Application network appliance with built-in virtual directory interface

a network appliance and virtual directory technology, applied in the field of application network appliances, can solve the problems of increasing the requirements for data security, enterprises no longer enjoy the same level of trust and control of their intranets, and unsustainable hardened perimeter strategies

Inactive Publication Date: 2009-03-05
CISCO TECH INC
View PDF56 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013]An application network appliance with a built-in virtual directory interface is described herein. According to one embodiment, a network element includes a virtual directory interface (VDI) coupled to a plurality of directory servers, and an authentication and authorization unit coupled to the VDI. In response to a packet of a network transaction received from a client over a first network for accessing a server of a datacenter over a second network, the authentication and authorization unit is configured t

Problems solved by technology

However, communication via the Internet, which typically uses TCP/IP (Transmission Control Protocol/Internet Protocol), also increases the requirements for data security.
However, in today's business environment, enterprises no longer enjoy the same level of trust and control of their intranets, as enterprises increasingly rely on contractors, partners, consultants, vendors, and visitors on-site for daily operation.
As a result, enterprises are exposing internal resources to this wide set of clients whose roles are also frequently changing.
Enterprises are coming to terms with the fact that a hardened perimeter strategy is un-sustainable.
Traditional firewall or router access control lists cannot protect application resources from unauthorized access because network parameters such as Internet Protocol (IP) addresses and IP port numbers no longer deterministically identify resources, nor identify users, clients, or applications accessing these resources.
However, with the proliferation of mobile devices and tunneled applications, the network layer parameters are no longer useful to identify the client, the resource accessed, and the operation.
Traditional server-centric authorization solutions providing role-based authorization often require custom code de

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application network appliance with built-in virtual directory interface
  • Application network appliance with built-in virtual directory interface
  • Application network appliance with built-in virtual directory interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]In the following description, numerous details are set forth to provide a more thorough explanation of embodiments of the present invention. It will be apparent, however, to one skilled in the art, that embodiments of the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form, rather than in detail, in order to avoid obscuring embodiments of the present invention.

[0033]Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification do not necessarily all refer to the same embodiment.

[0034]One aspect of the invention is to perform Triangulated Authorization as a means for network-centric, application-agnostic authorization and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An application network appliance with a built-in virtual directory interface is described herein. According to one embodiment, a network element includes a virtual directory interface (VDI) coupled to multiple directory servers, and an authentication and authorization unit coupled to the VDI. In response to a packet of a network transaction received from a client over a first network for accessing a server of a datacenter over a second network, the authentication and authorization unit obtains user attributes from the directory servers via the VDI and performs authentication and authorization using the user attributes to determine whether a user of the client is eligible to access the server of the datacenter, where the network element operates as a security gateway to the datacenter. Other methods and apparatuses are also described.

Description

RELATED APPLICATIONS[0001]This application claims the benefit of U.S. Provisional Patent Application No. 60 / 966,649, filed Aug. 28, 2007, which is incorporated by reference herein in its entirety.FIELD OF THE INVENTION[0002]The present invention relates generally to application network appliances. More particularly, this invention relates to application network appliances with built-in virtual directory interface.BACKGROUND[0003]The ability to connect information technology infrastructure reliably, cost-effectively and securely is of high importance for today's global enterprises. To communicate with customers, clients, business partners, employees, etc., the Internet has proven to be more appropriate compared to private communication networks. However, communication via the Internet, which typically uses TCP / IP (Transmission Control Protocol / Internet Protocol), also increases the requirements for data security. Network firewalls are one of the many examples of solutions for network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L47/20
CPCH04L63/166H04L63/0428H04L69/161H04L69/16H04L69/321Y10T70/5827H04L47/20H04L9/3242H04L63/02H04L63/205
Inventor BAGEPALLI, NAGARAJGANDHI, PRASHANTPATRA, ABHIJITPRABHU, KIRTITHAKAR, ANANT
Owner CISCO TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products