METHOD AND SYSTEMS FOR SECURING REMOTE ACCESS TO PRIVATE NETWORKS
7 Assignments
0 Petitions
Accused Products
Abstract
A method for securing remote access to private networks includes a receiver intercepting from a data link layer a packet in a first plurality of packets destined for a first system on a private network. A filter intercepts from the data link layer a packet in a second plurality of packets transmitted from a second system on the private network, destined for an system on a second network. A transmitter in communication with the receiver and the filter performing a network address translation on at least one intercepted packet and transmitting the at least one intercepted packet to a destination.
17 Citations
44 Claims
-
1-24. -24. (canceled)
-
25. A method of accessing a server via an intermediary device between a client in a first network and the server in a second network, the method comprising:
-
(a) establishing a secure application layer tunnel over a first transport layer connection between a client application executing on a client on a first network and a device intermediary between a server of a second network and the client, the device having a second transport layer connection between the device and the server; (b) receiving, by the device from the client application via the secure application layer tunnel, a request of an application of the client to access the server, the client application receiving the request intercepted from a third transport layer connection of the application by a driver of the client, (c) forwarding, by the device via the second transport layer connection, the request to the server; and (d) intercepting, by the device at a data link layer of the device, a response to the request transmitted from the server to the client. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A system of accessing a server via an intermediary device between a client in a first network and the server in a second network, the system comprising:
-
a client application executing on a client on a first network; a device intermediary between a server of a second network and the client a secure application layer tunnel established over a first transport layer connection between the client and the device, the device having a second transport layer connection between the device and the server; wherein the device receives from the client application via the secure application layer tunnel a request of an application of the client to access the server, the client application receiving the request intercepted from a third transport layer connection of the application by a driver of the client, and forwards the request to the server via the second transport layer connection; and wherein the device intercepts, at a data link layer of the device, a response to the request transmitted from the server to the client. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44)
-
Specification