SYSTEMS AND METHODS FOR USING END POINT AUDITING IN CONNECTION WITH TRAFFIC MANAGEMENT
First Claim
1. A method comprising:
- a) determining, by a first virtual server of a device intermediary to a client device and a server, a result of an end point scan of the client device, the first virtual server configured to perform authentication of client devices to allow access to the server;
b) establishing, by the first virtual server, an authentication session responsive to authentication of the client;
c) receiving, by a second virtual server of the device configured to manage traffic of client devices, a request from the client, the request identifying the authentication session; and
d) using, by the second virtual server, information from the authentication session to make a decision on controlling traffic of a connection of the client device.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
1 Citation
20 Claims
-
1. A method comprising:
-
a) determining, by a first virtual server of a device intermediary to a client device and a server, a result of an end point scan of the client device, the first virtual server configured to perform authentication of client devices to allow access to the server; b) establishing, by the first virtual server, an authentication session responsive to authentication of the client; c) receiving, by a second virtual server of the device configured to manage traffic of client devices, a request from the client, the request identifying the authentication session; and d) using, by the second virtual server, information from the authentication session to make a decision on controlling traffic of a connection of the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a device intermediary to a client and a server, a first virtual server configured on the device to perform authentication of clients to allow access to the server and configured to determine a result of an end point scan of the client and establish an authentication session responsive to authentication of the client; a second virtual server configured on the device to manage traffic of clients, the second virtual server configured to receive a request from the client, the request identifying the authentication session; and wherein the second virtual server is configured to use information from the authentication session to make a decision on controlling traffic of a connection of the client device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification