throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US007028337B2
`
`c12) United States Patent
`Murakawa
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,028,337 B2
`Apr. 11, 2006
`
`(54)
`
`METHOD OF VIRTUAL PRIVATE
`NETWORK COMMUNICATION IN
`SECURITY GATEWAY APPARATUS AND
`SECURITY GATEWAY APPARATUS USING
`THE SAME
`
`(75)
`
`Inventor: Yasushi Murakawa, Fukuoka (JP)
`
`(73) Assignee: Matsushita Electric Industrial Co.,
`Ltd., Osaka (JP)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 866 days.
`
`(21) Appl. No.: 09/729,262
`
`(22) Filed:
`
`Dec. 1, 2000
`
`(65)
`
`Prior Publication Data
`
`US 2001/0020273 Al
`
`Sep. 6, 2001
`
`(30)
`
`Foreign Application Priority Data
`
`Dec. 3, 1999
`
`(JP)
`
`................................. 11-344500
`
`(51)
`
`Int. Cl.
`H04L 9100
`
`(2006.01)
`
`(52) U.S. Cl. ........................................................ 726/15
`(58) Field of Classification Search ................ 709/238;
`713/153, 201; 707/227; 726/15
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`6,615,357 B1 *
`6,751,729 B1 *
`6,779,004 B1 *
`* cited by examiner
`Primary Examiner--Gregory Morse
`Assistant Examiner-Ellen C Tran
`(74) Attorney, Agent, or Firm-RatnerPrestia
`
`............... 713/201
`9/2003 Boden et a!.
`6/2004 Giniger et al ............... 713/153
`8/2004 Zintel ......................... 709/227
`
`(57)
`
`ABSTRACT
`
`A method of the Virtual Private Network (VPN) communi(cid:173)
`cation employed for a security gateway apparatus and the
`security gateway apparatus using the same, which allow a
`personal computer outside a local area network (LAN) to
`access, via a WAN, to a terminal on the LAN, virtually
`regarding the outside PC as a terminal on the LAN. The
`communication method is employed for a security gateway
`apparatus to connect, through concentration and conversion
`process, between a LAN and a WAN including a public
`network. Security Architecture for the Internet Protocol
`(IPsec) establishes VPN with an outside PC having a dialup
`connection to the WAN. During an Internet Key Exchange
`(IKE) communication that is performed prior to the IPsec
`communication, the security gateway apparatus integrates a
`Dynamic Host Configuration Protocol (DHCP) communi(cid:173)
`cation option into an IKE data, and designates the IP address
`of the outside PC from a tunneled IP packet.
`
`24 Claims, 8 Drawing Sheets
`
`Encapsulating
`~--------~----------
`r
`'
`Data
`
`IP address : A
`
`IP address : 8
`203
`Security
`gateway
`
`208
`
`101
`
`c
`
`D
`
`Data
`
`104
`
`106
`
`D
`
`IP address : C
`
`c D
`
`209
`I
`Data
`
`Ex. 1005
`Apple v. MPH Techs. Oy
`IPR2019-00820
`
`0001
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 1 of 8
`
`US 7,028,337 B2
`
`FIG. 1
`
`IP address : 8 I B I A I C I D I Data I D
`
`Encapsulating
`____ ___.A.__ __ _
`r
`"'
`
`IP address : A
`
`203
`
`--Se-c-ur-ity____, c=:========:;::=======:::J
`gateway
`208
`
`101
`
`lclol Data
`
`104
`
`106 D
`
`IP address : C lclol
`
`209
`I
`Data
`
`0002
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 2 of 8
`
`US 7,028,337 B2
`
`(
`'
`
`FIG. 2
`
`Start
`
`' v
`Phase 1 ~ 81
`communication
`' ~
`Establish IKE-SA
`
`82
`
`' ~
`Phase 2 ~ 83
`communication
`w
`Establish IPsec-SA ~ 84
`
`' ~
`Distribute IP address / 85
`,,
`
`End
`
`J ...1
`
`0003
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 3 of 8
`
`US 7,028,337 B2
`
`FIG. 3
`
`IKE data 300
`
`IP
`UDP
`header header
`
`ISAKMP
`header
`
`ISAKMP
`payload
`
`ISAKMP
`payload
`
`...
`
`ISAKMP
`payload
`
`0004
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 4 of 8
`
`US 7,028,337 B2
`
`214
`I w
`IPsec communication
`section
`
`If\
`
`FIG. 4
`
`102
`
`WAN
`
`?3
`
`110 section
`
`if\
`
`if\
`
`(\
`
`,~
`
`DHCP option adding
`section
`
`v21o
`
`216
`w I
`IP address distributing
`section
`
`I~
`
`w '~
`110 section
`
`~212
`v21a
`
`104
`
`0005
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 5 of 8
`
`US 7,028,337 B2
`
`FIG. 5 PRIOR ART
`
`102
`
`Security gateway
`
`103
`
`104
`
`105
`
`106
`
`107
`
`0006
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 6 of 8
`
`US 7,028,337 B2
`
`FIG. 6 PRIOR ART
`
`D
`
`101
`
`103
`
`0007
`
`

`

`U.S. Patent
`
`Apr. 11,2006
`
`Sheet 7 of 8
`
`US 7,028,337 B2
`
`FIG. 7 PRIOR ART
`
`Start
`
`IKE phase 1
`communication
`
`IEK-SA established
`
`IKE phase 2
`communication
`
`I Psec-SA established
`
`IPsec communication
`start
`
`End
`
`811
`
`812
`
`813
`
`814
`
`S15
`
`0008
`
`

`

`U.S. Patent
`
`Apr. 11, 2006
`
`Sheet 8 of 8
`
`US 7,028,337 B2
`
`FIG. 8 PRIOR ART
`
`Encapsulating
`___ A __ _
`r
`
`~
`
`IP address: A
`
`IP address: B
`103
`Security
`gateway
`
`108
`
`104
`
`106
`
`D
`
`IP address : C
`
`209
`I
`Data
`
`101
`
`Data
`
`0009
`
`

`

`US 7,028,337 B2
`
`1
`METHOD OF VIRTUAL PRIVATE
`NETWORK COMMUNICATION IN
`SECURITY GATEWAY APPARATUS AND
`SECURITY GATEWAY APPARATUS USING
`THE SAME
`
`FIELD OF THE INVENTION
`
`The present invention relates to a method of virtual
`private network (VPN) communication in a security gate- 10
`way apparatus and security gateway apparatus using the
`same. More particularly, this method and apparatus are used
`in a network environment configured by security gateway
`apparatus connecting a local area network (LAN) including
`a plurality of terminal devices, and a wide area network 15
`(WAN) typified by a public network. In such a network
`environment, the VPN communication method allows a
`terminal device outside a LAN to communicate with the
`security gateway apparatus via a WAN.
`
`2
`information
`environment protects
`WAN 102. This
`exchanged on WAN 102 from interception or alteration,
`ensuring safety communication between PC 101 and the
`terminal on LAN 104.
`Now will be described the outline of required information
`for performing the IPsec communication, referring to FIG.
`6. FIG. 6 illustrates a state of WAN connection.
`PC 101, WAN 102, and security gateway 103 are the same
`as those described in FIG. 5.
`In order to perform IPsec communication between PC 101
`and security gateway 103, the followings have to be shared
`with the both sides prior to IP sec communication.
`1) data security;
`2) countermeasures against making alterations to trans(cid:173)
`mitting data by avoiding to use a fixed logical com(cid:173)
`munication path;
`3) encrypting algorithm that protects data to be transmit(cid:173)
`ted from alteration;
`4) key information used for authentication algorithm.
`There are two methods of sharing key information on both
`sides of communication partners: (1) setting the key infor(cid:173)
`mation manually on both sides prior to communication, and
`(2) setting the key information automatically with the Inter-
`25 net Key Exchange (IKE) protocol on initiating communica-
`tion.
`Hereinafter will be focused on the latter method, which is
`practically used in actual communication.
`The IPsec communication will be described with refer(cid:173)
`ence to FIG. 7. FIG. 7 is a flow diagram that illustrates the
`working of security gateway 103 for starting the IPsec
`communication.
`To perform the IPsec communication, it is necessary to
`establish Security Association (SA) that is a two-way logical
`connection between the both sides. For that reason, the IKE
`communication has two phases.
`Phase 1 is to establish IKE-SA for performing the IKE
`communication with safety (Sll, S12). With the connection
`established successfully, phase 2 will be in active for
`exchanging security information including key information
`for the IPsec communication (S13).
`When IPsec-SA is successfully established (S14) in
`phase 2, the IKE communication is over then IPsec com(cid:173)
`munication initiates.(S15).
`The table below shows the information to be exchanged
`between the both sides, in phase 2 of IKE communication
`(indicated by S13 in the description above.)
`
`BACKGROUND OF THE INVENTION
`
`20
`
`In recent years, the widespread proliferation of the Inter(cid:173)
`net access has brought many PCs into various businesses or
`even individual households, and such PCs often communi(cid:173)
`cate with each other on a local area network (LAN) for more
`effective use. When a LAN configured by some PCs is
`connected to the Internet, a gateway apparatus that connects
`a LAN and a WAN is required.
`To access a terminal on a LAN from a PC outside the 30
`LAN, the PC firstly needs to establish a dialup connection
`with the provider that the PC signs on, then to access the
`terminal, for example, a PC on the LAN via a WAN.
`However, packets transmitted through a WAN are not
`basically safeguarded. Intercepted such packets by eaves- 35
`droppers, there would be a fear of making bad use of
`sensitive information.
`A security gateway apparatus connecting the WAN and
`the LAN need to be used to protect such information from
`unauthorized access and provide data security. It is also 40
`required that the PC, which has a dialup connection with the
`WAN, is equipped with a communication protocol stack for
`data security. In this way, it makes possible to realize a
`virtual private line environment on a WAN, by establishing
`the VPN communication between the PC located outside the 45
`LAN and the security gateway apparatus.
`Currently, typically used communication protocol for the
`VPN communication is Security Architecture for the Inter(cid:173)
`net Protocol (IPsec ).
`Now will be described the overview of the VPN commu- 50
`nication employing IPsec, referring to FIG. 5. FIG. 5 is a
`block diagram of a typical network system including a
`WAN.
`The network system comprises, as shown in FIG. 5, PC
`101, which is located outside the LAN, establishing a dialup 55
`connection to the provider, WAN 102, and security gateway
`103 that connects WAN 102 and LAN 104 for line connec(cid:173)
`tion and conversion processing.
`LAN 104 being subjected to security gateway 103
`includes server terminal 105 and client PCs 106, 107.
`Besides, in order to perform the IPsec communication,
`VPN 108 is established between PC 101 and security
`gateway 103.
`When PC 101 establishes a dialup connection to the
`provider and accesses to a terminal on LAN 104, VPN 108 65
`will be established between PC 101 and security gateway
`103, with a virtual private line environment achieved on
`
`60
`
`Item
`
`Security Protocol
`
`IPsec communication mode
`Encryption algorithm
`Encryption key
`Authentication algorithm
`Authentication key
`SA life time format
`SA life time
`
`TABLE 1
`
`Detail
`
`Encapsulating Security Payload (ESP)/
`Authentication Header (AH)
`Tunnel mode/Transport mode
`Must in ESP
`
`Must in AH, May be selected in ESP
`
`Data amount (Byte)/hour
`
`As for the operating mode (IPsec communication mode),
`security gateway 103 is in active in the tunnel mode (encap(cid:173)
`sulating whole IP packets) only. In the explanation below,
`the IPsec operating mode is assumed to be the tunnel mode.
`FIG. 8 schematically illustrates of the IPsec communica(cid:173)
`tion in the tunnel mode. In FIG. 8, PC 101, security gateway
`
`0010
`
`

`

`US 7,028,337 B2
`
`4
`line connection and conversion processing, between a LAN
`and a WAN that is typically configured by a public network.
`According to the present invention, during the procedure
`in which the IPsec protocol establishes the VPN communi(cid:173)
`cation between a security gateway apparatus and an outside
`PC having a dialup connection with a WAN, the security
`gateway apparatus integrates the Dynamic Host Configura(cid:173)
`tion Protocol (DHCP) communication option into the IKE
`data during the IKE communication prior to the IPsec
`10 communication. Through the procedure, the security gate(cid:173)
`way apparatus can designate the IP address of the outside
`terminal in a tunneled IP packet.
`In this way, the present invention allows an outside
`terminal to commnnicate with a terminal on the LAN, by
`15 virtually regarding the outside terminal as another terminal
`on the LAN.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 illustrates diagrammatically an IPsec commnnica(cid:173)
`tion in accordance with a first preferred embodiment of the
`present invention.
`FIG. 2 is a flow chart indicative of the procedure in which
`a security gateway apparatus distributes an IP address to an
`outside PC.
`FIG. 3 shows a data format for the IKE communication
`used for the VPN communication method in the security
`gateway apparatus in accordance with the first preferred
`embodiment.
`FIG. 4 is a block diagram of the security gateway appa(cid:173)
`ratus of the present invention.
`FIG. 5 shows a prior art typical network system including
`a WAN.
`FIG. 6 shows a prior art configuration in which an outside
`PC and the security gateway apparatus are connected via a
`WAN.
`FIG. 7 is a flow chart indicative of the working steps of
`the prior art security gateway apparatus to initiate the IPsec
`40 communication.
`FIG. 8 illustrates diagrannnatically of the prior art IPsec
`communication in the tunnel mode.
`
`3
`103, LAN 104, client PC 106, and VPN 108 are the same as
`those illustrated in FIG. 5. IP packet 100 is handled in this
`system.
`In FIG. 8, suppose that IP addresses "A", "B", and "C" are
`assigned to PC 101, security gateway 103, and client PC 5
`106, respectively. IP address "A" assigned to PC 101 is
`provided from the provider.
`When client PC 106 on LAN 104 transmits an IP packet
`to PC 101, which has established connection with PC 106
`via VPN 108,
`1) client PC 106 generates IP packet 100 in which the
`sender's IP address is "C" and the receiver's IP address
`is "A", then sends it to security gateway 103;
`2) received packet 100, gateway 103 identifies that the
`packet is the one to be sent to PC 101 which has
`established VPN 108;
`3) gateway 103 encapsulates IP packet 100 according to
`exchanged information during the IKE commnnication;
`4) the IP header including the sender's IP address B and
`the receiver's IP address "A" is added to outside the 20
`originally set IP address;
`5) authentication information is added to the encapsulated
`IP packet based on the exchanged information, then the
`IP packet is encrypted;
`6) received the encapsulated packet via VPN 108, PC 101 25
`retrieves encapsulated original IP packet 100 from the
`received packet, according to the exchanged informa(cid:173)
`tion, then process it.
`The VPN communication method in the prior-art security
`gateway apparatus assures safety of data exchanging on 30
`WAN 102. However, an access from outside of the LAN is
`treated as the access from an outside network.
`The fact has brought an inconvenience or some security
`problems described below when a terminal outside the LAN
`tries to establish a dialup connection to the WAN and 35
`accesses to client PC 106 on LAN 104.
`1) the security policy setting indicating acceptable/unac(cid:173)
`ceptable access is required to PC 106. For example, PC
`106 needs an information setting by which PC 106 can
`determine which IP address is acceptable or which
`protocol service is unacceptable.
`2) the setting described above has to be set each time an
`outside terminal accesses to a terminal on the LAN.
`Unless the setting procedures are performed com(cid:173)
`pletely, the security level could be degraded.
`3) When the outside terminal accesses to a server on the
`LAN, even after the terminal has successfully estab(cid:173)
`lished the IPsec communication with the gateway appa(cid:173)
`ratus, the server needs another setting procedures for
`identifying the outside terminal and giving a permis(cid:173)
`sion to commnnicate with a terminal on the LAN. Like
`the security policy setting described above, the security
`level could be degraded nnless the setting procedures
`are performed completely.
`Besides, if LAN 104 is a network configured with private
`IP addresses, the setting procedures would be extremely
`complicated.
`
`45
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`The preferred embodiments of the present invention are
`described hereinafter with reference to the accompanying
`drawings, FIG. 1 through FIG. 3.
`
`50
`
`First Preferred Embodiment
`FIG. 3 shows a data format for the IKE communication
`used for the VPN communication method in the security
`gateway apparatus in accordance with the first preferred
`55 embodiment.
`The IKE communication is performed with User Data(cid:173)
`gram Protocol (UDP)/Intemet Protocol (IP). As shown in
`FIG. 3, the IKE data is formed of the Internet Security
`Association and Key Management Protocol (ISAKMP)
`60 header and a series of the ISAKMP payloads that follows the
`ISAKMP header. The IKE communication is performed
`between an initiator requesting key exchange, and a
`responder responding to the request.
`According to the embodiment, FIG. 1 shows PC 101 as an
`65 example of a terminal connecting the Internet via a provider.
`Served as an initiator, PC 101 initiates the IKE commu(cid:173)
`nication with security gateway 203 in order to access client
`
`SUMMARY OF THE INVENTION
`
`The present invention addresses the problems above. It is
`therefore the object of the present invention to provide a
`VPN commnnication method in a security gateway appara(cid:173)
`tus, allowing a PC outside a LAN, virtually regarded as a PC
`on the LAN, to communicate with a terminal on the LAN.
`The present invention provides a VPN communication
`method in a security gateway apparatus that connects, via
`
`0011
`
`

`

`US 7,028,337 B2
`
`5
`PC 106 on LAN 104. On the other hand, security gateway
`203 serves as a responder in the connnunication.
`The connnunication is performed in the form of server/
`client model. As for the Encryption key and the Authenti(cid:173)
`cation key in the items listed in Table 1, key information is 5
`exchanged between the initiator and the responder, using a
`public key cryptosystem. As for the rest of the items, the
`initiator gives suggestions to the responder, and the
`responder responds to the initiator with the best among the
`suggestions.
`There are some pieces of information essential to PC 101
`as a Dynamic Host Configuration Protocol (DHCP) client:
`(i) an IP address; (ii) a subnet mask; (iii) an expiration date
`of the IP address; and (iv) a domain name.
`Security gateway 203, which serves as the responder in 15
`the IKE connnunication, adds these four items to a normally
`formed IKE data as an option.
`Of the four items, the expiration date of the IP address
`may be omitted from the option added to the IKE data, by
`regarding that the expiration date is equivalent to the SA life 20
`time that is established by the IKE connnunication.
`DHCP is an application protocol positioned in the higher
`layer than UDP belongs to, so that it runs on the IKE without
`problems associated with resending control or other func-
`tions.
`FIG. 1 illustrates diagrmatically the IPsec connnuni(cid:173)
`cation in accordance with the first preferred embodiment of
`the present invention.
`The interconnection of PC 101, security gateway 203, 30
`LAN 104, client PC 106, and VPN 208 in FIG. 1 is the same
`as that of PC 101, security gateway 103, LAN 104, client PC
`106, and VPN 108 in FIG. 5.
`In FIG. 1, suppose that IP addresses "A", "B", and "C" are
`assigned to PC 101, security gateway 203, and client PC
`106, respectively. IP address "A" assigned to PC 101 is
`provided from the provider.
`Security gateway 203 distributes IP address "D" to PC
`101 during the IKE connnunication prior to the IPsec
`communication.
`When client PC 106 on LAN 104 transmits an IP packet
`to PC 101 having connection via VPN 208, the transmission
`is performed following the steps below:
`1) client PC 106 generates IP packet 209, in which the
`sender's IP address is "C" and the receiver's IP address 45
`is "D", regardless of IP address "A" which is assigned
`to PC 101 by the provider outside the LAN 104, and
`transmits packet 209 to security gateway 203;
`2) received the packet, security gateway 203 identifies
`that the packet is the one to be sent to PC 101 which has
`established VPN 208, then encapsulates IP packet 209
`according to exchanged information through IKE com(cid:173)
`munication;
`3) the IP header including the sender's IP address "B" and
`the receiver's IP address "A" is added to outside the
`originally set IP address;
`4) authentication information is added to the encapsulated
`IP packet based on the exchanged information, then the
`IP packet is encrypted;
`5) received the encapsulated packet via VPN 208, PC 101
`retrieves, from the received packet, encapsulated origi(cid:173)
`nal IP packet 209 based on the exchanged information,
`then process it according to the obtained subnet mask
`and domain name during the IKE connnunication.
`FIG. 2 is a flow chart illustrating the procedure in which
`security gateway 203 establishes the IKE connnunication
`
`6
`and IPsec-Security Association (SA) connections to ini(cid:173)
`tiate the IPsec connnunication, and distributes IP address
`"D" to PC 101.
`To perform the IPsec connnunication, it is necessary to
`establish SA that is a two-way logical connection between
`the both sides. For that reason, the IKE connnunication has
`two phases.
`Phase 1 is to establish IKE-SA for performing the IKE
`connnunication with safety (S1, S2). With the connection
`10 established successfully, phase 2 will be in active for
`exchanging security information including key information
`for the IPsec connnunication (S3).
`In phase 2, IPsec-SA is established and the DHCP
`option is added to the IKE data (S4).
`Following the completion of distributing IP address "D"
`to PC 101 (SS), the IKE connnunication is over.
`Table 1 shows required information for the IPsec com(cid:173)
`munication, which is exchanged between the both sides
`during the IKE (phase 2) connnunication in step S3.
`According to the embodiment, as described above, in the
`procedure that the gateway apparatus establishes VPN 208
`connection, using the IPsec protocol, with PC 101 having a
`dialup connection to WAN 102, the gateway apparatus
`integrates the DHCP connnunication option into the IKE
`data during the IKE connnunication prior to the IPsec
`connnunication. Through the procedure, the security gate-
`way apparatus can designate, from a tunneled IP packet, the
`sender's IP address "C" to be processed in the IPsec com(cid:173)
`munication.
`When establishing the IPsec connnunication with outside
`PC 101 having a dialup connection with the WAN, security
`gateway 203 thus controls IP address "A" of the outside PC
`as the final destination. As an advantage, the need for setting
`35 of client PC 106 on LAN 104 can be eliminated in this
`procedure.
`This fact promises a highly safeguarded connnunication
`without interception or alteration of transmitting informa(cid:173)
`tion.
`40 Second Preferred Embodiment
`Here will be described the VPN connnunication method
`employed for the security gateway apparatus in accordance
`with the second preferred embodiment, referring to FIG. 1.
`During the distribution process of DHCP information to
`PC 101, security gateway 203 distributes to PC 101 an IP
`address and a subnet mask having the same segment as those
`of LAN 104 controlled by security gateway 203. In this
`procedure, security gateway 203 serves as the responder,
`while PC 101 serves as the initiator in the IKE connnuni(cid:173)
`cation.
`In the IPsec connnunication after VPN 208 establishment,
`PC 101, which accesses from the outside of LAN 104, can
`behave as if being a standalone terminal that has the "same"
`55 segment as a terminal on the network has, in connnunicating
`with client PC 106 controlled by security gateway 203.
`According to the embodiment, as described above, secu(cid:173)
`rity gateway 203 distributes to PC 101, which accesses from
`outside the LAN 104 by establishing a dialup connection, an
`60 IP address and a subnet mask which have the same segment
`as those used on LAN 104 controlled by security gateway
`203 in the IKE connnunication. This allows outside PC 101
`to virtually work on LAN 104 in the VPN connnunication.
`The fact that outside PC 101 which has established VPN
`65 208 works as if being in the LAN 104 environment realizes
`the access from an outside terminal to a terminal on LAN
`104 with security.
`
`25
`
`50
`
`0012
`
`

`

`US 7,028,337 B2
`
`8
`Furthermore, the present invention makes possible that
`the outside PC accesses to a LAN environment that is
`configured with private IP addresses, with no degradation of
`security.
`
`7
`Third Preferred Embodiment
`Now will be described the VPN communication method
`employed for the security gateway apparatus in accordance
`with the third preferred embodiment, referring to FIG. 1.
`In FIG. 1, the explanation is focused on the case, in which
`security gateway 203 employs the Network Address Trans(cid:173)
`lator (NAT) technology and configures LAN 104 with
`private IP addresses.
`In this case, an access from an outside terminal to client 10
`PC 106 on LAN 104 is usually not allowed. However, the
`following method makes it possible.
`First, PC 101 having a dialup connection establishes the
`IKE communication with security gateway 203 for VPN 208
`establishment. During the IKE communication, security 15
`gateway 203 integrates a private IP address into the IKE data
`as a DHCP option. The private IP address is an unused one
`in the segment that is allocated to LAN 104 controlled by
`security gateway 203.
`Then gateway 203 distributes the IKE data to PC 101.
`Through this procedure, PC 101 uses a global IP address
`in VPN 208 on WAN 102, while it manipulates a private IP
`address on LAN 104 and inside PC 101 itself. This allows
`PC 101 to behave as if being a standalone terminal that has
`the "same" segment as a terminal on the network does.
`According to the embodiment, as described above, gate(cid:173)
`way 203 distributes to outside PC 101, through the NAT
`technology, a private IP address used for the terminals on
`LAN 104 during the IKE communication. The distribution 30
`procedure realizes the VPN communication in which a
`terminal outside the LAN is allowed to be accessible into the
`LAN 104 environment, which is configured with private IP
`addresses. Thus, outside PC 101 can access to the LAN 104
`environment configured with private IP addresses, ensuring 35
`security.
`
`25
`
`20
`
`What is claimed is:
`1. A Virtual Private Network (VPN) communication
`method employed for a security gateway apparatus connect(cid:173)
`ing between a local area network (LAN) and a wide area
`network (WAN) including a public network, the communi-
`cation method comprising the steps of:
`a) assigning a first IP address to a terminal outside said
`LAN;
`b) adding a Dynamic Host Configuration Protocol
`(DHCP) communication option to an Internet Key
`Exchange (IKE) data, when establishing an IKE com-
`munication with said terminal outside the LAN having
`a connection with the WAN;
`c) assigning a second IP address from an inside terminal
`within the LAN to the terminal outside the LAN during
`the IKE communication, said second address regardless
`of said first address; and
`d) establishing a Security Architecture for the Internet
`Protocol (IPsec) communication that follows the IKE
`communication, which includes said first IP address
`and said second IP address,
`wherein the gateway apparatus designates the first IP
`address for the outside terminal from a tunneled IP
`packet.
`2. The VPN communication method employed for the
`security gateway apparatus as defined in claim 1, wherein an
`IP address and a subnet mask address, which have same
`segments as those of the LAN, are distributed to the outside
`terminal, thereby the outside terminal can be virtually
`regarded as a terminal on the LAN.
`3. The VPN communication method for the security
`gateway apparatus as defined in claim 1, wherein the outside
`terminal is provided, during the IKE communication, with a
`private IP address that is used on the LAN, in a case that the
`40 LAN is configured with private IP addresses, whereby the
`outside terminal is allowed to access to a terminal on the
`LAN.
`4. The VPN communication method for the security
`gateway apparatus according to claim 1, wherein an encryp-
`45 tion key and an authentication key are exchanged with a
`public key cryptosystem during the IKE communication.
`5. The VPN communication method for the security
`gateway apparatus according to claim 1, wherein the DHCP
`communication option contains an IP address and a subnet
`50 mask.
`6. A security gateway apparatus connecting between a
`local area network (LAN) and a wide area network (WAN)
`including a public network, the apparatus comprising:
`a) a Dynamic Host Configuration Protocol (DHCP)
`option adding section adding a DHCP communication
`option to an IKE data when establishing an IKE com(cid:173)
`munication with an outside terminal having a first IP
`address distributed from outside the LAN having a
`connection with the WAN;
`b) an IP address distribution section assigning a second IP
`address from an inside terminal within the LAN to the
`outside terminal during the IKE communication, said
`second address regardless of said first address; and
`c) an IPsec communication section performing an IPsec
`communication that follows the IKE communication,
`which includes said first IP address and said second IP
`address,
`
`Fourth Preferred Embodiment
`Now will be explained the security gateway apparatus
`employing the method described above of the embodiment,
`referring to FIG. 4.
`Gateway apparatus 203 includes DHCP option adding
`section 212, IPsec communication section 214, IP address
`distribution section 216, I/0 section 210 for WAN, and I/0
`section 218 for LAN.
`As described in the method in the first preferred embodi(cid:173)
`ment,
`1) DHCP option adding section 212 adds the DHCP
`option to the IKE data;
`2) IP address distributing section 216 distributes an IP
`address, via I/0 section 210, to a terminal having a
`dialup connection with the WAN;
`3) IPsec communication section 214 performs the IPsec
`communication, via I/0 sections 210 and 218, between
`the WAN and inside the LAN.
`Thus, according to the VPN communication method and
`the security gateway apparatus using the method, when
`establishing the IPsec communication with an outside PC
`having a dialup connection, the gateway apparatus can 60
`control the final destination IP address of the PC, therefore
`eliminating need for setting of the terminal on the LAN. This
`fact promises safeguarded communication.
`Besides, with the method and the apparatus, the outside
`PC establishing VPN is virtually regarded as another termi- 65
`nal on the LAN. This allows the outside PC to access to any
`terminal on the LAN with safety.
`
`55
`
`0013
`
`

`

`US 7,028,337 B2
`
`9
`wherein, the gateway apparatus designates the first IP
`address for the outside terminal from a tunneled IP
`packet.
`7. The security gateway apparatus as defined in claim 6,
`wherein an IP address and a subnet mask address, which
`have same segments as those of the LAN, are distributed to
`the outside terminal, thereby the outside terminal can be
`virtually regarded as a terminal on the LAN.
`8. The security gateway apparatus as defined in claim 6,
`wherein the outside terminal is provided, during the IKE 10
`communication, with a private IP address which is the same
`as one used on the LAN in a case that the LAN is configured
`with private IP addresses, whereby the outside terminal is
`allowed to access to a terminal on the LAN.
`9. The security gateway apparatus according to claim 6, 15
`wherein an encryption key and an authentication key are
`exchanged with a public key cryptosystem during the IKE
`communication.
`10. The security gateway apparatus according to claim 6,
`wherein the DHCP communication option contains an IP 20
`address and a subnet mask.
`11. The VPN communication method for the security
`gateway apparatus according to claim 2, wherein an encryp(cid:173)
`tion key and an authentication key are exchanged with a
`public key cryptosystem during the IKE communication.
`12. The VPN communication method for the security
`gateway apparatus according to claim 3, wherein an encryp(cid:173)
`tion key and an authentication key are exchanged with a
`public key cryptosystem during the IKE communication.
`13. The VPN communication method for the security 30
`gateway apparatus according to claim 2, wherein the DHCP
`communication option contains an IP address and a subnet
`mask.
`14. The VPN communication method for the security
`gateway apparatus according to claim 2, wherein the DHCP
`communication option contains an IP address and a subnet
`mask.
`
`10
`15. The security gateway apparatus according to claim 7,
`wherein an encryption key and an authentication key are
`exchanged with a public key cryptosystem during the IKE
`communication.
`16. The security gateway apparatus according to claim 8,
`wherein an encryption key and an authentication key are
`exch

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket