Providing access to configurable private computer networks
First Claim
1. A computer-implemented method comprising:
- receiving, by one or more computing systems configured to provide a network service, configuration information for a virtual network having multiple computing nodes, the configuration information being received via a programmatic interface of the network service;
configuring, by the one or more configured computing systems and based on the received configuration information, a virtual border router to control access of the multiple computing nodes to external nodes that are not part of the virtual network, the configuring of the virtual border router including establishing a private virtual connection between the multiple computing nodes and one or more first external nodes that are part of an indicated remote private computer network; and
providing, by the one or more configured computing systems, emulated functionality of the configured virtual border router to manage communications of the multiple computing nodes in accordance with the received configuration information.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.
96 Citations
27 Claims
-
1. A computer-implemented method comprising:
-
receiving, by one or more computing systems configured to provide a network service, configuration information for a virtual network having multiple computing nodes, the configuration information being received via a programmatic interface of the network service; configuring, by the one or more configured computing systems and based on the received configuration information, a virtual border router to control access of the multiple computing nodes to external nodes that are not part of the virtual network, the configuring of the virtual border router including establishing a private virtual connection between the multiple computing nodes and one or more first external nodes that are part of an indicated remote private computer network; and providing, by the one or more configured computing systems, emulated functionality of the configured virtual border router to manage communications of the multiple computing nodes in accordance with the received configuration information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having stored contents that configure a computing device to perform a method, the method comprising:
-
configuring, by the configured computing device, one or more physical computing systems to provide multiple virtual computing nodes as at least part of a virtual network in accordance with configuration information received from a client via an interface; and emulating, by the configured computing device and based at least in part on the configuration information, functionality of a virtual border router to control access of the multiple virtual computing nodes to one or more computing nodes that are not part of the virtual network and are in a remote private computer network associated with the client, including establishing a private virtual connection between the multiple virtual computing nodes of the virtual network and the one or more computing nodes of the remote private computer network. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system, comprising:
-
one or more processors; and a memory including instructions that, upon execution by at least one of the one or more processors, cause the system to; configure at least one of multiple virtual computing nodes of a virtual network for a client in accordance with configuration information received from the client via an interface; and emulate, based at least in part on the configuration information, functionality of a virtual border router to provide access between the at least one virtual computing node and a remote computer network of the client having one or more nodes that are not part of the virtual network, including establishing a private virtual connection between the at least one virtual computing node of the virtual network and the one or more nodes of the remote computer network, and managing communications between the at least one virtual computing node and the one or more nodes of the remote computer network. - View Dependent Claims (25, 26, 27)
-
Specification