Tunnel interface for securing traffic over a network
First Claim
1. A method comprising:
- receiving, by a service management system (SMS) of a managed security service provider, a request to establish an Internet Protocol (IP) connection between a first location of the managed security service provider and a second location of the managed security service provider; and
establishing, by the SMS, a tunnel between a first service processing switch of the managed security service provider and a second service processing switch of the managed security service provider coupled in communication with the first service processing switch through a public network byassociating a first packet routing node within the first service processing switch with the first location;
associating a second packet routing node within the second service processing switch with the second location;
binding an encryption configuration decision associated with the request with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting an encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting a decryption node of the first service processing switch into a second path between the second location and the first location; and
binding the encryption configuration decision with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided. According to one embodiment, a method is provided for delivering customized network services to subscribers of the service provider. A request is received, at a service management system (SMS) of the service provider, to establish an Internet Protocol (IP) connection between a first and second location of a first subscriber of the managed security service provider. Responsive to the request, the SMS causes a tunnel to be established between a first and second service processing switch of the service provider which are coupled in communication via a public network and associated with the first location and the second location, respectively.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, by a service management system (SMS) of a managed security service provider, a request to establish an Internet Protocol (IP) connection between a first location of the managed security service provider and a second location of the managed security service provider; and establishing, by the SMS, a tunnel between a first service processing switch of the managed security service provider and a second service processing switch of the managed security service provider coupled in communication with the first service processing switch through a public network by associating a first packet routing node within the first service processing switch with the first location; associating a second packet routing node within the second service processing switch with the second location; binding an encryption configuration decision associated with the request with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting an encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting a decryption node of the first service processing switch into a second path between the second location and the first location; and binding the encryption configuration decision with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a service management system (SMS) configured to operate within a network of a managed security service provider; a first service processing switch configured to operate within the network; a second service processing switch configured to operate within the network and to be coupled to the first service processing switch via a public network; wherein the SMS is further configured to; receive a request to establish an Internet Protocol (IP) connection between a first location of the managed security service provider and a second location of the managed security service provider; and cause a tunnel to be established between the first service processing switch and the second service processing switch by causing a first packet routing node within the first service processing switch to be associated with the first location; cause a second packet routing node within the second service processing switch to be associated with the second location; cause an encryption configuration decision associated with the request to be bound with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting an encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting decryption node of the first service processing switch into a second path between the second location and the first location; and cause the encryption configuration decision to be bound with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium tangibly embodying a set of instructions, which when executed by one or more processors of a service management system (SMS) of a managed security service provider, cause the one or more processors to perform a method comprising:
-
receiving a request to establish an Internet Protocol (IP) connection between a first location of the managed security service provider and a second location of the managed security service provider; and causing to be established a tunnel between a first service processing switch of the managed security service provider and a second service processing switch of the managed security service provider coupled in communication with the first service processing switch through a public network by causing a first packet routing node within the first service processing switch to be associated with the first location; causing a second packet routing node within the second service processing switch to be associated with the second location; causing an encryption configuration decision associated with the request to be bound with a routing configuration of the first packet routing node, by, when the request is to establish a secure IP connection, configuring, the first packet routing node (i) to cause all packets transmitted from the first location to the second location to be encrypted prior to transmission through the public network by inserting encryption node of the first service processing switch into a first path between the first location and the second location and (ii) to cause all packets received from the second location to be decrypted after transmission through the public network by inserting a decryption node of the first service processing switch into a second path between the second location and the first location; and causing the encryption configuration decision to be bound with a routing configuration of the second packet routing node, by, when the request is to establish a secure IP connection, configuring, the second packet routing node (i) to cause all packets transmitted from the second location to the first location to be encrypted prior to transmission through the public network by inserting an encryption node of the second service processing switch into the second path and (ii) to cause all packets received from the first location to be decrypted after transmission through the public network by inserting a decryption node of the second service processing switch into the first path. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification