-
公开(公告)号:US10469461B1
公开(公告)日:2019-11-05
申请号:US15730356
申请日:2017-10-11
Applicant: Juniper Networks, Inc.
Inventor: Avinash Kumar Singh , Sachin Mutalik Desai , Vaibhav Agarwal , Mohit Joshi
IPC: H04L29/06 , G06F9/455 , H04L12/813
Abstract: A device may receive a packet from a first endpoint that is destined for a second endpoint. The first endpoint may be hosted on the device. The device may determine whether a secure session exists between the first endpoint and the second endpoint. The secure session may permit encrypted traffic to be exchanged between the first endpoint and the second endpoint. The device may process the packet using a set of rules after determining whether the secure session exists between the first endpoint and the second endpoint. The device may encrypt the packet using security information associated with the secure session after determining that the secure session exists, or establishing the secure session when the secure session does not exist. The device may provide the packet toward the second endpoint after encrypting the packet.
-
公开(公告)号:US11115391B2
公开(公告)日:2021-09-07
申请号:US16668807
申请日:2019-10-30
Applicant: Juniper Networks, Inc.
Inventor: Avinash Kumar Singh , Sachin Mutalik Desai , Vaibhav Agarwal , Mohit Joshi
IPC: H04L29/06 , G06F9/455 , H04L12/813
Abstract: A device may receive a packet from a first endpoint that is destined for a second endpoint. The first endpoint may be hosted on the device. The device may determine whether a secure session exists between the first endpoint and the second endpoint. The secure session may permit encrypted traffic to be exchanged between the first endpoint and the second endpoint. The device may process the packet using a set of rules after determining whether the secure session exists between the first endpoint and the second endpoint. The device may encrypt the packet using security information associated with the secure session after determining that the secure session exists, or establishing the secure session when the secure session does not exist. The device may provide the packet toward the second endpoint after encrypting the packet.
-