US20080022391A1 - VPN discovery server - Google Patents
VPN discovery server Download PDFInfo
- Publication number
- US20080022391A1 US20080022391A1 US11/447,092 US44709206A US2008022391A1 US 20080022391 A1 US20080022391 A1 US 20080022391A1 US 44709206 A US44709206 A US 44709206A US 2008022391 A1 US2008022391 A1 US 2008022391A1
- Authority
- US
- United States
- Prior art keywords
- vpn
- vpn gateway
- network
- gateways
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4675—Dynamic sharing of VLAN information amongst network nodes
- H04L12/4679—Arrangements for the registration or de-registration of VLAN attribute values, e.g. VLAN identifiers, port VLAN membership
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/22—Alternate routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/28—Routing or path finding of packets in data switching networks using route fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
Definitions
- the present invention relates generally to secure routing. More particularly, the invention relates to a Virtual Private Network (VPN) discovery server for enabling efficient routing between VPNs.
- VPN Virtual Private Network
- VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
- VPN gateways isolate the routing information of higher security networks from being visible in lower security transport networks.
- a VPN gateway may provide a protected enclave an IP Secure (IPSec) encryption service.
- IPSec IP Secure
- routing between protected enclaves entails being able to map remote protected enclaves (Plain Text (PT) networks) to corresponding VPN gateways having Cipher Text (CT) network addresses.
- PT Pein Text
- CT Cipher Text
- SAs security associations
- protocols for enabling robust routing in networks implementing VPN gateways need to be easy to implement, deploy, manage and configure.
- the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more secure gateways, over an unsecured network.
- Methods and systems according to the present invention achieve key routing requirements while presenting solutions that can be readily scaled to large network environments.
- the present invention provides methods and systems for implementing a Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) networks to secure gateways, maintains current network routing information, and assists VPN gateways in determining routes and VPN connections to remote protected enclaves.
- PDS Prefix Discovery Server
- PT Plain Text
- FIG. 1 illustrates an example topology that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
- FIG. 2 illustrates an example topology that employs VPN gateways to enable secure communication between Plain Text (PT) networks over a Cipher Text (CT) network.
- PT Plain Text
- CT Cipher Text
- FIG. 3 illustrates an example topology that employs VPN Discovery Servers to enable secure communication between protected enclaves over an unsecured network.
- FIG. 4A illustrates an example topology of Plain Text (PT)/Cipher Text (CT) concatenated networks.
- PT Plain Text
- CT Cipher Text
- FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A .
- FIG. 5 is a process flowchart that illustrates a method for enabling robust routing between protected enclaves over an unsecured network.
- VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
- VPN gateways When used in highly dynamic networks, such as military tactical networks, certain key routing requirements must be achieved. These include, for example, easily discovering VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” VPN gateways, and adapting security associations (SAs) (connection-specific parameters) among VPN gateways according to changes in VPN gateway network topology and/or network conditions. In addition to these routing requirements, management and operations requirements for VPN gateways must be minimized.
- SAs security associations
- FIG. 1 illustrates an example topology 100 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
- a protected enclave refers to a group of one or more secure networks. Secure networks are also referred to as Plain Text (PT) networks since data traffic within said networks is typically not encrypted.
- PT Plain Text
- a protected enclave includes one or more network prefixes (network addresses).
- protected enclaves 102 , 104 , 106 , and 108 communicate over an unsecured black core network 110 .
- Each protected enclave 102 , 104 , 106 , and 108 employs a VPN gateway 112 , 114 , 116 , and 118 , respectively.
- the VPN gateway provides the protected enclave with an IP Security (IP Sec) encryption service. Accordingly, data traffic originating from one of the protected enclaves and traversing black core network 110 is encrypted by its corresponding VPN gateway.
- IP Sec IP Security
- a VPN gateway may support one or more protected enclaves.
- a protected enclave may have access to one or more VPN gateways.
- a protected enclave may use two VPN gateways to receive encrypted data traffic from other protected enclaves, wherein each VPN gateway is dedicated to delivering data traffic of a pre-determined type.
- VPN tunnels provide authenticated encryption/decryption services to the protected enclaves.
- protected enclaves 102 and 104 communicate using VPN tunnel 120 over black core network 110 .
- VPN tunnel 120 is set up between VPN gateways 112 and 114 , which support protected enclaves 102 and 104 , respectively.
- FIG. 2 is another example topology 200 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network.
- protected enclaves communicate over the Internet 202 , which is a low security level network.
- VPN gateway 204 supports a first protected enclave, which includes network 210 .
- VPN gateway 206 supports a second protected enclave, which includes networks 212 and 214 .
- VPN gateway 208 supports a third protected enclave, which includes network 216 .
- a plurality of routers 218 may be used within a protected enclave, as needed, to route traffic to networks within the enclave.
- traffic originating from network 210 (within the first protected enclave) and destined to network 212 (within the second protected enclave) is encrypted by VPN gateway 204 , before being transmitted over the Internet 202 to VPN gateway 206 .
- VPN gateway 204 Typically, a VPN tunnel (not shown in FIG. 2 ) is set up between VPN gateways 204 and 206 .
- the encrypted data traffic is decrypted and routed to network 212 .
- Inherent within this process is the ability of network 210 to determine a correct routing path to network 212 over network topology 200 . This includes having knowledge at network 210 of VPN gateways that support and reach network 212 .
- routing in a network that uses VPN gateways entails having sufficient information about the VPN gateway topology.
- VPN gateways may be configured with pre-determined routes to reach remote protected enclaves in the network.
- VPN gateways share routing information with each other in order for each VPN gateway to generate a complete view of the network topology, based on which routing is performed.
- Peer discovery is the process by which a source VPN gateway locates a corresponding target VPN gateway in a Cipher Text (CT) domain that reaches a target host for which traffic is intended. While routing technology is adequate for the proper delivery of IP traffic in the absence of secure VPNs, the use of VPN tunnels may create routing problems. For example, IP addressing is no longer transparent from end-to-end due to encryption in VPN tunnels or the use of (RFC 1918) private IP address space.
- SA Adaptive Security Association
- Robust networks leveraging VPN gateways must be able to adapt to changes in network topology and/or network conditions. This includes adapting to the addition, failure, or mobility of network infrastructure that affect routing paths in the network. Further, networks must be able to monitor the performance of established routes (e.g., VPN tunnels), modify settings (Security Associations) associated with these routes, or establish better routes when necessary.
- established routes e.g., VPN tunnels
- modify settings Security Associations
- Detection of peers which have failed, or are no longer reachable is necessary in any type of network in order to avoid single point communication failures. This is particularly required in networks that leverage VPN gateways. For example, a VPN gateway may not be able to determine that a SA is no longer valid and to initiate a new SA without the ability to detect failed peers.
- VPN gateways Resources required for management and operations of VPN gateways must be minimized. In military tactical networks, for example, management is a critical concern. This is due to the difficulty of configuring and maintaining military tactical networks given their high operational tempo and the limited availability of properly cleared and experienced personnel.
- the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more VPN gateways, over an unsecured network.
- Methods and systems according to the present invention achieve the above described key routing requirements while presenting solutions that can be readily scaled to large network environments.
- PDS Prefix Discovery Server
- PT Plain Text
- VPN gateways that support these networks, maintains current network routing information, and assists VPN gateways in determining routes to remote protected enclaves.
- the VPN-based PDS allows for a fewer number of VPN gateways to be employed and eliminates the need for backup gateways. This is the case since the PDS allows for more efficient utilization of VPN gateways and for dynamic switching of traffic among gateways. Further, the PDS improves network scalability as it enables load-balancing among VPN gateways and requires minimal configuration for adding new or removing VPN gateways.
- FIG. 3 illustrates an example topology 300 that employs VPN-based Prefix Discovery Servers (PDSs) to enable secure communication between protected enclaves over an unsecured network.
- PDSs Prefix Discovery Servers
- Example topology 300 includes PDSs 302 and 304 , protected networks 314 , 316 and 318 , VPN gateways 306 , 308 , 310 , and 312 , and a plurality of routers 320 for routing data traffic between the different elements of topology 300 .
- Network 314 is supported by VPN gateway 312 .
- Networks 316 and Z 318 are supported by VPN gateway 308 .
- links connecting VPN gateways to their protected networks e.g., links connecting VPN gateway 312 to network 314
- links connecting VPN gateways to each other e.g., links connecting VPN gateway 312 to VPN gateway 306
- a method for enabling robust routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways will now be provided, according to an embodiment of the present invention.
- the method is illustrated by process flowchart 500 of FIG. 5 , and will be described with continued reference to example topology 300 of FIG. 3 .
- VPN Virtual Private Network
- Process flowchart 500 begins in step 502 , which includes registering a VPN gateway with one or more servers.
- the servers are VPN-based Prefix Discovery Servers.
- step 502 is achieved by the VPN gateway contacting the nearest PDS server and registering with the server network prefixes for which it provides reachability.
- VPN gateway 312 contacts PDS 302 to register network 314 .
- VPN gateway 308 contacts PDS 304 to register networks 316 and 318 .
- the VPN gateway is pre-configured with a set of reachable or supported network prefixes to register with the PDS.
- the VPN gateway dynamically discovers reachable network prefixes through participation in the interior routing protocol of the protected enclaves directly attached thereto.
- the VPN gateway may register with one or more servers. Further, the VPN gateway registration may include registering with the PDS server(s) one or more metrics associated with the VPN gateway. These metrics may include, among others, application types supported by the gateway, traffic types supported by the gateway, prefix administrative costs associated with the gateway, and/or preference values associated with the gateway.
- metrics are assigned to the VPN gateway by the enclaves or networks that it supports.
- a multi-homed enclave (supported by more than one gateway) can configure a first VPN gateway to support Voice over IP and/or video teleconferencing, a second VPN gateway to support inbound web server requests, and a third VPN gateway to support all other inbound and outbound traffic.
- a protected enclave may use a preference value to distinguish one VPN gateway as preferred over another. This preference value combined with traffic differentiators (used to route traffic through gateways according to traffic type) provides a VPN gateway with layer 4 switching functionality.
- the preference value may be used by a multi-home enclave to enabling load-balancing
- Process flowchart 500 continues at the PDS side, and in step 504 includes generating mappings between network prefixes and VPN gateways.
- the mappings may be in the form of prefix routing tables that indicate for each known prefix in the network the one or more VPN gateways that may reach that prefix.
- the mappings may also include associated metrics as indicated during registration.
- the mappings are referred to as plain text to cipher text mappings.
- the PDS may be configured to push the generated mappings (and associated metrics) to all VPN gateways registered therewith.
- a VPN gateway may query the PDS for mappings for one or more remote network prefixes.
- the VPN gateway informs the PDS during registration whether or not it will query for prefixes or expect periodical registration updates from the server.
- step 506 of process flowchart 500 includes transmitting the generated mappings to the VPN gateway by the PDS server(s).
- PDSs may also share generated mappings among each other. For example, as shown in FIG. 3 , PDS 304 and PDS 302 exchange registration information with one another. PDSs may then additionally distribute to VPN gateways mappings learned from other PDS servers in step 506 .
- the PDS may periodically update its mappings based on detected changes in VPN gateway topology. For example, when a VPN gateway de-registers itself and its supported enclaves from a PDS, the PDS may update its mappings and inform VPN gateways that received mappings from it of any changes.
- Process flowchart 500 continues in step 508 , which includes receiving the transmitted mappings at the VPN gateway, and distributing the mappings to networks or enclaves supported by the VPN gateway.
- the VPN gateway upon receiving the mappings, uses the received mappings to discover peer VPN gateways in the network.
- the VPN gateway is configured to distribute received mappings using the interior routing protocols of enclaves directly attached thereto.
- the metrics associated with the mappings may have to be modified according to the type of routing protocol used within each enclave before distribution. This may be necessary when enclaves supported by a VPN gateway each uses a different interior routing protocol. For example, one enclave may use Routing Information Protocol (RIP) metrics while another may use (Open Shortest Path First) OSPF metrics. In other embodiments, the metrics learned from the PDS(s) are distributed without modification to the enclaves.
- RIP Routing Information Protocol
- OSPF Open Shortest Path First
- This local enclave distribution function combined with the ability of VPN gateways to perform metric-based prefix registration as described above, permits routing to occur through multiple sets of PT/CT concatenated networks, as will be further described below.
- the VPN gateway may have the PDS(s) periodically forward thereto registration updates or may query the PDS(s), on-demand, for addresses of remote VPN gateways given a remote network prefix that it is trying to reach. Based on the information received from the PDS(s), the VPN gateway may select a peer VPN gateway for communicating with the remote network prefix. The selected peer VPN gateway is one that may reach the remote network prefix.
- step 510 of process flowchart 500 includes selecting, given a destination network prefix, a first remote VPN gateway for reaching said destination network prefix from said VPN gateway.
- selecting the remote VPN gateway is done according to one or more metrics as described above: application types supported by the remote gateway, traffic types supported by the remote gateway, a prefix administrative cost associated with the remote gateway, and/or a preference value associated with the remote gateway.
- a PDS server may provide a source VPN gateway with both multiple prefix administrative costs for a set of remote VPN gateways and multiple preference levels for traffic differentiators for the same set of remote VPN gateways, given a destination network prefix reachable by the set of remote VPN gateways.
- the source VPN gateway may then select the remote peer for communicating with the destination prefix by traffic differentiation and then by prefix administrative cost.
- SA Security Association
- the VPN gateway proceeds, in step 512 , to establish a first security association (SA) between itself and the first remote VPN gateway.
- SA represents a group of security settings related to a VPN tunnel established between the VPN gateway and the first remote VPN gateway.
- the SA is an IPSec SA.
- step 512 includes receiving the selected first remote VPN gateway's cipher text address and public key. Messages are then exchanged between the VPN gateway and the first remote VPN gateway to negotiate the VPN tunnel. The public key will be used for encrypting/decrypting traffic between the two gateways.
- the VPN gateway uses IPSec dead peer detection or equivalent functionality to help assess the health of the connection and permit peer failure detection.
- IPSec dead peer detection exchanges periodic keep-alive type messages through the VPN tunnel when there is no traffic flowing. If there is no response from the remote gateway within a configured time, the tunnel is deleted.
- process 500 includes measuring a performance level of the first SA, and comparing the measured performance to a threshold. Based on the result of the comparison in step 516 , the VPN gateway may decide either to maintain the current first SA, or to proceed in step 518 to modifying the first SA or canceling the first SA and establishing a second SA with a second remote VPN gateway that supports the destination network prefix. Alternatively, the VPN gateway may determine to switch from the first SA to the second SA solely based upon an expected positive change in performance level. In this case, step 516 may be omitted in process flowchart 500 .
- Methods and systems, according to the present invention allow for seamless routing through concatenated PT/CT networks. This, as described above, is due to the ability of VPN gateways to perform metric-based prefix registration combined with local enclave distribution and inter-PDS(s) exchange of registration information. Accordingly, VPN tunnels can be established to connect remote protected enclaves that are separated by more than one unsecured networks. In addition, VPN tunnels between remote gateways may be adapted according to changes in network topology and/or network conditions. This is further illustrated below with reference to FIGS. 4A and 4B .
- FIG. 4A illustrates an example topology 400 of Plain Text (PT)/Cipher Text (CT) concatenated networks.
- Topology 400 includes a plurality of PT networks 410 , 412 , and 414 , Prefix Discovery Servers 402 and 404 , and Secure Gateways 416 , 418 , 420 , 422 , 424 , and 426 .
- a high speed low latency network GIG 406 and a moderate speed high latency satellite network 408 serve as transport networks between PT networks 410 , 412 , and 414 .
- GIG 406 and satellite network 408 represent CT networks.
- Secure gateways 416 and 418 support PT network 410 with secure gateway 416 being a primary gateway and secure gateway 418 being a backup gateway. Similarly, secure gateways 422 and 424 support PT network 414 , and secure gateways 426 and 420 support PT network 412 .
- the secure gateways Prior to routing over topology 400 , the secure gateways perform a metric-based registration, as described above, with servers 402 and 404 .
- the secure gateways register with the nearest PDS.
- secure gateways 416 , 418 , 420 , and 422 register with server 402 .
- Secure gateways 424 and 426 register with server 404 .
- prefix routing table 428 As shown in FIG. 4A , the registration results in prefix routing tables 428 and 430 at servers 402 and 404 , respectively.
- prefix routing table 428 secure gateway 416 registers network prefix R 1 with an associated metric of 2.
- Secure gateway 418 registers network prefix R 1 with an associated metric of 6. This is because secure gateway 416 as the primary is preferred to secure gateway 418 , which is the backup.
- routes between PT networks are determined according to the metrics provided in the prefix routing tables with routes associated with lower cost metrics preferred to ones with higher cost metrics. Other factors may be considered when a plurality of routes with same cost metrics exist.
- PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 424 and 426 over satellite network 408 .
- Secure gateway 426 advertises a cost metric of 2 for reaching PT network 412 (prefix R 3 ) in prefix routing table 430 .
- PT network 414 may communicate with PT network 412 by setting up a secure tunnel between secure gateways 422 and 420 over GIG network 406 .
- Secure gateway 420 also advertises a cost metric of 2 for reaching PT network 412 (prefix R 3 ) in prefix routing table 428 . Accordingly, network 414 may use other factors to determine the optimal route to network 412 . In the specific example of FIG. 4A , network 414 may select the route over GIG network 406 due to GIG 406 being a high speed low latency network, for example. Similarly, network 412 may prefer secure gateway 420 for communication with networks 410 and 414 , but employs secure gateway 426 as an alternate.
- an important feature according to the present invention is the ability to dynamically adapt secure tunnels between protected enclaves according to changes in network topology and/or network conditions. This, as discussed above, is due to VPN gateways having the ability to discover peer gateways, detect failed peers, periodically receive registration updates from PDSs, and continuously monitor the performance of setup secure tunnels.
- FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology of FIG. 4A .
- a link failure causes secure gateway 420 to lose its link to GIG network 406 .
- This link failure causes a change in network topology. Specifically, the link failure results in PT network 412 losing its preferred route to PT networks 410 and 414 .
- PT network 412 may detect the link failure after several keep-alive messages to network 410 over a secure tunnel between secure gateways 420 and 416 are unanswered. Subsequently, PT network 412 may query server 404 for an alternative gateway that may reach network 410 . A new route that now spans both satellite network 408 and GIG network 406 and comprising three VPN tunnels (between secure gateways 426 - 424 , 424 - 422 , and 422 - 416 ) is established between PT networks 412 and 410 , as shown in FIG. 4B .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The U.S. government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Contract No. 0705M880-W1 awarded by the United States Army.
- The present invention relates generally to secure routing. More particularly, the invention relates to a Virtual Private Network (VPN) discovery server for enabling efficient routing between VPNs.
- VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
- Typically, VPN gateways isolate the routing information of higher security networks from being visible in lower security transport networks. For example, a VPN gateway may provide a protected enclave an IP Secure (IPSec) encryption service. Accordingly, routing between protected enclaves entails being able to map remote protected enclaves (Plain Text (PT) networks) to corresponding VPN gateways having Cipher Text (CT) network addresses.
- While this may be a straightforward task in static networks, several key requirements need to be present in order to enable robust routing between protected enclaves in dynamic networks, such as military tactical networks, for example. These requirements include, for example, easily discovering peer VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” peer VPN gateways, and adapting security associations (SAs) (a group of security settings related to a VPN tunnel) among VPN gateways according to changes in VPN gateway network topology and/or network conditions.
- Further, in networks having high operational tempo, such as military tactical networks, for example, management and configuration required for realizing the above described requirements is a critical concern. Accordingly, protocols for enabling robust routing in networks implementing VPN gateways need to be easy to implement, deploy, manage and configure.
- What is needed therefore are methods and systems for enabling robust routing between protected enclaves using VPN gateways while satisfying the above described requirements.
- Methods and systems for enabling robust routing between protected enclaves over an unsecured network are provided herein.
- In one aspect, the present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more secure gateways, over an unsecured network. Methods and systems according to the present invention achieve key routing requirements while presenting solutions that can be readily scaled to large network environments.
- In another aspect, the present invention provides methods and systems for implementing a Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) networks to secure gateways, maintains current network routing information, and assists VPN gateways in determining routes and VPN connections to remote protected enclaves.
- Further embodiments, features, and advantages of the present invention, as well as the structure and operation of the various embodiments of the present invention, are described in detail below with reference to the accompanying drawings.
- The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate the present invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention.
-
FIG. 1 illustrates an example topology that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network. -
FIG. 2 illustrates an example topology that employs VPN gateways to enable secure communication between Plain Text (PT) networks over a Cipher Text (CT) network. -
FIG. 3 illustrates an example topology that employs VPN Discovery Servers to enable secure communication between protected enclaves over an unsecured network. -
FIG. 4A illustrates an example topology of Plain Text (PT)/Cipher Text (CT) concatenated networks. -
FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology ofFIG. 4A . -
FIG. 5 is a process flowchart that illustrates a method for enabling robust routing between protected enclaves over an unsecured network. - The present invention will be described with reference to the accompanying drawings. The drawing in which an element first appears is typically indicated by the leftmost digit(s) in the corresponding reference number.
- VPN gateways are used in commercial internets, government enterprise networks, and military tactical networks. VPN gateways provide security and privacy for IP data traffic when enclaves of higher security levels (protected networks) must use networks of lower security levels for communication (e.g., corporate networks using the Internet for data transport).
- When used in highly dynamic networks, such as military tactical networks, certain key routing requirements must be achieved. These include, for example, easily discovering VPN gateways and their protected enclaves once connected to the network, detecting failed or “dead” VPN gateways, and adapting security associations (SAs) (connection-specific parameters) among VPN gateways according to changes in VPN gateway network topology and/or network conditions. In addition to these routing requirements, management and operations requirements for VPN gateways must be minimized.
-
FIG. 1 illustrates anexample topology 100 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network. When used herein, a protected enclave refers to a group of one or more secure networks. Secure networks are also referred to as Plain Text (PT) networks since data traffic within said networks is typically not encrypted. A protected enclave includes one or more network prefixes (network addresses). - In
FIG. 1 , protectedenclaves black core network 110. Each protectedenclave VPN gateway black core network 110 is encrypted by its corresponding VPN gateway. - A VPN gateway may support one or more protected enclaves. In turn, a protected enclave may have access to one or more VPN gateways. For example, a protected enclave may use two VPN gateways to receive encrypted data traffic from other protected enclaves, wherein each VPN gateway is dedicated to delivering data traffic of a pre-determined type.
- Typically, communication between protected enclaves is achieved by setting up VPN tunnels between VPN gateways that support the communicating enclaves. VPN tunnels provide authenticated encryption/decryption services to the protected enclaves. Referring to the example of
FIG. 1 , protectedenclaves VPN tunnel 120 overblack core network 110.VPN tunnel 120 is set up betweenVPN gateways enclaves -
FIG. 2 is anotherexample topology 200 that employs VPN gateways to enable secure communication between protected enclaves over an unsecured network. In the example ofFIG. 2 , protected enclaves communicate over the Internet 202, which is a low security level network. VPNgateway 204 supports a first protected enclave, which includesnetwork 210. VPNgateway 206 supports a second protected enclave, which includesnetworks gateway 208 supports a third protected enclave, which includesnetwork 216. A plurality ofrouters 218, as shown inFIG. 2 , may be used within a protected enclave, as needed, to route traffic to networks within the enclave. - In an exemplary communication between protected enclaves in
FIG. 2 , traffic originating from network 210 (within the first protected enclave) and destined to network 212 (within the second protected enclave) is encrypted byVPN gateway 204, before being transmitted over the Internet 202 toVPN gateway 206. Typically, a VPN tunnel (not shown inFIG. 2 ) is set up betweenVPN gateways VPN gateway 206, the encrypted data traffic is decrypted and routed tonetwork 212. Inherent within this process is the ability ofnetwork 210 to determine a correct routing path to network 212 overnetwork topology 200. This includes having knowledge atnetwork 210 of VPN gateways that support and reachnetwork 212. - Accordingly, routing in a network that uses VPN gateways, such as
network topology 200 for example, entails having sufficient information about the VPN gateway topology. - In static networks with little or no changes in network topology (including prefixes and VPN gateways), VPN gateways may be configured with pre-determined routes to reach remote protected enclaves in the network. Alternatively, VPN gateways share routing information with each other in order for each VPN gateway to generate a complete view of the network topology, based on which routing is performed.
- While these approaches may be suitable for static networks, dynamic networks with frequently changing topology require more adaptive techniques for enabling robust routing between protected enclaves in a network using VPN gateways. Several key routing requirements, discussed in more detail below, need to be present for dynamic networks.
- Peer Discovery
- Peer discovery is the process by which a source VPN gateway locates a corresponding target VPN gateway in a Cipher Text (CT) domain that reaches a target host for which traffic is intended. While routing technology is adequate for the proper delivery of IP traffic in the absence of secure VPNs, the use of VPN tunnels may create routing problems. For example, IP addressing is no longer transparent from end-to-end due to encryption in VPN tunnels or the use of (RFC 1918) private IP address space.
- Adaptive Security Association (SA) Management
- Robust networks leveraging VPN gateways must be able to adapt to changes in network topology and/or network conditions. This includes adapting to the addition, failure, or mobility of network infrastructure that affect routing paths in the network. Further, networks must be able to monitor the performance of established routes (e.g., VPN tunnels), modify settings (Security Associations) associated with these routes, or establish better routes when necessary.
- Peer Failure Detection
- Detection of peers which have failed, or are no longer reachable, is necessary in any type of network in order to avoid single point communication failures. This is particularly required in networks that leverage VPN gateways. For example, a VPN gateway may not be able to determine that a SA is no longer valid and to initiate a new SA without the ability to detect failed peers.
- Resources required for management and operations of VPN gateways must be minimized. In military tactical networks, for example, management is a critical concern. This is due to the difficulty of configuring and maintaining military tactical networks given their high operational tempo and the limited availability of properly cleared and experienced personnel.
- The present invention provides methods and systems for enabling routing among a plurality of protected enclaves, each supported by one or more VPN gateways, over an unsecured network. Methods and systems according to the present invention achieve the above described key routing requirements while presenting solutions that can be readily scaled to large network environments.
- In an embodiment of the present invention, methods and systems are provided for implementing a VPN-based Prefix Discovery Server (PDS) that enables the mapping of Plain Text (PT) or protected networks to VPN gateways that support these networks, maintains current network routing information, and assists VPN gateways in determining routes to remote protected enclaves.
- In other embodiments, the VPN-based PDS allows for a fewer number of VPN gateways to be employed and eliminates the need for backup gateways. This is the case since the PDS allows for more efficient utilization of VPN gateways and for dynamic switching of traffic among gateways. Further, the PDS improves network scalability as it enables load-balancing among VPN gateways and requires minimal configuration for adding new or removing VPN gateways.
-
FIG. 3 illustrates anexample topology 300 that employs VPN-based Prefix Discovery Servers (PDSs) to enable secure communication between protected enclaves over an unsecured network. -
Example topology 300 includesPDSs networks VPN gateways routers 320 for routing data traffic between the different elements oftopology 300. -
Network 314 is supported byVPN gateway 312.Networks 316 andZ 318 are supported byVPN gateway 308. Accordingly, inexample topology 300, links connecting VPN gateways to their protected networks (e.g., links connectingVPN gateway 312 to network 314) represent secure links. Data traffic is not encrypted over these links. On the other hand, links connecting VPN gateways to each other (e.g., links connectingVPN gateway 312 to VPN gateway 306) are unsecured links and data traffic needs to be encrypted when routed over these links. - A method for enabling robust routing among a plurality of protected enclaves, wherein each of the protected enclaves is supported by one or more Virtual Private Network (VPN) gateways will now be provided, according to an embodiment of the present invention. The method is illustrated by
process flowchart 500 ofFIG. 5 , and will be described with continued reference toexample topology 300 ofFIG. 3 . - PDS Registration
-
Process flowchart 500 begins instep 502, which includes registering a VPN gateway with one or more servers. In an embodiment, the servers are VPN-based Prefix Discovery Servers. Typically,step 502 is achieved by the VPN gateway contacting the nearest PDS server and registering with the server network prefixes for which it provides reachability. Referring toFIG. 3 , for example,VPN gateway 312contacts PDS 302 to registernetwork 314. Similarly,VPN gateway 308contacts PDS 304 to registernetworks - The VPN gateway may register with one or more servers. Further, the VPN gateway registration may include registering with the PDS server(s) one or more metrics associated with the VPN gateway. These metrics may include, among others, application types supported by the gateway, traffic types supported by the gateway, prefix administrative costs associated with the gateway, and/or preference values associated with the gateway.
- Typically, metrics are assigned to the VPN gateway by the enclaves or networks that it supports. Accordingly, for example, a multi-homed enclave (supported by more than one gateway) can configure a first VPN gateway to support Voice over IP and/or video teleconferencing, a second VPN gateway to support inbound web server requests, and a third VPN gateway to support all other inbound and outbound traffic. Similarly, a protected enclave may use a preference value to distinguish one VPN gateway as preferred over another. This preference value combined with traffic differentiators (used to route traffic through gateways according to traffic type) provides a VPN gateway with
layer 4 switching functionality. In other embodiments, the preference value may be used by a multi-home enclave to enabling load-balancing -
Process flowchart 500 continues at the PDS side, and instep 504 includes generating mappings between network prefixes and VPN gateways. The mappings may be in the form of prefix routing tables that indicate for each known prefix in the network the one or more VPN gateways that may reach that prefix. The mappings may also include associated metrics as indicated during registration. In embodiments, the mappings are referred to as plain text to cipher text mappings. - The PDS may be configured to push the generated mappings (and associated metrics) to all VPN gateways registered therewith. Alternatively, a VPN gateway may query the PDS for mappings for one or more remote network prefixes. In an embodiment, the VPN gateway informs the PDS during registration whether or not it will query for prefixes or expect periodical registration updates from the server. Accordingly, step 506 of
process flowchart 500 includes transmitting the generated mappings to the VPN gateway by the PDS server(s). It is noted that PDSs may also share generated mappings among each other. For example, as shown inFIG. 3 ,PDS 304 andPDS 302 exchange registration information with one another. PDSs may then additionally distribute to VPN gateways mappings learned from other PDS servers instep 506. - In addition, the PDS may periodically update its mappings based on detected changes in VPN gateway topology. For example, when a VPN gateway de-registers itself and its supported enclaves from a PDS, the PDS may update its mappings and inform VPN gateways that received mappings from it of any changes.
- Peer Discovery and Local Enclave Distribution
-
Process flowchart 500 continues instep 508, which includes receiving the transmitted mappings at the VPN gateway, and distributing the mappings to networks or enclaves supported by the VPN gateway. In an embodiment, the VPN gateway, upon receiving the mappings, uses the received mappings to discover peer VPN gateways in the network. - In another embodiment, the VPN gateway is configured to distribute received mappings using the interior routing protocols of enclaves directly attached thereto. In embodiments, the metrics associated with the mappings may have to be modified according to the type of routing protocol used within each enclave before distribution. This may be necessary when enclaves supported by a VPN gateway each uses a different interior routing protocol. For example, one enclave may use Routing Information Protocol (RIP) metrics while another may use (Open Shortest Path First) OSPF metrics. In other embodiments, the metrics learned from the PDS(s) are distributed without modification to the enclaves.
- This local enclave distribution function, combined with the ability of VPN gateways to perform metric-based prefix registration as described above, permits routing to occur through multiple sets of PT/CT concatenated networks, as will be further described below.
- Peer Gateway Selection
- Routing between protected enclaves according to an embodiment of the present invention will now be described with continued reference to process
flowchart 500. - As described above, the VPN gateway may have the PDS(s) periodically forward thereto registration updates or may query the PDS(s), on-demand, for addresses of remote VPN gateways given a remote network prefix that it is trying to reach. Based on the information received from the PDS(s), the VPN gateway may select a peer VPN gateway for communicating with the remote network prefix. The selected peer VPN gateway is one that may reach the remote network prefix.
- Accordingly, step 510 of
process flowchart 500 includes selecting, given a destination network prefix, a first remote VPN gateway for reaching said destination network prefix from said VPN gateway. In an embodiment, selecting the remote VPN gateway is done according to one or more metrics as described above: application types supported by the remote gateway, traffic types supported by the remote gateway, a prefix administrative cost associated with the remote gateway, and/or a preference value associated with the remote gateway. - For example, a PDS server may provide a source VPN gateway with both multiple prefix administrative costs for a set of remote VPN gateways and multiple preference levels for traffic differentiators for the same set of remote VPN gateways, given a destination network prefix reachable by the set of remote VPN gateways. The source VPN gateway may then select the remote peer for communicating with the destination prefix by traffic differentiation and then by prefix administrative cost.
- Once the VPN gateway has selected in
step 510 the first remote VPN gateway for reaching the destination network prefix, the VPN gateway proceeds, instep 512, to establish a first security association (SA) between itself and the first remote VPN gateway. The SA represents a group of security settings related to a VPN tunnel established between the VPN gateway and the first remote VPN gateway. In an embodiment, the SA is an IPSec SA. - Typically,
step 512 includes receiving the selected first remote VPN gateway's cipher text address and public key. Messages are then exchanged between the VPN gateway and the first remote VPN gateway to negotiate the VPN tunnel. The public key will be used for encrypting/decrypting traffic between the two gateways. - After the SA has been established, the VPN gateway uses IPSec dead peer detection or equivalent functionality to help assess the health of the connection and permit peer failure detection. IPSec dead peer detection exchanges periodic keep-alive type messages through the VPN tunnel when there is no traffic flowing. If there is no response from the remote gateway within a configured time, the tunnel is deleted.
- Further, the VPN periodically queries the PDS(s) to determine if a better remote VPN gateway is available to replace the current first remote VPN gateway. Accordingly, in an embodiment as in
step 514,process 500 includes measuring a performance level of the first SA, and comparing the measured performance to a threshold. Based on the result of the comparison instep 516, the VPN gateway may decide either to maintain the current first SA, or to proceed instep 518 to modifying the first SA or canceling the first SA and establishing a second SA with a second remote VPN gateway that supports the destination network prefix. Alternatively, the VPN gateway may determine to switch from the first SA to the second SA solely based upon an expected positive change in performance level. In this case, step 516 may be omitted inprocess flowchart 500. - Routing in PT/CT Concatenated Networks
- Methods and systems, according to the present invention, allow for seamless routing through concatenated PT/CT networks. This, as described above, is due to the ability of VPN gateways to perform metric-based prefix registration combined with local enclave distribution and inter-PDS(s) exchange of registration information. Accordingly, VPN tunnels can be established to connect remote protected enclaves that are separated by more than one unsecured networks. In addition, VPN tunnels between remote gateways may be adapted according to changes in network topology and/or network conditions. This is further illustrated below with reference to
FIGS. 4A and 4B . -
FIG. 4A illustrates anexample topology 400 of Plain Text (PT)/Cipher Text (CT) concatenated networks.Topology 400 includes a plurality ofPT networks Prefix Discovery Servers Secure Gateways - A high speed low
latency network GIG 406 and a moderate speed highlatency satellite network 408 serve as transport networks betweenPT networks GIG 406 andsatellite network 408 represent CT networks. -
Secure gateways support PT network 410 withsecure gateway 416 being a primary gateway andsecure gateway 418 being a backup gateway. Similarly,secure gateways support PT network 414, andsecure gateways support PT network 412. - Prior to routing over
topology 400, the secure gateways perform a metric-based registration, as described above, withservers FIG. 4A ,secure gateways server 402.Secure gateways server 404. - As shown in
FIG. 4A , the registration results in prefix routing tables 428 and 430 atservers secure gateway 416 registers network prefix R1 with an associated metric of 2.Secure gateway 418 registers network prefix R1 with an associated metric of 6. This is becausesecure gateway 416 as the primary is preferred to securegateway 418, which is the backup. - Typically, routes between PT networks are determined according to the metrics provided in the prefix routing tables with routes associated with lower cost metrics preferred to ones with higher cost metrics. Other factors may be considered when a plurality of routes with same cost metrics exist. Referring to
FIG. 4A for example, note thatPT network 414 may communicate withPT network 412 by setting up a secure tunnel betweensecure gateways satellite network 408.Secure gateway 426 advertises a cost metric of 2 for reaching PT network 412 (prefix R3) in prefix routing table 430. Similarly,PT network 414 may communicate withPT network 412 by setting up a secure tunnel betweensecure gateways GIG network 406.Secure gateway 420 also advertises a cost metric of 2 for reaching PT network 412 (prefix R3) in prefix routing table 428. Accordingly,network 414 may use other factors to determine the optimal route to network 412. In the specific example ofFIG. 4A ,network 414 may select the route overGIG network 406 due toGIG 406 being a high speed low latency network, for example. Similarly,network 412 may prefersecure gateway 420 for communication withnetworks secure gateway 426 as an alternate. - As described above, an important feature according to the present invention is the ability to dynamically adapt secure tunnels between protected enclaves according to changes in network topology and/or network conditions. This, as discussed above, is due to VPN gateways having the ability to discover peer gateways, detect failed peers, periodically receive registration updates from PDSs, and continuously monitor the performance of setup secure tunnels.
-
FIG. 4B is an example that illustrates routing adaptability to topology changes in the example topology ofFIG. 4A . In the example ofFIG. 4B , a link failure causessecure gateway 420 to lose its link to GIGnetwork 406. This link failure causes a change in network topology. Specifically, the link failure results inPT network 412 losing its preferred route toPT networks - In an example,
PT network 412 may detect the link failure after several keep-alive messages to network 410 over a secure tunnel betweensecure gateways PT network 412 may queryserver 404 for an alternative gateway that may reachnetwork 410. A new route that now spans bothsatellite network 408 andGIG network 406 and comprising three VPN tunnels (between secure gateways 426-424, 424-422, and 422-416) is established betweenPT networks FIG. 4B . - While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (27)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/447,092 US8296839B2 (en) | 2006-06-06 | 2006-06-06 | VPN discovery server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/447,092 US8296839B2 (en) | 2006-06-06 | 2006-06-06 | VPN discovery server |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080022391A1 true US20080022391A1 (en) | 2008-01-24 |
US8296839B2 US8296839B2 (en) | 2012-10-23 |
Family
ID=38972918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/447,092 Active 2029-10-07 US8296839B2 (en) | 2006-06-06 | 2006-06-06 | VPN discovery server |
Country Status (1)
Country | Link |
---|---|
US (1) | US8296839B2 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080037481A1 (en) * | 2006-06-30 | 2008-02-14 | Wei-Kuo Chiang | Method and apparatus for mobility management in communication networks |
US20100306572A1 (en) * | 2009-06-01 | 2010-12-02 | Alexandro Salvarani | Apparatus and method to facilitate high availability in secure network transport |
US20100318799A1 (en) * | 2009-06-11 | 2010-12-16 | Microsoft Corporation | Discovery of secure network enclaves |
US20110066851A1 (en) * | 2009-09-14 | 2011-03-17 | International Business Machines Corporation | Secure Route Discovery Node and Policing Mechanism |
US20110096695A1 (en) * | 2009-10-22 | 2011-04-28 | Srikanth Natarajan | Method and system for discovering a pure hub-and-spoke topology |
US7953070B1 (en) * | 2006-08-17 | 2011-05-31 | Avaya Inc. | Client configuration download for VPN voice gateways |
US20130315249A1 (en) * | 2011-02-08 | 2013-11-28 | Murata Machinery, Ltd. | Relay server and relay communication system |
US20140095862A1 (en) * | 2012-09-28 | 2014-04-03 | Hangzhou H3C Technologies Co., Ltd. | Security association detection for internet protocol security |
US20150180832A1 (en) * | 2013-12-23 | 2015-06-25 | Samsung Sds Co., Ltd. | System and method for controlling virtual private network access |
US9742560B2 (en) | 2009-06-11 | 2017-08-22 | Microsoft Technology Licensing, Llc | Key management in secure network enclaves |
US20180131572A1 (en) * | 2006-12-29 | 2018-05-10 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US20180152320A1 (en) * | 2016-11-29 | 2018-05-31 | Ale International | System for and method of establishing a connection between a first electronic device and a second electronic device |
US10166572B2 (en) | 2006-12-29 | 2019-01-01 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US10403394B2 (en) | 2006-12-29 | 2019-09-03 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11316688B2 (en) | 2006-12-29 | 2022-04-26 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11783925B2 (en) | 2006-12-29 | 2023-10-10 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11943351B2 (en) | 2006-12-29 | 2024-03-26 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9438564B1 (en) | 2012-09-18 | 2016-09-06 | Google Inc. | Managing pooled VPN proxy servers by a central server |
US9736244B2 (en) * | 2012-10-10 | 2017-08-15 | Nokia Solutions And Networks Oy | Peer revival detection |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099937A1 (en) * | 2000-04-12 | 2002-07-25 | Mark Tuomenoksa | Methods and systems for using names in virtual networks |
US20020112189A1 (en) * | 2001-02-13 | 2002-08-15 | Tuomo Syvanne | Synchronization of security gateway state information |
US20030041238A1 (en) * | 2001-08-15 | 2003-02-27 | International Business Machines Corporation | Method and system for managing resources using geographic location information within a network management framework |
US20030093691A1 (en) * | 2001-11-13 | 2003-05-15 | Reefedge, Inc., A Delaware Corporation | Enabling secure communication in a clustered or distributed architecture |
US6631416B2 (en) * | 2000-04-12 | 2003-10-07 | Openreach Inc. | Methods and systems for enabling a tunnel between two computers on a network |
US20040122976A1 (en) * | 2002-10-24 | 2004-06-24 | Ashutosh Dutta | Integrated mobility management |
US6889321B1 (en) * | 1999-12-30 | 2005-05-03 | At&T Corp. | Protected IP telephony calls using encryption |
US20060041761A1 (en) * | 2004-08-17 | 2006-02-23 | Neumann William C | System for secure computing using defense-in-depth architecture |
US20060185012A1 (en) * | 2003-03-27 | 2006-08-17 | Alexis Olivereau | Communication betweeen a private network and a roaming mobile terminal |
US20060195896A1 (en) * | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US20070294757A1 (en) * | 2000-06-14 | 2007-12-20 | Stephens Daniel G Jr | System and method for secure management of remote systems |
US7373660B1 (en) * | 2003-08-26 | 2008-05-13 | Cisco Technology, Inc. | Methods and apparatus to distribute policy information |
US7665132B2 (en) * | 2003-07-04 | 2010-02-16 | Nippon Telegraph And Telephone Corporation | Remote access VPN mediation method and mediation device |
US7860114B1 (en) * | 1999-11-08 | 2010-12-28 | Verizon Business Global Llc | Method and system for dynamic gateway selection in an IP telephony network |
-
2006
- 2006-06-06 US US11/447,092 patent/US8296839B2/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7860114B1 (en) * | 1999-11-08 | 2010-12-28 | Verizon Business Global Llc | Method and system for dynamic gateway selection in an IP telephony network |
US6889321B1 (en) * | 1999-12-30 | 2005-05-03 | At&T Corp. | Protected IP telephony calls using encryption |
US20020099937A1 (en) * | 2000-04-12 | 2002-07-25 | Mark Tuomenoksa | Methods and systems for using names in virtual networks |
US6631416B2 (en) * | 2000-04-12 | 2003-10-07 | Openreach Inc. | Methods and systems for enabling a tunnel between two computers on a network |
US20070294757A1 (en) * | 2000-06-14 | 2007-12-20 | Stephens Daniel G Jr | System and method for secure management of remote systems |
US20020112189A1 (en) * | 2001-02-13 | 2002-08-15 | Tuomo Syvanne | Synchronization of security gateway state information |
US20030041238A1 (en) * | 2001-08-15 | 2003-02-27 | International Business Machines Corporation | Method and system for managing resources using geographic location information within a network management framework |
US20030093691A1 (en) * | 2001-11-13 | 2003-05-15 | Reefedge, Inc., A Delaware Corporation | Enabling secure communication in a clustered or distributed architecture |
US20040122976A1 (en) * | 2002-10-24 | 2004-06-24 | Ashutosh Dutta | Integrated mobility management |
US20060185012A1 (en) * | 2003-03-27 | 2006-08-17 | Alexis Olivereau | Communication betweeen a private network and a roaming mobile terminal |
US7665132B2 (en) * | 2003-07-04 | 2010-02-16 | Nippon Telegraph And Telephone Corporation | Remote access VPN mediation method and mediation device |
US7373660B1 (en) * | 2003-08-26 | 2008-05-13 | Cisco Technology, Inc. | Methods and apparatus to distribute policy information |
US20060041761A1 (en) * | 2004-08-17 | 2006-02-23 | Neumann William C | System for secure computing using defense-in-depth architecture |
US20060195896A1 (en) * | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080037481A1 (en) * | 2006-06-30 | 2008-02-14 | Wei-Kuo Chiang | Method and apparatus for mobility management in communication networks |
US8369292B2 (en) * | 2006-06-30 | 2013-02-05 | Industrial Technology Research Institute | Method and apparatus for mobility management in communication networks |
US7953070B1 (en) * | 2006-08-17 | 2011-05-31 | Avaya Inc. | Client configuration download for VPN voice gateways |
US11362851B2 (en) | 2006-12-29 | 2022-06-14 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US10728051B2 (en) | 2006-12-29 | 2020-07-28 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US11943351B2 (en) | 2006-12-29 | 2024-03-26 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11876637B2 (en) | 2006-12-29 | 2024-01-16 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11792035B2 (en) | 2006-12-29 | 2023-10-17 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11783925B2 (en) | 2006-12-29 | 2023-10-10 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11750412B2 (en) | 2006-12-29 | 2023-09-05 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11695585B2 (en) | 2006-12-29 | 2023-07-04 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11588658B2 (en) | 2006-12-29 | 2023-02-21 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11582057B2 (en) | 2006-12-29 | 2023-02-14 | Kip Prod Pi Lp | Multi-services gateway device at user premises |
US11533190B2 (en) | 2006-12-29 | 2022-12-20 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11527311B2 (en) | 2006-12-29 | 2022-12-13 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11489689B2 (en) | 2006-12-29 | 2022-11-01 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US11457259B2 (en) | 2006-12-29 | 2022-09-27 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US20180131572A1 (en) * | 2006-12-29 | 2018-05-10 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11381414B2 (en) | 2006-12-29 | 2022-07-05 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US10166572B2 (en) | 2006-12-29 | 2019-01-01 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US10225096B2 (en) | 2006-12-29 | 2019-03-05 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US10263803B2 (en) | 2006-12-29 | 2019-04-16 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US10361877B2 (en) | 2006-12-29 | 2019-07-23 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US10403394B2 (en) | 2006-12-29 | 2019-09-03 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US10530600B2 (en) | 2006-12-29 | 2020-01-07 | Kip Prod P1 Lp | Systems and method for providing network support services and premises gateway support infrastructure |
US10530598B2 (en) | 2006-12-29 | 2020-01-07 | Kip Prod P1 Lp | Voice control of endpoint devices through a multi-services gateway device at the user premises |
US11363318B2 (en) | 2006-12-29 | 2022-06-14 | Kip Prod Pi Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US10630501B2 (en) | 2006-12-29 | 2020-04-21 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US10646897B2 (en) | 2006-12-29 | 2020-05-12 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US10672508B2 (en) | 2006-12-29 | 2020-06-02 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US10673645B2 (en) | 2006-12-29 | 2020-06-02 | Kip Prod Pi Lp | Systems and method for providing network support services and premises gateway support infrastructure |
US11329840B2 (en) | 2006-12-29 | 2022-05-10 | Kip Prod P1 Lp | Voice control of endpoint devices through a multi-services gateway device at the user premises |
US11183282B2 (en) | 2006-12-29 | 2021-11-23 | Kip Prod Pi Lp | Multi-services application gateway and system employing the same |
US10812283B2 (en) | 2006-12-29 | 2020-10-20 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US10897373B2 (en) | 2006-12-29 | 2021-01-19 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11032097B2 (en) | 2006-12-29 | 2021-06-08 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11057237B2 (en) | 2006-12-29 | 2021-07-06 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US11102025B2 (en) | 2006-12-29 | 2021-08-24 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US11164664B2 (en) | 2006-12-29 | 2021-11-02 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11173517B2 (en) | 2006-12-29 | 2021-11-16 | Kip Prod P1 Lp | Display inserts, overlays, and graphical user interfaces for multimedia systems |
US10785050B2 (en) | 2006-12-29 | 2020-09-22 | Kip Prod P1 Lp | Multi-services gateway device at user premises |
US11184188B2 (en) | 2006-12-29 | 2021-11-23 | Kip Prod Pi Lp | System and method for providing network support services and premises gateway support infrastructure |
US11316688B2 (en) | 2006-12-29 | 2022-04-26 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US11323281B2 (en) | 2006-12-29 | 2022-05-03 | Kip Prod P1 Lp | System and method for providing network support services and premises gateway support infrastructure |
US20100306572A1 (en) * | 2009-06-01 | 2010-12-02 | Alexandro Salvarani | Apparatus and method to facilitate high availability in secure network transport |
US8352741B2 (en) | 2009-06-11 | 2013-01-08 | Microsoft Corporation | Discovery of secure network enclaves |
US20100318799A1 (en) * | 2009-06-11 | 2010-12-16 | Microsoft Corporation | Discovery of secure network enclaves |
US9628276B2 (en) | 2009-06-11 | 2017-04-18 | Microsoft Technology Licensing, Llc | Discovery of secure network enclaves |
US9742560B2 (en) | 2009-06-11 | 2017-08-22 | Microsoft Technology Licensing, Llc | Key management in secure network enclaves |
US20110066851A1 (en) * | 2009-09-14 | 2011-03-17 | International Business Machines Corporation | Secure Route Discovery Node and Policing Mechanism |
US20110096695A1 (en) * | 2009-10-22 | 2011-04-28 | Srikanth Natarajan | Method and system for discovering a pure hub-and-spoke topology |
US8144624B2 (en) | 2009-10-22 | 2012-03-27 | Hewlett-Packard Development Company, L.P. | Method and system for discovering a pure hub-and-spoke topology |
WO2011049717A3 (en) * | 2009-10-22 | 2011-07-21 | Hewlett-Packard Development Company, L.P. | Method and system for discovering a pure hub-and-spoke topology |
US9197557B2 (en) * | 2011-02-08 | 2015-11-24 | Murata Machinery, Ltd. | Relay server and relay communication system |
US20130315249A1 (en) * | 2011-02-08 | 2013-11-28 | Murata Machinery, Ltd. | Relay server and relay communication system |
US20140095862A1 (en) * | 2012-09-28 | 2014-04-03 | Hangzhou H3C Technologies Co., Ltd. | Security association detection for internet protocol security |
US9565165B2 (en) * | 2013-12-23 | 2017-02-07 | Samsung Sds Co., Ltd. | System and method for controlling virtual private network access |
US20150180832A1 (en) * | 2013-12-23 | 2015-06-25 | Samsung Sds Co., Ltd. | System and method for controlling virtual private network access |
US20180152320A1 (en) * | 2016-11-29 | 2018-05-31 | Ale International | System for and method of establishing a connection between a first electronic device and a second electronic device |
US10630507B2 (en) * | 2016-11-29 | 2020-04-21 | Ale International | System for and method of establishing a connection between a first electronic device and a second electronic device |
Also Published As
Publication number | Publication date |
---|---|
US8296839B2 (en) | 2012-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8296839B2 (en) | VPN discovery server | |
USRE50105E1 (en) | Overlay management protocol for secure routing based on an overlay network | |
Filsfils et al. | Segment routing architecture | |
US7590123B2 (en) | Method of providing an encrypted multipoint VPN service | |
US7710865B2 (en) | Disaster recovery for active-standby data center using route health and BGP | |
US7689722B1 (en) | Methods and apparatus for virtual private network fault tolerance | |
US7848335B1 (en) | Automatic connected virtual private network | |
US7602737B2 (en) | Methods and apparatus for providing an enhanced dynamic multipoint virtual private network architecture | |
US9762537B1 (en) | Secure path selection within computer networks | |
US8724505B2 (en) | Flexible mechanism for supporting virtual private network services based on source-independent distributed advertisements | |
US9654482B2 (en) | Overcoming circular dependencies when bootstrapping an RPKI site | |
CN101682615B (en) | Method for providing HIP-based mobility service to HIP node | |
McPherson et al. | Architectural considerations of IP anycast | |
US20070097991A1 (en) | Method and system for discovering and providing near real-time updates of VPN topologies | |
US7620975B2 (en) | Internal routing protocol support for distributing encryption information | |
US7900250B1 (en) | Method of providing secure groups using a combination of group and pair-wise keying | |
EP3809664B1 (en) | Deploying secure neighbor discovery in evpn | |
US8954601B1 (en) | Authentication and encryption of routing protocol traffic | |
Ginsberg et al. | RFC 8402: Segment routing architecture | |
US10735252B2 (en) | Outside router fault detection | |
US7864770B1 (en) | Routing messages in a zero-information nested virtual private network | |
US12041162B2 (en) | Inline security key exchange | |
Carthern et al. | Advanced Routing | |
Samll et al. | Scalable VPNs for the global information grid | |
Sax et al. | Experience with prefix discovery servers and IPSec VPN gateways |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MITRE CORPORATION, THE, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAX, WILLIAM C.;WOLLMAN, WILLIAM;JEGERS, EGIL H.;SIGNING DATES FROM 20060522 TO 20060602;REEL/FRAME:017960/0607 Owner name: MITRE CORPORATION, THE, VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SAX, WILLIAM C.;WOLLMAN, WILLIAM;JEGERS, EGIL H.;REEL/FRAME:017960/0607;SIGNING DATES FROM 20060522 TO 20060602 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
CC | Certificate of correction | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |