Systems and methods for using end point auditing in connection with traffic management
First Claim
1. A method of managing traffic traversing an intermediary based on a result of end point analysis, the method comprising:
- a) determining, by an authentication virtual server of an intermediary device between at least one client device and at least one server, a result of an end point analysis scan of a client device initiated by the authentication virtual server and processing the result of the end point analysis scan before forwarding, by the authentication virtual server, to a separate and differently configured traffic management virtual server of the intermediary device, the authentication virtual server further configured to perform authentication of a user or the client device;
b) obtaining, by the traffic management virtual server, the result from the authentication virtual server; and
c) applying, by the traffic management virtual server, the result in one or more traffic management policies to manage network traffic of a connection of the client device traversing the intermediary.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
61 Citations
20 Claims
-
1. A method of managing traffic traversing an intermediary based on a result of end point analysis, the method comprising:
-
a) determining, by an authentication virtual server of an intermediary device between at least one client device and at least one server, a result of an end point analysis scan of a client device initiated by the authentication virtual server and processing the result of the end point analysis scan before forwarding, by the authentication virtual server, to a separate and differently configured traffic management virtual server of the intermediary device, the authentication virtual server further configured to perform authentication of a user or the client device; b) obtaining, by the traffic management virtual server, the result from the authentication virtual server; and c) applying, by the traffic management virtual server, the result in one or more traffic management policies to manage network traffic of a connection of the client device traversing the intermediary. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An intermediary for managing traffic traversing the intermediary based on a result of end point analysis, the intermediary comprising:
-
a device between at least one client device and at least one server, an authentication virtual server of the device for performing authentication of a user or the client device, the authentication virtual server further configured for determining a result of an end point analysis scan of the client device initiated by the authentication virtual server, and for processing the result of the end point analysis scan before forwarding to a separate and differently configured traffic management virtual server of the intermediary; the traffic management virtual server obtaining the result forwarded from the authentication virtual server, and applying the result in one or more traffic management policies to manage a connection of the client device traversing the intermediary. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification