摘要:
Increased security may be provided on an enterprise network by causing a central security server to administer security policy on the network. Agents in hosts on the network authenticate with the central security server to obtain policy information for that particular host user. The policy information may specify whether any special routing, processing, or other features, should occur in connection with particular classes of traffic or in connection with communications with particular other hosts or classes of hosts. In operation, the agents implement the policy by interfacing with the networking layer to cause the traffic to be routed via any other host/server on the network so that appropriate services may occur with respect to that traffic. Additionally, tunnels may be established so that traffic in-between hosts or between a host and server to be encrypted, compressed, or otherwise treated as specified in the policy.
摘要:
VPN tunnels may be established using an Internet browser and dynamically downloadable VPN client software that may be installed as part of a remote login process. By causing the VPN client software to be dynamically downloaded during the session, the remote user does not need to pre-load any software onto the computer that will be used as the remote computer. Thus, any computer with an Internet browser may be used to log into the enterprise network without first requiring the user of that computer to acquire rights to install a VPN client on the computer. By causing some or all of the dynamically downloaded software components to be deleted upon termination of the session, the components of the software may be made to be not available once the session has ended. Encrypted UDP may be used to transmit data on the VPN tunnel where exchange of an initial UDP packet indicates the availability of UDP connectivity.