System and method for providing proactive VPN establishment
First Claim
1. A method for facilitating network connectivity across connection types implemented by a network traffic management system comprising one or more network traffic management devices, server devices, or client devices, the method comprising:
- monitoring an existing first connection to a secured network domain, wherein a first network configuration is employed to access the secured network domain via the first connection;
detecting a termination of the first connection and subsequent to detecting the termination of the first connection;
retrieving locally stored authentication information for a user and automatically switching from the first connection to a second connection to allow access to the secured network domain, wherein the first connection is a wired connection and the second connection is a wireless connection or the first connection is a wireless connection and the second connection is a direct connection and one or more of the first or second network connection is a virtual private network (VPN) connection;
establishing access to the secured network domain via the second connection by employing a second network configuration; and
initiating one or more user login processes associated with the second network configuration using the retrieved locally stored authentication information.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method which includes monitoring an existing first connection to a secured network domain. A first network configuration is employed to access the secured network domain via the first connection. An available second connection to the network domain is detected, whereby the system and method automatically switch to the second connection to access the secured network domain upon detecting a termination with the first connection. Access to the secured network domain, via the second connection, is established by employing a second network configuration. In an aspect, the first connection is by cable and the first network configuration is associated with direct access to the secured network domain. In an aspect, the second connection is a wired or wireless signal and the second network configuration is associated with a Virtual Private Network (VPN) connection.
-
Citations
16 Claims
-
1. A method for facilitating network connectivity across connection types implemented by a network traffic management system comprising one or more network traffic management devices, server devices, or client devices, the method comprising:
-
monitoring an existing first connection to a secured network domain, wherein a first network configuration is employed to access the secured network domain via the first connection; detecting a termination of the first connection and subsequent to detecting the termination of the first connection; retrieving locally stored authentication information for a user and automatically switching from the first connection to a second connection to allow access to the secured network domain, wherein the first connection is a wired connection and the second connection is a wireless connection or the first connection is a wireless connection and the second connection is a direct connection and one or more of the first or second network connection is a virtual private network (VPN) connection; establishing access to the secured network domain via the second connection by employing a second network configuration; and initiating one or more user login processes associated with the second network configuration using the retrieved locally stored authentication information. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory machine readable medium having stored thereon instructions for facilitating network connectivity across connection types comprising executable code which when executed by one or more processors, causes the one or more processors to:
-
monitor an existing first connection to a secured network domain, wherein a first network configuration is employed to access the secured network domain via the first connection; detect a termination of the first connection and subsequent to detecting the termination of the first connection; retrieve locally stored authentication information for a user and automatically switching from the first connection to a second connection to allow access to the secured network domain, wherein the first connection is a wired connection and the second connection is a wireless connection or the first connection is a wireless connection and the second connection is a direct connection and one or more of the first or second network connection is a virtual private network (VPN) connection; establish access to the secured network domain via the second connection by employing a second network configuration; and initiate one or more user login processes associated with the second network configuration using the retrieved locally stored authentication information. - View Dependent Claims (6, 7, 8)
-
-
9. A network device comprising memory comprising programmed instructions stored thereon and one or more processors configured to execute the stored programmed instructions to:
-
monitor an existing first connection to a secured network domain, wherein a first network configuration is employed to access the secured network domain via the first connection; detect a termination of the first connection and subsequent to detecting the termination of the first connection; retrieve locally stored authentication information for a user and automatically switch from the first connection to a second connection to allow access to the secured network domain, wherein the first connection is a wired connection and the second connection is a wireless connection or the first connection is a wireless connection and the second connection is a direct connection and one or more of the first or second network connection is a virtual private network (VPN) connection; establish access to the secured network domain via the second connection by employing a second network configuration; and initiate one or more user login processes associated with the second network configuration using the retrieved locally stored authentication information. - View Dependent Claims (10, 11, 12)
-
-
13. A network traffic management system, comprising one or more network traffic management devices, server devices, or client devices, the network traffic management system comprising memory comprising programmed instructions stored thereon and one or more processors configured to execute the stored programmed instructions to:
-
monitor an existing first connection to a secured network domain, wherein a first network configuration is employed to access the secured network domain via the first connection; detect a termination of the first connection and subsequent to detecting the termination of the first connection; retrieve locally stored authentication information for a user and automatically switch from the first connection to a second connection to allow access to the secured network domain, wherein the first connection is a wired connection and the second connection is a wireless connection or the first connection is a wireless connection and the second connection is a direct connection and one or more of the first or second network connection is a virtual private network (VPN) connection; establish access to the secured network domain via the second connection by employing a second network configuration; and initiate one or more user login processes associated with the second network configuration using the retrieved locally stored authentication information. - View Dependent Claims (14, 15, 16)
-
Specification