Metric based dynamic virtual private network (VPN) tunnel between branch gateway devices

    公开(公告)号:US11595231B2

    公开(公告)日:2023-02-28

    申请号:US17237256

    申请日:2021-04-22

    Abstract: Example implementation relates to a method for establishing a dynamic VPN tunnel between branch gateway devices based on metric data. A branch orchestrator receives metric data from VPNC device. The metric data includes data center bandwidth and processor utilization of the VPNC device. The metric data is derived from the traffic being routed via the VPNC device. When the metric data associated with traffic between a first branch gateway device and a second branch gateway device is above a Service Level Agreement (SLA), a dynamic branch to branch VPN tunnel is established to route the traffic between the first branch gateway device and the second branch gateway device. The VPN tunnel between the branch gateways can be teared when the load at the VPNC device reduces.

    SYSTEM AND METHOD OF ESTABLISHING SEAMLESS REMOTE ACCESS VIRTUAL PRIVATE NETWORK CONNECTIONS

    公开(公告)号:US20220321401A1

    公开(公告)日:2022-10-06

    申请号:US17333381

    申请日:2021-05-28

    Abstract: A system and a method of establishing seamless remote access VPN connections are described. For establishment of a VPN connection for a user device, a cluster leader of a cluster of controllers identifies an active controller and a standby controller, based on network load of each controller of the cluster of controllers. An active VPN connection is established between the user device and the active controller and a standby VPN connection is established between the user device and the standby controller. The standby VPN connection is utilized in place of the active VPN connection during failover of the active controller. Because information of an active session is regularly shared by the active controller to the standby controller, the standby controller can seamlessly resume the active session during failover of the active controller.

    ENCRYPTION OF PARAMETERS IN CONFIGURATION FILES

    公开(公告)号:US20250070959A1

    公开(公告)日:2025-02-27

    申请号:US18452618

    申请日:2023-08-21

    Abstract: In some examples, a deployment server derives an initialization vector based on a protection parameter of a configuration file, and encrypts a vulnerable parameter of the configuration file using the initialization vector and an encryption key. The deployment server produces a protected configuration file including the protection parameter and the encrypted vulnerable parameter. The deployment server sends the protected configuration file to a device as part of an operation configuring the device according to the protected configuration file.

    System and method of establishing seamless remote access virtual private network connections

    公开(公告)号:US11588679B2

    公开(公告)日:2023-02-21

    申请号:US17333381

    申请日:2021-05-28

    Abstract: A system and a method of establishing seamless remote access VPN connections are described. For establishment of a VPN connection for a user device, a cluster leader of a cluster of controllers identifies an active controller and a standby controller, based on network load of each controller of the cluster of controllers. An active VPN connection is established between the user device and the active controller and a standby VPN connection is established between the user device and the standby controller. The standby VPN connection is utilized in place of the active VPN connection during failover of the active controller. Because information of an active session is regularly shared by the active controller to the standby controller, the standby controller can seamlessly resume the active session during failover of the active controller.

    UPDATING CLUSTER DATA AT NETWORK DEVICES OF A CLUSTER

    公开(公告)号:US20230016602A1

    公开(公告)日:2023-01-19

    申请号:US17374368

    申请日:2021-07-13

    Abstract: Examples relate to maintaining consistent cluster data across a cluster in a network. A computing system may receive a first signature of a first state of the cluster data present at a leader gateway and a plurality of signatures of a plurality of states of the cluster data present at a plurality of member network devices of the cluster. The cluster may include a plurality of gateways including the leader gateway and a plurality of member gateways. The member network devices may include the plurality of member gateways and a plurality of interconnecting network devices. In response to determining that a signature of the plurality of signatures received from one of the member network devices is different from the first signature, the computing system may send a message to one of the plurality of gateways to update the cluster data at the member network device to represent the first state.

    DYNAMIC DETECTION OF INACTIVE VIRTUAL PRIVATE NETWORK CLIENTS

    公开(公告)号:US20190141141A1

    公开(公告)日:2019-05-09

    申请号:US16240726

    申请日:2019-01-05

    Abstract: The present disclosure discloses a method and network device for dynamic detection of inactive virtual private network clients. Specifically, a network device receives periodic messages from a first device at a first interval, and determines a timeout value for the first device based at least on the first interval, at which the periodic messages are received from the first device. Subsequent to determining the timeout value, the network device detects that a message has not been received from the first device for a period of time corresponding to the timeout value for the first device. The network device then terminates at least one connection with the first device responsive to determining that no message has been received from the first device for the period of time corresponding to the timeout value for the first device.

    Pre-shared key based virtual private network

    公开(公告)号:US12113775B2

    公开(公告)日:2024-10-08

    申请号:US18059137

    申请日:2022-11-28

    CPC classification number: H04L63/0272 H04L9/0838 H04L9/3073

    Abstract: Some examples relate to a pre-shared key based virtual private network. In an example, a VPN server generates a unique pre-shared key (PSK) corresponding to an identity of a VPN client. The VPN server creates a mapping between the identity and the unique PSK of the VPN client, and stores it in a database. The VPN server shares the unique PSK with the VPN client. In response to receiving an IKE packet comprising an encrypted identity of the VPN client, the VPN server decrypts the encrypted identity of the VPN client from the IKE packet to determine the identity of the VPN client associated with the IKE packet. The VPN server retrieves the unique PSK corresponding to the identity of the VPN client associated with the IKE packet from the mapping stored in the database. The VPN server establishes a VPN connection with the VPN client.

    Precaching precursor keys within a roaming domain of client devices

    公开(公告)号:US11778467B2

    公开(公告)日:2023-10-03

    申请号:US17513868

    申请日:2021-10-28

    CPC classification number: H04W12/069 H04W8/12 H04W12/088

    Abstract: Examples relate to seamless roaming across subnets. In an example, a system receives an indication that a client device has been authenticated at a first network device of a network. The system receives precursor keys and identification information of the client device, as generated from the authentication of the client device. The system determines second clusters, which are within a roaming domain of the cluster or the client device. The system receives one or more second precursor keys corresponding to the second clusters and distributes the second precursor keys to the corresponding second clusters. The system determines to create one or more tunnels among the second clusters and the cluster and provisions the tunnels to transmit data through the tunnels.

Patent Agency Ranking