Systems and methods for determining endpoint configurations for endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints
First Claim
1. A computerized method for automatically determining complete customized endpoint configurations for each of a plurality of endpoints of at least one virtual private network (VPN) and deploying the configurations to the endpoints, comprising:
- accepting, using at least one user interface, parameters required for building the configurations from at least one user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising;
endpoint IP addressing scheme information, network design information, and templates used to define profiles of the endpoints;
automatically generating, using at least one configuration engine, the configurations for the parameters wherein the parameters comprise endpoint authentication information, and setting the configurations based on endpoint hardware-specific information with no further input required from the user;
querying each endpoint to verify that the endpoint hardware-specific information is consistent with the configurations for the endpoint; and
deploying, using at least one scheduler, the configurations to the endpoints of the VPN, wherein the VPN is a multipoint Generic Routing Encapsulation (mGRE) VPN using Next HOP Resolution Protocol (NHRP);
wherein the computerized method prevents misconfigurations and overlapping IP address spaces;
wherein the computerized method;
automatically assigns endpoint Internet Protocol (IP) addressing, automatically selects a currently unused IP Subnet from a Master IP Subnet, and automatically determines the currently unused IP Subnet from the Master IP Subnet using IP Subnetting.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and Methods for determining endpoint configurations for endpoints of a virtual private network (VPN) and deploying the configurations to the endpoints. Parameters required for building the configurations are accepted from a user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising: endpoint IP addressing scheme information, network design information, and templates used to define profiles of the endpoints. The configurations for the parameters are generated, wherein the parameters comprise endpoint authentication information, and the configurations are set based on endpoint hardware-specific information with no further input required from the user. Each endpoint is queried to verify that the endpoint hardware-specific information is consistent with the configurations for the endpoint. The configurations are deployed to the endpoints of the VPN.
-
Citations
102 Claims
-
1. A computerized method for automatically determining complete customized endpoint configurations for each of a plurality of endpoints of at least one virtual private network (VPN) and deploying the configurations to the endpoints, comprising:
-
accepting, using at least one user interface, parameters required for building the configurations from at least one user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising;
endpoint IP addressing scheme information, network design information, and templates used to define profiles of the endpoints;automatically generating, using at least one configuration engine, the configurations for the parameters wherein the parameters comprise endpoint authentication information, and setting the configurations based on endpoint hardware-specific information with no further input required from the user; querying each endpoint to verify that the endpoint hardware-specific information is consistent with the configurations for the endpoint; and deploying, using at least one scheduler, the configurations to the endpoints of the VPN, wherein the VPN is a multipoint Generic Routing Encapsulation (mGRE) VPN using Next HOP Resolution Protocol (NHRP); wherein the computerized method prevents misconfigurations and overlapping IP address spaces; wherein the computerized method;
automatically assigns endpoint Internet Protocol (IP) addressing, automatically selects a currently unused IP Subnet from a Master IP Subnet, and automatically determines the currently unused IP Subnet from the Master IP Subnet using IP Subnetting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
-
52. A computerized system for automatically determining complete customized endpoint configurations for each of a plurality of endpoints of at least one virtual private network (VPN) and deploying the configurations to the endpoints, comprising:
at least one processor, wherein the at least one processor is configured for; accepting, using at least one user interface, parameters required for building the configurations from at least one user, the configurations enabling the endpoints to process a mixture of time sensitive and non-time sensitive data, and the parameters comprising;
endpoint IP addressing scheme information, network design information, and templates used to define profiles of the endpoints;automatically generating, using at least one configuration engine, the configurations for the parameters wherein the parameters comprise endpoint authentication information, and setting the configurations based on endpoint hardware-specific information, with no further input required from the user; querying each endpoint to verify that the endpoint hardware-specific information is consistent with the configurations for the endpoint; and deploying, using at least one scheduler, the configurations to the endpoints of the VPN, wherein the VPN is a multipoint Generic Routing Encapsulation (mGRE) VPN using Next HOP Resolution Protocol (NHRP); wherein the computerized method prevents misconfigurations and overlapping IP address spaces; wherein the computerized method;
automatically assigns endpoint Internet Protocol (IP) addressing, automatically selects a currently unused IP Subnet from a Master IP Subnet, and automatically determines the currently unused IP Subnet from the Master IP Subnet using IP Subnetting.- View Dependent Claims (53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102)
Specification