protocol (IP) addressing of the private network to the cloud network to access resources hosted on the cloud network using an IP address of the private network; and communicating, via the network bridge, a request from a first device on the private network to access a resource identified via the IP address of the private network, the resource hosted on a second device on the cloud network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a first intermediary device deployed for a private network; a second intermediary device deployed for a cloud network that is independent and disparate from the private network; a secure layer 2 tunnel established between the first intermediary device and the second intermediary device; a network bridge established via the first intermediary device and the second intermediary device, over the secure layer 2 tunnel, the network bridge extending internet protocol (IP) addressing of the private network to the cloud network to access resources hosted on the cloud network using an IP address of the private network; and wherein the first intermediary device communicates via the network bridge, a request from a first device on the private network to access a resource identified via the IP address of the private network, the resource hosted on a second device on the cloud network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification