US 12,489,834 B2
Systems and methods for detecting destination network address translation (DNAT) in network paths
Pankaj Chhabra, Surrey (CA)
Assigned to Zscaler, Inc., San Jose, CA (US)
Filed by Zscaler, Inc., San Jose, CA (US)
Filed on Jul. 24, 2023, as Appl. No. 18/357,598.
Application 18/357,598 is a continuation in part of application No. 17/988,856, filed on Nov. 17, 2022, granted, now 11,811,633.
Application 18/357,598 is a continuation in part of application No. 17/193,019, filed on Mar. 5, 2021, granted, now 11,153,190, issued on Sep. 29, 2021.
Application 18/357,598 is a continuation in part of application No. 17/149,130, filed on Jan. 14, 2021, granted, now 11,425,015.
Prior Publication US 2023/0379405 A1, Nov. 23, 2023
Int. Cl. H04L 69/22 (2022.01); H04L 61/2521 (2022.01)
CPC H04L 69/22 (2013.01) [H04L 61/2528 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising steps of:
sending a Hypertext Transfer Protocol Secure (HTTPS) CONNECT request to a proxy in a network path;
receiving a response to the HTTPS CONNECT request;
monitoring a header of the response to the HTTPS request; and
determining that the proxy is a Destination Network Address Translation (DNAT) router based on information in the header.