发明名称 Systems and methods for using end point auditing in connection with traffic management
摘要 The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may determine a result of an end point analysis scan of a client. Responsive to the determination, the traffic management virtual server can obtain the result from the authentication virtual server. Further, the traffic management virtual server may apply the result in one or more traffic management policies to manage network traffic of a connection of the client traversing the intermediary. In some embodiments, the authentication virtual server may receive one or more expressions evaluated by the client. The one or more expressions identifies one or more attributes of the client. The traffic management virtual server can also determine a type of compression or encryption for the connection based on applying the one or more traffic management policies using the result.
申请公布号 US8844040(B2) 申请公布日期 2014.09.23
申请号 US200912409322 申请日期 2009.03.23
申请人 Citrix Systems, Inc. 发明人 Harris James;Li Rui;Kumar Arkesh;Thakur Ravindranath;Agarwal Puneet;Choudhary Akshat;Gupta Punit
分类号 H04L29/06 主分类号 H04L29/06
代理机构 Foley & Lardner LLP 代理人 Foley & Lardner LLP ;McKenna Christopher J.;Pua Paul M. H.
主权项 1. A method of managing traffic traversing an intermediary based on a result of end point analysis, the method comprising: a) determining, by an authentication virtual server of an intermediary device between at least one client device and at least one server, a result of an end point analysis scan of a client device initiated by the authentication virtual server and processing the result of the end point analysis scan before forwarding, by the authentication virtual server, to a separate and differently configured traffic management virtual server of the intermediary device, the authentication virtual server further configured to perform authentication of a user or the client device; b) obtaining, by the traffic management virtual server, the result from the authentication virtual server; and c) applying, by the traffic management virtual server, the result in one or more traffic management policies to manage network traffic of a connection of the client device traversing the intermediary.
地址 Fort Lauderdale FL US