US 11,895,092 B2
Network access controller operation
Kurt Glazemakers, Grembergen (BE); Gokhan Berberoglu, Gothenburg (SE); Kosmas Valianos, Ojersjo (SE); Per Johan Allansson, Kungsbacka (SE); Hoang Long Nguyen, Gothenburg (SE); Thomas Bruno Emmanuel Cellerier, Kungalv (SE); Aitor Perez Iturri, Gothenburg (SE); Harish Dinne, Gothenburg (SE); and Salvatore Tomaselli, Gothenburg (SE)
Assigned to APPGATE CYBERSECURITY, INC., Coral Gables, FL (US)
Filed by Appgate Cybersecurity, Inc., Coral Gables, FL (US)
Filed on Feb. 28, 2020, as Appl. No. 16/805,348.
Claims priority of provisional application 62/813,610, filed on Mar. 4, 2019.
Prior Publication US 2020/0287869 A1, Sep. 10, 2020
Int. Cl. H04L 9/40 (2022.01); H04L 12/46 (2006.01); H04L 45/00 (2022.01); H04L 12/66 (2006.01); H04W 76/12 (2018.01); H04W 48/16 (2009.01); H04W 48/18 (2009.01); H04L 45/74 (2022.01); H04L 45/50 (2022.01); H04W 88/16 (2009.01)
CPC H04L 63/029 (2013.01) [H04L 12/4633 (2013.01); H04L 12/4641 (2013.01); H04L 12/66 (2013.01); H04L 45/50 (2013.01); H04L 45/54 (2013.01); H04L 45/72 (2013.01); H04L 45/74 (2013.01); H04L 63/0263 (2013.01); H04L 63/0272 (2013.01); H04L 63/08 (2013.01); H04L 63/10 (2013.01); H04W 48/16 (2013.01); H04W 48/18 (2013.01); H04W 76/12 (2018.02); H04W 88/16 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by an access controller and from a networking device, a request for network access, wherein the request indicates a context associated with the networking device, the network access, or a combination thereof;
creating a first networking tunnel with a first gateway to provide a dedicated network route between the networking device and a first network segment accessed via the first gateway;
receiving, by an access controller, access rules fora networking device,
wherein the access rules identify a source and destination of packets from the networking device and an application of the networking device;
wherein the access rules are determined for the networking device based on the context;
wherein the access rules comprise firewall rules for the first gateway;
sending, by the access controller, the access rules to the first gateway, wherein the first gateway uses the access rules to apply the firewall rules;
looking up a routing table based on the source of packets from the networking device;
selecting, using the routing table, a virtual network device having an existing networking tunnel dedicated to the destination of packets from the networking device, wherein the existing networking tunnel corresponds to the application of the networking device.