WAN optimization without required user configuration for WAN secured VDI traffic
    1.
    发明授权
    WAN optimization without required user configuration for WAN secured VDI traffic 有权
    广域网优化,无需WAN用户配置WAN安全VDI流量

    公开(公告)号:US09219712B2

    公开(公告)日:2015-12-22

    申请号:US13970916

    申请日:2013-08-20

    CPC classification number: H04L63/0428 H04L63/205 H04L67/38

    Abstract: In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be re-encrypted for transport over the WAN in a manner that does not require explicit configuration by the administrator of the WAAS devices. For example, VDI traffic may be intercepted and all data redundancy elimination messages may be encrypted and sent to a peer network device.

    Abstract translation: 为了中介WAAS设备处理和加速ICA流量,它们必须解密ICA流量以便检查它。 公开了一种机制,通过该机制可以以不需要由WAAS设备的管理员进行显式配置的方式通过WAN重新加密ICA流量以进行传输。 例如,可以截取VDI业务,并且可以将所有数据冗余消除消息加密并发送到对等网络设备。

    WAN Optimization Without Required User Configuration for WAN Secured VDI Traffic
    3.
    发明申请
    WAN Optimization Without Required User Configuration for WAN Secured VDI Traffic 审中-公开
    广域网优化,无需WAN安全VDI流量所需的用户配置

    公开(公告)号:US20130339727A1

    公开(公告)日:2013-12-19

    申请号:US13970916

    申请日:2013-08-20

    CPC classification number: H04L63/0428 H04L63/205 H04L67/38

    Abstract: In order for intermediary WAAS devices to process and accelerate ICA traffic, they must decrypt the ICA traffic in order to examine it. Disclosed is a mechanism by which the ICA traffic may be re-encrypted for transport over the WAN in a manner that does not require explicit configuration by the administrator of the WAAS devices. For example, VDI traffic may be intercepted and all data redundancy elimination messages may be encrypted and sent to a peer network device.

    Abstract translation: 为了中介WAAS设备处理和加速ICA流量,它们必须解密ICA流量以便检查它。 公开了一种机制,通过该机制可以以不需要由WAAS设备的管理员进行显式配置的方式通过WAN重新加密ICA流量以进行传输。 例如,可以截取VDI业务,并且可以将所有数据冗余消除消息加密并发送到对等网络设备。

    RENDERING NETWORK POLICY AND MONITORING COMPLIANCE
    4.
    发明申请
    RENDERING NETWORK POLICY AND MONITORING COMPLIANCE 有权
    渲染网络政策和监控合规性

    公开(公告)号:US20160211988A1

    公开(公告)日:2016-07-21

    申请号:US14725015

    申请日:2015-05-29

    Abstract: In one embodiment, a network controller receives data indicative of one or more traffic requirements for network traffic. The network controller maps the data indicative of the one or more traffic requirements into a network policy. The network controller causes installation of the network policy onto one or more networking devices. The one or more networking devices are configured to route the network traffic based on the network policy. The network controller receives feedback regarding the installed network policy. The network controller adjusts the network policy based on the received feedback.

    Abstract translation: 在一个实施例中,网络控制器接收指示网络业务的一个或多个业务需求的数据。 网络控制器将指示一个或多个业务需求的数据映射到网络策略中。 网络控制器将网络策略安装到一个或多个网络设备上。 一个或多个网络设备被配置为基于网络策略路由网络流量。 网络控制器收到有关安装的网络策略的反馈。 网络控制器根据收到的反馈调整网络策略。

Patent Agency Ranking