US 11,870,814 B2
Systems and methods for centrally managed host and network firewall services
Anurag Jain, Edison, NJ (US); Kenneth Ammon, Leesburg, VA (US); Thomas Cross, Atlanta, GA (US); and Michael C. Starr, Reston, VA (US)
Assigned to Fortinet, Inc., Sunnyvale, CA (US)
Filed by Fortinet, Inc., Sunnyvale, CA (US)
Filed on Dec. 2, 2021, as Appl. No. 17/540,858.
Application 17/540,858 is a continuation of application No. 17/030,173, filed on Sep. 23, 2020, granted, now 11,327,898.
Application 17/030,173 is a continuation of application No. 16/023,388, filed on Jun. 29, 2018, granted, now 10,826,941, issued on Nov. 3, 2020.
Claims priority of provisional application 62/669,544, filed on May 10, 2018.
Prior Publication US 2022/0091994 A1, Mar. 24, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 12/10 (2016.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 63/20 (2013.01) [G06F 12/10 (2013.01); H04L 9/0869 (2013.01); H04L 9/0894 (2013.01); H04L 9/3278 (2013.01); H04L 63/0245 (2013.01); H04L 63/10 (2013.01); G06F 2212/1024 (2013.01); G06F 2212/7201 (2013.01)] 27 Claims
OG exemplary drawing
 
1. A system for protecting an enterprise network that is remote from the system, the system comprising:
one or more processors;
a non-transient computer readable medium having stored therein instructions executable by the one or more processors to:
control at least one of: (a) communications to and from the enterprise network according to a set of security policies, and (b) endpoint to endpoint connections within the enterprise network according to the set of security policies, wherein controlling endpoint to endpoint connections comprises receiving connection escalation requests from endpoint agents and replying to the connection escalation requests with responses that comprise actions for handling connections that are based on the set of policies, the endpoint agents running on endpoint devices;
receive a request for modifications to one or more policies of the set of security policies;
automatically generate a policy digest formatted according to a predefined format, the policy digest comprising the modifications;
generate, based upon the policy digest, one or more calls to one or more components within the enterprise network that control at least one of: (a) the communications to and from the enterprise network, and (b) the endpoint to endpoint connections within the enterprise network;
modify control, based on the one or more calls, of at least one of: (a) the communications to and from the enterprise network, and (b) the endpoint to endpoint connections within the enterprise network; and
wherein the communications for the enterprise network are routed through one or more perimeter points of presence and the one or more calls are one or more calls for modification of a security stack implemented by the one or more perimeter points of presence.