×

Interconnecting external networks with overlay networks in a shared computing environment

  • US 9,860,214 B2
  • Filed: 09/10/2015
  • Issued: 01/02/2018
  • Est. Priority Date: 09/10/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • obtaining, by one or more processors, data from a first virtual network of a first tenant, a first identifier identifying the first tenant, data from a second virtual network of a second tenant, and a second identifier identifying the second tenant, wherein the first virtual network of the first tenant and the second virtual network of the second tenant are two of two or more virtual networks in a shared computing environment wherein the two or more virtual networks overlay a physical network, wherein each virtual network of the two or more virtual networks is a virtual network of a tenant;

    based on obtaining the first identifier, setting, by the one or more processors, the first identifier in metadata of the data from the first virtual network;

    based on obtaining the second identifier, setting, by the one or more processors, the second identifier in metadata of the data from the second virtual network;

    based on the first identifier in the metadata, identifying, by the one or more processors, a network connection associated with the first tenant, and based on the second identifier in the metadata of the data from the second virtual network, identifying, by the one or more processors, the network connection associated with the second tenant, wherein the network connection associated with the first tenant and the network connection associated with the second tenant comprise a shared virtual private network tunnel over a public Internet connection, wherein the virtual private network tunnel is coupled to remote networks of at least two tenants of the two or more virtual networks, the remote networks of at least two tenants comprising a remote network of the first tenant and the remote network of the second tenant;

    identifying, by the one or more processors, a policy of the network connection relevant to the first tenant and processing the data with the policy to create processed data from the first virtual network;

    identifying, by the one or more processors, a policy of the network connection relevant to the second tenant and processing the data with the policy relevant to the second tenant to create processed data from the second virtual network; and

    transmitting, by the one or more processors, the processed data from the first virtual network through the network connection to the remote network of the first tenant and the processed data from the second virtual network through the network connection to the remote network of the second tenant.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×