Abstract:
The present invention relates to systems and methods to identify a level of access for a resource being accessed via a secure socket layer virtual private network (SSL VPN) connection to a network, and to control the action on the resource based on the identified level of access. The appliance described herein provides intelligent secure access and action control to resources based on a sense and respond mechanism. When a user requests access to a resource via the SSL VPN connection of the appliance, the appliance obtains information about the client to determine the user access scenario—the location, device, connection and identify of the user or client. Based on the collected information, the appliance responds to the detected user scenario by identifying a level of access to the resource for the user/client, such as rights to view, print, edit or save a document, Based on the identified level of access, the appliance controls the actions performs on the resource by various techniques described herein so that the user can only perform the allowed action n accordance with the level of access. As such, the present invention allows organization to control and provide the appropriate level of access to valuable, confidential or business critical information accessed remotely or via a pubic network while protecting such information by controlling the types of actions performed or allowed to be performed remotely on the information.
Abstract:
Method and apparatus for effecting handoff in a system supporting both wireless and packet data service communications. In one embodiment, the serving network provides information to the target network sufficient to establish the Point-to-Point Protocol (PPP) connections for handoff. In an alternate embodiment, the serving network and the target network do not share capabilities with respect to concurrent multiple service instances. When the serving network knows the status of the target network, the serving network takes responsibility for the handoff.
Abstract:
This invention provides a method for providing network security services, such as those provided by the IPSEC protocol, through network address translation (NAT). The method is based on determining the transformations that occur on a packet and compensating for the transformations. Because only TCP and UDP protocols work through NATs, the IPSEC AH/ESP packets are encapsulated into UDP packets for transport. Special operations are performed to allow reliable communications in such environments.
Abstract:
A communication services network is described that enables client communication devices to synchronously or asynchronously communicate with one another or with legacy communication devices through a gateway in either (i) a real-time mode or (ii) a time-shifted mode and (iii) to seamlessly transition between the two modes. As the media of a message is either created or retrieved from memory, the sending client device progressively transmits the media over the network. The network progressively routes the media as it is transmitted to the recipient client device or gateway, which progressively stores the media as it is received. With progressive storage, the recipient has the option of rendering the media as it is received in the real-time mode, rendering the media out of storage in the time-shifted mode, or seamlessly transitioning between the two modes. In addition, users may communicate with each other “live”, similar to a conventional full duplex telephone call, when messages are synchronously transmitted and rendered in real-time with respect to one another. Alternatively, users may communicate with each other asynchronously by sending messages back and forth at discrete times, or by time-shifting the review of received messages.
Abstract:
A method and apparatus for transmitting voice media over a network where the voice media may be consumed either in a real-time mode or a time-shifted mode. The method comprising transmitting the voice media over the network using a network efficient protocol when either (i) the media is not being consumed in the real-time mode or (ii) the condition on the network is good enough to support the real-time transmission and consumption of the voice media in the real-time mode. Alternatively, the voice media is transmitted using a loss tolerant transmission protocol when the media is being consumed in the real-time mode and the condition on the network is sufficiently poor to prevent the real-time consumption of the voice media in real-time using the network efficient protocol. The apparatus, which may be a communication device or a server, implements the above-described method.
Abstract:
Improved systems and methods for distributing interdomain routing information within an Autonomous System (AS). A protocol extension to BGP, iBGPd (internal Border Gateway Protocol downloader), has been developed to replace IBGP in distributing BGP interdomain routing information within an AS. The iBGPd technique distributes routing information hop-by-hop using a reliable multi-party transport protocol. Scalability is greatly improved since the use of a full mesh of TCP connections is avoided. Also, there are improvements in routing information propagation delay and routing stability. Drawbacks related to the use of route reflectors and confederations are avoided.
Abstract:
A packet data system such as a TCP/IP network transmits packets containing a variety of data types along links in the network. Packets are transmitted in a stream between nodes interconnected by the links connections which conform to a transport layer protocol such as TCP, UDP, and RSTP, and includes wireless links, which transmit packets using a radio frequency (RF) medium. Typical protocols, however, are usually developed to optimize throughput and minimize data error and loss over wired links, and do not lend themselves well to a wireless link. By examining the data in a packet, performance characteristics such as a port number are determined. The performance characteristics indicate the application type, and therefore, the data type, of the packets carried on the connection. Since certain data types, such as streaming audio and video, are more loss tolerant, determination of the data type is used to compute link control parameters for the wireless link which that are optimal to the type of data being transmitted over the link.
Abstract:
Disclosed are systems employing an architecture that provides capabilities to transport and process Internet Protocol (IP) packets from Layer 2 through transport protocol processing and may also perform packet inspection through Layer 7. A set of engines may perform pass-through packet classification, policy processing and/or security processing enabling packet streaming through the architecture at nearly the full line rate. A scheduler schedules packets to packet processors for processing. An internal memory or local session database cache stores a session information database for a certain number of active sessions. The session information that is not in the internal memory is stored and retrieved to/from an additional memory.
Abstract:
The present invention is directed towards a method and system for accelerating delivery of a computing environment to a remote client. The computing environment may include a plurality of files comprising an application program and may be streamed to a remote client from a server. Responsive to a determination of whether transmission of the application may be accelerated, an appliance, intercepting the plurality of files, may accelerate transmission of the application program by applying one or more transport layer transmission acceleration techniques to the plurality of files.
Abstract:
A method and system for providing network management communication between a plurality of network elements are disclosed. A method includes creating a tunnel configured for transmitting data between the network elements and transmitting network management information over the tunnel using a network management protocol. The tunnel passes through a gateway network element configured to communicate with the network elements utilizing the network management protocol.