Bulk configuring a virtual private network

Electrical computers and digital processing systems: multicomput – Computer network managing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000

Reexamination Certificate

active

06701358

ABSTRACT:

BACKGROUND
This invention relates particularly to bulk configuring a virtual private network.
LANs (Local Area Networks), Intranets, and other private networks interconnect user computers, file servers, e-mail servers, databases, and other resources. Typically, organizations want to offer remote access to private network resources to traveling employees, employees working at home, and branch offices without compromising the security of the private network.
Virtual private networks (a.k.a. Extranets) securely stitch together remote private networks and remote computers using a public network such as the Internet as a communication medium. Each private network can connect to the public network via an extranet switch such as the Contivity™ Extranet switch offered by Nortel™ Networks. Extranet switches provide a variety of virtual private network functions such as network packet tunneling and authentication.
For configuring the functions provided by the switch, Contivity™ switches offer a web-server and web-pages programmed to configure the different virtual private network functions in response to administrator interaction with the web-pages. By using a browser to navigate to each virtual private network switch, one after another, the administrator can configure the tunneling, authentication, packet filtering, and other functions provided by the switch. Management functions provided by the Contivity™ switches are described in greater detail in the New Oaks™ Communications Extranet Access Switch Administrator's Guide.
SUMMARY OF THE INVENTION
In general, in one aspect, the invention features a method of managing a virtual private network that includes transmitting configuration information for at least one virtual private network function to multiple computers providing the at least one virtual private network function.
Embodiments may include one or more of the following. The method may include receiving user input describing virtual private network function configuration and transmitting configuration information based on the received user input. The user input may be received via a preprogrammed series of dialogs.
The virtual private network functions can include authentication (e.g., RADIUS and/or LDAP), tunneling (e.g., PPTP, IPSec, L2F, and L2TP), and virtual private network security (e.g., SNMP traps). The computers providing the virtual private network function(s) may be extranet switches. The transmitted configuration information may be a script. The method may also include processing the transmitted configuration information to provide a virtual private network function corresponding to the transmitted configuration information.
In general, in another aspect, the invention features a method of configuring a virtual private network includes receiving a selection of extranet switches from a list, receiving user input describing extranet switch tunneling characteristics via a preprogrammed series of dialogs, and transmitting a script corresponding to the received user input to the selected extranet switches.
In general, in another aspect, the invention features a computer program product, disposed on a computer readable medium, for configuring a virtual private network. The computer program including instructions for causing a processor to receive user input describing at least one virtual private network function configuration, and transmit configuration information based on the user input for at least one virtual private network function to multiple computers providing the virtual private network function.
Advantages can include one or more of the following. Bulk configuration enables an administrator to configure a large number of extranet switches by specifying a single common configuration. Bulk configuration reduces the amount of time needed to configure the switches and can reduce the errors that might occur through repeated individual configuration.
Other advantages of the invention will become apparent in view of the following description, including the figures, and the claims.


REFERENCES:
patent: 5751967 (1998-05-01), Raab et al.
patent: 5802286 (1998-09-01), Dere et al.
patent: 5825891 (1998-10-01), Levesque et al.
patent: 5862339 (1999-01-01), Bonnaure et al.
patent: 5864604 (1999-01-01), Moen et al.
patent: 5864666 (1999-01-01), Shrader
patent: 5926463 (1999-07-01), Ahearn et al.
patent: 5963913 (1999-10-01), Henneuse et al.
patent: 5966128 (1999-10-01), Savage et al.
patent: 5978848 (1999-11-01), Maddalozzo, Jr. et al.
patent: 5987135 (1999-11-01), Johnson et al.
patent: 5987513 (1999-11-01), Prithviraj et al.
patent: 6041166 (2000-03-01), Hart et al.
patent: 6041347 (2000-03-01), Harsham et al.
patent: 6046742 (2000-04-01), Chari
patent: 6061334 (2000-05-01), Berlovitch et al.
patent: 6075776 (2000-06-01), Tanimoto et al.
patent: 6079020 (2000-06-01), Liu
patent: 6085238 (2000-07-01), Yuasa et al.
patent: 6085243 (2000-07-01), Fletcher et al.
patent: 6092113 (2000-07-01), Maeshima et al.
patent: 6092200 (2000-07-01), Muniyappa et al.
patent: 6115736 (2000-09-01), Devarakonda et al.
patent: 6148337 (2000-11-01), Estberg et al.
patent: 6188691 (2001-02-01), Barkai et al.
patent: 6205488 (2001-03-01), Casey et al.
patent: 6209031 (2001-03-01), Casey et al.
patent: 6219699 (2001-04-01), McCloghrie et al.
patent: 6223218 (2001-04-01), Iijima et al.
patent: 6226751 (2001-05-01), Arrow et al.
patent: 6233618 (2001-05-01), Shannon
patent: 6243815 (2001-06-01), Antur et al.
patent: 6256739 (2001-07-01), Skopp et al.
patent: 6259448 (2001-07-01), McNally et al.
patent: 6272537 (2001-08-01), Kekic et al.
patent: 6282175 (2001-08-01), Steele et al.
patent: 6286050 (2001-09-01), Pullen et al.
patent: 6304909 (2001-10-01), Mullaly et al.
patent: 6308206 (2001-10-01), Singh
patent: 6330562 (2001-12-01), Boden et al.
patent: 6369840 (2002-04-01), Barnett et al.
patent: 6374293 (2002-04-01), Dev et al.
patent: 6374296 (2002-04-01), Lim et al.
patent: 6526442 (2003-02-01), Stupek et al.
patent: 0 838 930 (1998-04-01), None
patent: WO 97/50210 (1997-12-01), None
“The Tempest: A Framework for Safe, Resource-Assured, Programmable Networks”, S. Rooney et al., IEEE Communications Magazine, Oct. 1998, pp. 42-53.
“Computer Network Management for B-ISDN/ATM Services”, R. Kositpaiboon et al., IEEE Communications Magazine, Publication Date May 23, 1993, pp. 1-7.
Configuring and Maintaining Networks with Optivity NET Configurator 2.0 Manual, Bay Networks, Oct. 1998.
New Oak Communications Extranet Access Switch Administrator's Guide Manual, Dec. 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Bulk configuring a virtual private network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Bulk configuring a virtual private network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Bulk configuring a virtual private network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3240115

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.