Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e. g. , retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
Creating Rules For Routing Resource Access Requests
Chris Hopen - Shoreline WA, US Bryan Sauve - Fall City WA, US Paul Hoover - Seattle WA, US Bill Perry - Bloomington IN, US
Assignee:
Aventail LLC - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 1, 726 12
Abstract:
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e. g. , retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e. g. , retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual private network tool collects critical network information for the client computer, and sends this critical network information to an address assignment server in the remote network. The address assignment server compares the critical network information with a pool of available addresses in the remote network, and assigns addresses for use by the client computer that do not conflict with the addresses for local resources. The address assignment server also provides routing information for resources in the remote network to the virtual private network tool. The virtual private network tool will postpone loading this routing information into the routing tables of the client computer until the client computer requests access to a specific resource in the remote network. When the client computer requests access to a specific resource in the remote network, the virtual private network tool will only provide the routing table with the routing information for that specific remote resource.
Chirs Hopen - Shoreline WA, US Bryan Sauve - Fall City WA, US Paul Hoover - Seattle WA, US Bill Perry - Bloomington IN, US
International Classification:
G06F 15/173
US Classification:
709226
Abstract:
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e.g., retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
Paul Lawrence Hoover - Seattle WA, US Rodger Del Erickson - Lawrence KS, US Bryan Sauve - Fall City WA, US
International Classification:
G06F 15/16
US Classification:
709245
Abstract:
A client computer hosts a virtual private network tool to establish a virtual private network connection with a remote network. Upon startup, the virtual private network tool collects critical network information for the client computer, and sends this critical network information to an address assignment server in the remote network. The address assignment server compares the critical network information with a pool of available addresses in the remote network, and assigns addresses for use by the client computer that do not conflict with the addresses for local resources. The address assignment server also provides routing information for resources in the remote network to the virtual private network tool. The virtual private network tool will postpone loading this routing information into the routing tables of the client computer until the client computer requests access to a specific resource in the remote network. When the client computer requests access to a specific resource in the remote network, the virtual private network tool will only provide the routing table with the routing information for that specific remote resource.
Bryan Sauve - Fall City WA, US Paul Hoover - Seattle WA, US Bill Perry - Bloomington IN, US
Assignee:
Aventail LLC - San Jose CA
International Classification:
H04L 29/06
US Classification:
726 1
Abstract:
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e.g., retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
Techniques for determining which resource access requests are handled locally at a remote computer, and which resource access requests are routed or “redirected” through a virtual private network. One or more routing or “redirection” rules are downloaded from a redirection rule server to a remote computer. When the node of the virtual private network running on the remote computer receives a resource access request, it compares the identified resource with the rules. Based upon how the identified resource matches one or more rules, the node will determine whether the resource access request is redirected through the virtual private network or handled locally (e.g., retrieved locally from another network). A single set of redirection rules can be distributed to and employed by a variety of different virtual private network communication techniques.
Name / Title
Company / Classification
Phones & Addresses
Bryan Sauve Professional Engineer
Sonicwall, LLC Computer Systems Design · Nonclassifiable Establishments · Computer and Software Stores · Computer Systems Design Services
605 5 Ave S, Seattle, WA 98104 2101 4 Ave, Seattle, WA 98121 808 Howell St, Seattle, WA 98101 2064387599, 2062151111, 2064387227, 2064387076
Coinstar
Senior Manager, Software Engineering
Outerwall Sep 2010 - Aug 2014
Manager, Software Engineering
Advanced Interactive Systems Oct 2008 - Sep 2010
Senior Engineering Manager
Dell Sonicwall Jun 2008 - Sep 2008
Senior Software Engineering Manager
Dell Sonicwall Jun 2007 - May 2008
Software Engineering Manager
Education:
Washington State University Sep 1989 - May 1994
Bachelors, Bachelor of Science, Electrical Engineering
Skills:
Software Development Cross Functional Team Leadership Agile Methodologies Product Management Scrum Team Leadership Software Engineering Enterprise Software Software Project Management Quality Assurance Tcp/Ip Technical Leadership Sdlc Agile Project Management Staff Development Program Management Conflict Management Great Motivator Leadership Development Cross Functional Team Building Cloud Computing Testing Personal Development Internet Protocol Suite Program Delivery Management Senior Program