Systems and methods for using end point auditing in connection with traffic management
First Claim
1. A method comprising:
- a) determining, by a first virtual server of an intermediary device external to a client device and a target server, a result of an end point scan of the client device initiated by the first virtual server responsive to an access request from the client device to the target server, the first virtual server configured to perform authentication of client device to allow access to the target server;
b) establishing, by the first virtual server, an authentication session upon authentication of the client device;
c) receiving, by a second virtual server of the intermediary device different from the first virtual server, a request from the client that identifies the authentication session, wherein the second virtual server is configured to manage traffic of the client device; and
d) using, by the second virtual server, information from the authentication session to make a decision on controlling traffic of a connection of the client device based on one or more traffic management policies.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
47 Citations
20 Claims
-
1. A method comprising:
-
a) determining, by a first virtual server of an intermediary device external to a client device and a target server, a result of an end point scan of the client device initiated by the first virtual server responsive to an access request from the client device to the target server, the first virtual server configured to perform authentication of client device to allow access to the target server; b) establishing, by the first virtual server, an authentication session upon authentication of the client device; c) receiving, by a second virtual server of the intermediary device different from the first virtual server, a request from the client that identifies the authentication session, wherein the second virtual server is configured to manage traffic of the client device; and d) using, by the second virtual server, information from the authentication session to make a decision on controlling traffic of a connection of the client device based on one or more traffic management policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
An intermediary device external to a client device and a target server, a first virtual server configured on the intermediary device to perform authentication of the client device to allow access to the target server and further configured to determine a result of an end point scan of the client device initiated by the first virtual server responsive to an access request from the client device to the target server and establish an authentication session upon authentication of the client; a second virtual server, different from the first virtual server, configured on the intermediary, wherein the second virtual server is configured to manage traffic of the client device and to receive a request from the client device that identifies the authentication session; and wherein the second virtual server is configured to use information from the authentication session to make a decision on controlling traffic of a connection of the client device based on one or more traffic management policies. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification