Virtual firewall load balancer
First Claim
1. A method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS), the method comprising:
- receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information;
receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information;
determining if the plurality of connection information matches the plurality of trusted connection information;
sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information; and
sending the network packet to the HIPS based on determining that the plurality of connection information does not match the plurality of trusted connection information.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one exemplary embodiment, a method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS) is provided. The method may include receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information. The method may also include receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information. The method may then include determining if the plurality of connection information matches the plurality of trusted connection information. The method may further include sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information. The method may include sending the network packet to the HIPS based on determining that the plurality of connection information does not match the plurality of trusted connection information.
-
Citations
9 Claims
-
1. A method for load balancing between a virtual component within a virtual environment and a Host Intrusion Prevention System (HIPS), the method comprising:
-
receiving a trusted connection table from the HIPS, wherein the trusted connection table contains a plurality of trusted connection information; receiving a network packet from a virtual switch, wherein the network packet has a plurality of connection information; determining if the plurality of connection information matches the plurality of trusted connection information; sending the network packet to a destination based on determining that the plurality of connection information matches the plurality of trusted connection information; and sending the network packet to the HIPS based on determining that the plurality of connection information does not match the plurality of trusted connection information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification