Domain name system configuration during virtual private network connection

ABSTRACT

Domain name system (DNS) configuration during virtual private network (VPN) connection includes establishing a VPN tunnel between a client device and a VPN system entry server, which includes configuring a first DNS server as an operative DNS server for the VPN tunnel, and obtaining first content by transmitting to the VPN entry server, a first request that identifies a first external source for the first content, receiving from the VPN entry server a DNS configuration message indicating a second DNS server, configuring the second DNS server as the operative DNS server, and receiving from the VPN entry server, via the VPN tunnel, the first content, wherein the VPN entry server obtained the first content from the first VPN system exit server identified by the VPN entry server using the second DNS server, and the first VPN system exit server obtained the first content from the first external source.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation of U.S. application patent Ser. No.17/677,461, filed Feb. 2, 2022, the entire disclosure of which is herebyincorporated by reference.

BACKGROUND

Computing devices, and users thereof, use virtual private network (VPN)services for privacy, to circumvent censorship, to access geo-filteredcontent, or a combination thereof.

SUMMARY

Disclosed herein are implementations of domain name system configurationduring virtual private network connection.

An aspect of the disclosure is a method for domain name systemconfiguration during virtual private network connection. Domain namesystem configuration during virtual private network connection includesestablishing, by a virtual private network entry server, a virtualprivate network tunnel between the virtual private network entry serverand a client device, wherein establishing the virtual private networktunnel includes receiving, from the client device, virtual privatenetwork configuration data indicating a first domain name system serverconfigured as an operative domain name system server for the virtualprivate network tunnel. Domain name system configuration during virtualprivate network connection includes receiving, by the virtual privatenetwork entry server, a first protocol data unit, wherein the firstprotocol data unit includes at least a portion of a first request forfirst content, wherein the first request identifies a first externalsource for the first content. Domain name system configuration duringvirtual private network connection includes determining, by the virtualprivate network entry server, that a first virtual private networksystem exit server for obtaining the first content from the firstexternal source is unavailable using the first domain name systemserver. Domain name system configuration during virtual private networkconnection includes, in response to determining that the first virtualprivate network system exit server for obtaining the first content fromthe first external source is unavailable using the first domain namesystem server, identifying, by the virtual private network entry server,a second domain name system server, such that the first virtual privatenetwork system exit server for obtaining the first content is availableusing the second domain name system server, transmitting, by the virtualprivate network entry server, to the client device, a second protocoldata unit including a domain name system configuration message, whereinthe domain name system configuration message indicates the second domainname system server, such that the client device configures the seconddomain name system server as the operative domain name system server forthe virtual private network tunnel, obtaining, by the virtual privatenetwork entry server, from the first virtual private network system exitserver, the first content, wherein the first virtual private networksystem exit server obtained the first content from the first externalsource, and transmitting, to the client device, via the virtual privatenetwork tunnel, the first content.

In the aspects described herein, obtaining the first content includesestablishing the virtual private network tunnel includes receiving thevirtual private network configuration data includes receiving the firstprotocol data unit; receiving the first protocol data unit includesreceiving a universal resource locator value indicative of the firstexternal source; receiving, by the virtual private network entry server,from the client device, a third protocol data unit, wherein the thirdprotocol data unit includes at least a portion of a second request forsecond content that identifies a second external source for the secondcontent; determining, by the virtual private network entry server, thata second virtual private network system exit server for obtaining thesecond content from the second external source is available using theoperative domain name system server; in response to determining that thesecond virtual private network system exit server for obtaining thesecond content from the second external source is available using theoperative domain name system server obtaining, by the virtual privatenetwork entry server, from the second virtual private network systemexit server, the second content, wherein the second virtual privatenetwork system exit server obtained the second content from the secondexternal source, and transmitting, to the client device, via the virtualprivate network tunnel, the second content, such that the client deviceomits reconfiguring the operative domain name system server to obtainthe second content; the second content is obtained prior to obtainingthe first content, such that the second content is obtained wherein theoperative domain name system server is the first domain name systemserver; the second content is obtained subsequent to obtaining the firstcontent, such that the second content is obtained wherein the operativedomain name system server is the second domain name system server; andwherein a geographic location of the first virtual private network exitserver differs from a geographic location of the second virtual privatenetwork exit server.

Another aspect of the disclosure is an apparatus of a service providerinfrastructure system. The apparatus includes a non-transitorycomputer-readable storage medium, and a processor that executesinstructions stored in the non-transitory computer-readable storagemedium to perform domain name system configuration during virtualprivate network connection. To perform domain name system configurationduring virtual private network connection the processor executes theinstructions stored in the non-transitory computer-readable storagemedium to establish a virtual private network tunnel between the virtualprivate network entry server apparatus and a client device, wherein toestablish the virtual private network tunnel the processor executes theinstructions to receive, from the client device, virtual private networkconfiguration data indicating a first domain name system serverconfigured as an operative domain name system server for the virtualprivate network tunnel, receive a first protocol data unit, wherein thefirst protocol data unit includes at least a portion of a first requestfor first content, wherein the first request identifies a first externalsource for the first content, determine that a first virtual privatenetwork system exit server for obtaining the first content from thefirst external source is unavailable using the first domain name systemserver, and, in response to determining that the first virtual privatenetwork system exit server for obtaining the first content from thefirst external source is unavailable using the first domain name systemserver, identify a second domain name system server, such that the firstvirtual private network system exit server for obtaining the firstcontent is available using the second domain name system server,transmit, to the client device, a second protocol data unit including adomain name system configuration message, wherein the domain name systemconfiguration message indicates the second domain name system server,such that the client device configures the second domain name systemserver as the operative domain name system server for the virtualprivate network tunnel, obtain, from the first virtual private networksystem exit server, the first content, wherein the first virtual privatenetwork system exit server obtained the first content from the firstexternal source, and transmit, to the client device, via the virtualprivate network tunnel, the first content.

In the aspects described herein, to receive the virtual private networkconfiguration data, the processor executes the instructions to receivethe first protocol data unit; to receive the first protocol data unit,the processor executes the instructions to receive a universal resourcelocator value indicative of the first external source; wherein theprocessor executes the instructions to receive, from the client device,a third protocol data unit, wherein the third protocol data unitincludes at least a portion of a second request for second content thatidentifies a second external source for the second content, determinethat a second virtual private network system exit server for obtainingthe second content from the second external source is available usingthe operative domain name system server, and, in response to determiningthat the second virtual private network system exit server for obtainingthe second content from the second external source is available usingthe operative domain name system server, obtain, from the second virtualprivate network system exit server, the second content, wherein thesecond virtual private network system exit server obtained the secondcontent from the second external source, and transmit, to the clientdevice, via the virtual private network tunnel, the second content, suchthat the client device omits reconfiguring the operative domain namesystem server to obtain the second content; the processor executes theinstructions to obtain the second content prior to obtaining the firstcontent, such that the operative domain name system server is the firstdomain name system server; the processor executes the instructions toobtain the second content subsequent to obtaining the first content,such that the operative domain name system server is the second domainname system server; and wherein a geographic location of the firstvirtual private network exit server differs from a geographic locationof the second virtual private network exit server.

Another aspect of the disclosure is a non-transitory computer-readablestorage medium, comprising executable instructions that, when executedby a processor, perform domain name system configuration during virtualprivate network connection. Domain name system configuration duringvirtual private network connection includes establishing, by a virtualprivate network entry server, a virtual private network tunnel betweenthe virtual private network entry server and a client device, whereinestablishing the virtual private network tunnel includes receiving, fromthe client device, virtual private network configuration data indicatinga first domain name system server configured as an operative domain namesystem server for the virtual private network tunnel. Domain name systemconfiguration during virtual private network connection includesreceiving, by the virtual private network entry server, a first protocoldata unit, wherein the first protocol data unit includes at least aportion of a first request for first content, wherein the first requestidentifies a first external source for the first content. Domain namesystem configuration during virtual private network connection includesdetermining, by the virtual private network entry server, that a firstvirtual private network system exit server for obtaining the firstcontent from the first external source is unavailable using the firstdomain name system server. Domain name system configuration duringvirtual private network connection includes, in response to determiningthat the first virtual private network system exit server for obtainingthe first content from the first external source is unavailable usingthe first domain name system server, identifying, by the virtual privatenetwork entry server, a second domain name system server, such that thefirst virtual private network system exit server for obtaining the firstcontent is available using the second domain name system server,transmitting, by the virtual private network entry server, to the clientdevice, a second protocol data unit including a domain name systemconfiguration message, wherein the domain name system configurationmessage indicates the second domain name system server, such that theclient device configures the second domain name system server as theoperative domain name system server for the virtual private networktunnel, obtaining, by the virtual private network entry server, from thefirst virtual private network system exit server, the first content,wherein the first virtual private network system exit server obtainedthe first content from the first external source, and transmitting, tothe client device, via the virtual private network tunnel, the firstcontent.

In the aspects described herein, obtaining the first content includesestablishing the virtual private network tunnel includes receiving thevirtual private network configuration data includes receiving the firstprotocol data unit; receiving the first protocol data unit includesreceiving a universal resource locator value indicative of the firstexternal source; receiving, by the virtual private network entry server,from the client device, a third protocol data unit, wherein the thirdprotocol data unit includes at least a portion of a second request forsecond content that identifies a second external source for the secondcontent; determining, by the virtual private network entry server, thata second virtual private network system exit server for obtaining thesecond content from the second external source is available using theoperative domain name system server; in response to determining that thesecond virtual private network system exit server for obtaining thesecond content from the second external source is available using theoperative domain name system server obtaining, by the virtual privatenetwork entry server, from the second virtual private network systemexit server, the second content, wherein the second virtual privatenetwork system exit server obtained the second content from the secondexternal source, and transmitting, to the client device, via the virtualprivate network tunnel, the second content, such that the client deviceomits reconfiguring the operative domain name system server to obtainthe second content; the second content is obtained prior to obtainingthe first content, such that the second content is obtained wherein theoperative domain name system server is the first domain name systemserver; the second content is obtained subsequent to obtaining the firstcontent, such that the second content is obtained wherein the operativedomain name system server is the second domain name system server; andwherein a geographic location of the first virtual private network exitserver differs from a geographic location of the second virtual privatenetwork exit server.

These and other objects, features, and characteristics of the apparatus,system, and/or method disclosed herein, as well as the methods ofoperation and functions of the related elements of structure and thecombination of parts and economies of manufacture, will become moreapparent upon consideration of the following description and theappended claims with reference to the accompanying drawings, all ofwhich form a part of this specification, wherein like reference numeralsdesignate corresponding parts in the various figures.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosure is best understood from the following detaileddescription when read in conjunction with the accompanying drawings. Itis emphasized that, according to common practice, the various featuresof the drawings are not to-scale. On the contrary, the dimensions of thevarious features are arbitrarily expanded or reduced for clarity.

FIG. 1 is a block diagram of an example system associated with providinga split-configuration virtual private network.

FIG. 2 is a block diagram of an example system associated with providinga split-configuration virtual private network.

FIG. 3 is a flow diagram of an example flow associated with providing asplit-configuration virtual private network.

FIG. 4 is a flow diagram of an example process associated with providinga split-configuration virtual private network.

FIG. 5 is a flow diagram of an example process associated with providinga split-configuration virtual private network.

FIG. 6 is a flow diagram of an example process associated with providinga split-configuration virtual private network.

FIG. 7 is a block diagram of example devices associated with providing asplit-configuration virtual private network.

FIG. 8 is a block diagram of an example of a computing device.

FIG. 9 is a block diagram of an example of a computing andcommunications system.

FIG. 10 is a block diagram of another example of a computing andcommunications system for domain name system configuration duringvirtual private network connection.

FIG. 11 is a flowchart of an example of domain name system configurationduring virtual private network connection.

FIG. 12 is a flowchart of an example of domain name system configurationduring virtual private network connection for a virtual private networkservice provider infrastructure system.

DETAILED DESCRIPTION

Global Internet users increasingly rely on VPN services to preservetheir privacy, to circumvent censorship, and/or to access geo-filteredcontent. Originally developed as a technology to privately send andreceive data across public networks, VPNs are now used broadly as aprivacy-preserving technology that allows Internet users to obscure notonly the communicated data but also personal information such as, forexample, web browsing history from third parties including Internetservice providers (ISPs), Spywares, or the like. A VPN service providermay offer a secure private networking environment within a publiclyshared, insecure infrastructure through encapsulation and encryption ofthe data communicated between a VPN client application (or VPNapplication) installed on a user device and a remote VPN server.

Most VPN providers rely on a tunneling protocol to create the secureprivate networking environment, which adds a layer of security toprotect each IP packet of the communicated data during communicationover the Internet. Tunneling may be associated with enclosing an entireIP packet within an outer IP packet to form an encapsulated IP packet,and transporting the enclosed IP packet over the Internet. The outer IPpacket may protect contents of the enclosed IP packet from public viewby ensuring that the enclosed IP packet is transmitted over the Internetwithin a virtual tunnel. Such a virtual tunnel may be a point-to-pointtunnel established between the user device and the VPN server. Theprocess of enclosing the entire IP packet within the outer IP packet maybe referred to as encapsulation. Computers, servers, or other networkdevices at ends of the virtual tunnel may be referred to as tunnelinterfaces and may be capable of encapsulating outgoing IP packets andof unwrapping incoming encapsulated IP packets.

Encryption may be associated with changing the data from being in atransparently readable format to being in an encoded, unreadable formatwith help of an encryption algorithm. Decryption may be associated withchanging the data from being in the encoded, unreadable format to beingin the transparently readable format with help of a decryptionalgorithm. In an example, encoded/encrypted data may bedecoded/decrypted with only a correct decryption key. In a VPN,encryption may render the communicated data unreadable or indecipherableto any third party. At a basic level, when the user launches theinstalled VPN application and connects to the VPN server, the VPNapplication may encrypt all contents of the data before transmissionover the Internet to the VPN server. Upon receipt, the VPN server maydecrypt the encrypted data and forward the decrypted data to an intendedtarget via the Internet. Similarly, the VPN server may encrypt allcontents of the data before transmission over the Internet to the userdevice. Upon receipt, the VPN application on the user device may decryptthe encrypted data and provide the decrypted data to the user.

VPNs generally use different types of encryption and decryptionalgorithms to encrypt and decrypt the communicated data. Symmetricencryption may utilize encryption and decryption algorithms that rely ona single private key for encryption and decryption of data. Symmetricencryption is considered to be relatively speedy. One example of anencryption and decryption algorithm utilized by symmetric encryption maybe an AES encryption cipher. Asymmetric encryption, on the other hand,may utilize encryption and decryption algorithms that rely on twoseparate but mathematically-related keys for encryption and decryptionof data. In one example, data encrypted using a public key may bedecrypted using a separate but mathematically-related private key. Thepublic key may be publicly available through a directory, while theprivate key may remain confidential and accessible by only an owner ofthe private key. Asymmetric encryption may also be referred to as publickey cryptography. One example of an encryption and decryption algorithmutilized by asymmetric encryption may be Rivest-Shamir-Adleman (RSA)protocol.

In a VPN, keys for encryption and decryption may be randomly generatedstrings of bits. Each key may be generated to be unique. A length of anencryption key may be given by a number of the randomly generated stringbits, and the longer the length of the encryption key, the stronger isthe encryption.

VPNs may employ user authentication, which may involve verification ofcredentials required to confirm authenticity/identity of the user. Forinstance, when a user launches the VPN application to request a VPNconnection, the VPN service provider may authenticate the user deviceprior to providing the user device with access to VPN services. In thisway, user authentication may provide a form of access control.Typically, user authentication may include verification of a uniquecombination of a user ID and password. To provide improved security inthe VPN, user authentication may include additional factors such asknowledge, possession, inheritance, or the like. Knowledge factors mayinclude items (e.g., pin numbers) that an authentic user may be expectedto know. Possession factors may include items (e.g., one-time password(OTP) tokens) that an authentic user may be expected to possess at atime associated with the authentication. Inherent factors may includebiometric items (e.g., fingerprint scans, retina scans, iris scans, orthe like) that may be inherent traits of an authentic user.

A VPN may be associated with a network of VPN servers, typicallydeployed in various geographic locations. A VPN server may be a physicalserver or a virtual server configured to host and/or globally deliverVPN services to the user. A server may be a combination of hardware andsoftware, and may include logical and physical communication ports. Whenlaunched, the VPN application may connect with a selected VPN server forsecure communication of data via the virtual tunnel.

The VPN application, installed on the user device, may utilizesoftware-based technology to establish a secure connection between theuser device and a VPN server. Some VPN applications may automaticallywork in the background on the user device while other VPN applicationsmay include front-end interfaces to allow the user to interact with andconfigure the VPN applications. VPN applications may often be installedon a computer (e.g., user device), though some entities may provide apurpose-built VPN application as a hardware device that is pre-installedwith software to enable the VPN. Typically, a VPN application mayutilize one or more VPN protocols to encrypt and decrypt thecommunicated data. Some commonly used VPN protocols may include OpenVPN,SSTP, PPTP, L2TP/IPsec, SSL/TLS, Wireguard, IKEv2, and SoftEther.

FIG. 1 is a block diagram of an example system associated with providinga split-configuration virtual private network. Example 100 shows anarchitectural depiction of components included in system 100. In someaspects, the components may include a user device 102 capable ofcommunicating with one or more VPN servers 120 and with a VPN serviceprovider (VSP) control infrastructure 104 over a network 122. The VSPcontrol infrastructure 104 may be controlled by a VPN service providerand may include an application programming interface (API) 106, a userdatabase 108, processing unit 110, a server database 116, and the one ormore VPN servers 120. As shown in FIG. 1 , the API 106 may be capable ofcommunicating with the user database 108 and with the processing unit110. Additionally, the processing unit 110 may be capable ofcommunicating with the server database, which may be capable ofcommunicating with a testing module (not shown). The testing module maybe capable of communicating with the one or more VPN servers 120 overthe network 122. The processing unit 110 may be capable of controllingoperation of the one or more VPN servers 120.

The user device 102 may be a physical computing device capable ofhosting a VPN application and of connecting to the network 122. The userdevice 102 may be, for example, a laptop, a mobile phone, a tabletcomputer, a desktop computer, a smart device, a router, or the like. Insome aspects, the user device 102 may include, for example,Internet-of-Things (IoT) devices such as VSP smart home appliances,smart home security systems, autonomous vehicles, smart health monitors,smart factory equipment, wireless inventory trackers, biometric cybersecurity scanners, or the like. The network 122 may be any digitaltelecommunication network that permits several nodes to share and accessresources. In some aspects, the network 122 may include one or more of,for example, a local-area network (LAN), a wide-area network (WAN), acampus-area network (CAN), a metropolitan-area network (MAN), ahome-area network (HAN), Internet, Intranet, Extranet, and Internetwork.

The VSP control infrastructure 104 may include a combination of hardwareand software components that enable provision of VPN services to theuser device 102. The VSP control infrastructure 104 may interface with(the VPN application on) the user device 102 via the API 106, which mayinclude one or more endpoints to a defined request-response messagesystem. In some aspects, the API 106 may be configured to receive, viathe network 122, a connection request from the user device 102 toestablish a VPN connection with a VPN server 120. The connection requestmay include an authentication request to authenticate the user device102 and/or a request for an IP address of an optimal VPN server forestablishment of the VPN connection therewith. In some aspects, anoptimal VPN server may be a single VPN server 120 or a combination ofone or more VPN servers 120. The API 106 may receive the authenticationrequest and the request for an IP address of an optimal VPN server in asingle connection request. In some aspects, the API 106 may receive theauthentication request and the request for an IP address of an optimalVPN server in separate connection requests.

The API 106 may further be configured to handle the connection requestby mediating the authentication request. For instance, the API 106 mayreceive from the user device 102 credentials including, for example, aunique combination of a user ID and password for purposes ofauthenticating the user device 102. In another example, the credentialsmay include a unique validation code known to an authentic user. The API106 may provide the received credentials to the user database 108 forverification.

The user database 108 may include a structured repository of validcredentials belonging to authentic users. In one example, the structuredrepository may include one or more tables containing valid uniquecombinations of user IDs and passwords belonging to authentic users. Inanother example, the structured repository may include one or moretables containing valid unique validation codes associated withauthentic users. The VPN service provider may add or delete such validunique combinations of user IDs and passwords from the structuredrepository at any time. Based at least in part on receiving thecredentials from the API 106, the user database 108 and a processor(e.g., the processing unit 110 or another local or remote processor) mayverify the received credentials by matching the received credentialswith the valid credentials stored in the structured repository. In someaspects, the user database 108 and the processor may authenticate theuser device 102 when the received credentials match at least one of thevalid credentials. In this case, the VPN service provider may provideVPN services to the user device 102. When the received credentials failto match at least one of the valid credentials, the user database 108and the processor may fail to authenticate the user device 102. In thiscase, the VPN service provider may decline to provide VPN services tothe user device 102.

When the user device 102 is authenticated, the user device 102 mayinitiate a VPN connection and may transmit to the API 106 a request foran IP address of an optimal VPN server. The processing unit 110 includedin the VSP control infrastructure may be configured todetermine/identify a single VPN server 120 as the optimal server or alist of VPN servers. The processing unit 110 may utilize the API 106 totransmit the IP address of the optimal server or IP addresses of the VPNservers 120 included in the list to the user device 102. In the casewhere the list of IP addresses of the VPN servers 120 is provided, theuser device 102 may have an option to select a single VPN server 120from among the listed VPN servers as the optimal server 120. The userdevice 102 may transmit an initiation request to establish a VPNconnection (e.g., an encrypted tunnel) with the optimal VPN server. Insome aspects, the optimal VPN server with which the user deviceestablishes the encrypted tunnel may be referred to as a primary VPNserver or an entry VPN server. In some aspects, a VPN server 120 may bea piece of physical or virtual computer hardware and/or software capableof securely communicating with (the VPN application on) the user device102 for provision of VPN services.

The processing unit 110 may be a logical unit including a scoring engine112. The processing unit 110 may include a logical component configuredto perform complex operations to compute numerical weights related tovarious factors associated with the VPN servers 120. The scoring enginemay likewise include a logical component configured to performarithmetical and logical operations to compute a server penalty scorefor one or more of the VPN servers 120.

In some aspects, based at least in part on server penalty scorescalculated via the complex operations and/or the arithmetical andlogical operations, the processing unit 110 may determine an optimal VPNserver. In one example, the processing unit 110 may determine the VPNserver 120 with the lowest server penalty score as the optimal VPNserver. In another example, the processing unit 110 may determine thelist of optimal VPN servers by including, for example, three (or anyother number) VPN servers 120 with the three lowest server penaltyscores.

One or more components (e.g., API 106, user database 108, processingunit 110, and/or server database 116) included in the VSP controlinfrastructure 104 may further be associated with acontroller/processor, a memory, or a combination thereof. For instance,the one or more components of the set of components may include or maybe included in a controller/processor, a memory, or a combinationthereof. In some aspects, the one or more of the components included inthe VSP control infrastructure 104 may be separate and distinct fromeach other. Alternatively, in some aspects, one or more of thecomponents included in the VSP control infrastructure 104 may becombined with one or more of other components included in the VSPcontrol infrastructure 104. In some aspects, the one or more of thecomponents included in the VSP control infrastructure 104 may be localwith respect to each other. Alternatively, in some aspects, one or moreof the components included in the VSP control infrastructure 104 may belocated remotely with respect to one or more of other componentsincluded in the VSP control infrastructure 104. Additionally, oralternatively, one or more components of the components

included in the VSP control infrastructure 104 may be implemented atleast in part as software stored in a memory. For example, a component(or a portion of a component) may be implemented as instructions or codestored in a non-transitory computer-readable medium and executable by acontroller or a processor to perform the functions or operations of thecomponent. Additionally, or alternatively, a set of (one or more)components shown in FIG. 1 may be configured to perform one or morefunctions described as being performed by another set of componentsshown in FIG. 1 .

As indicated above, FIG. 1 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 1 .

A user device may receive remote content via a VPN network. Remotecontent may include content that is unavailable in a geographic locationwhere the user device is located. Remote content may also includemultimedia content such as audio content, video content, audio-videocontent, image content, or the like and/or non-multimedia content suchas textual data, textual information, or the like. The user device mayreceive the remote multimedia content via streaming, which may includereal-time reception and rendering of the remote multimedia content onthe user device.

To receive the remote content via the VPN network, the user device mayrequest VPN services from a VSP control infrastructure. The VSP controlinfrastructure may suggest a VPN server for providing VPN services tothe user device. The VPN server may be an optimal VPN server forproviding VPN services to the user device because, for example, the VPNserver may be located geographically/physically closer (and thereforeable to provide speedier service) to the user device as compared to theother VPN servers. The user device may establish a VPN connection withthe VPN server.

During the established VPN connection, the user device may transmit aremote content request for requesting the VPN server to provide theremote content. Based at least in part on receiving the remote contentrequest, the VPN server may utilize an associated domain name services(DNS) server to reach an exchange point to obtain the remote content.The associated DNS server may be a default DNS server utilized by theVPN server to service all received requests (e.g., requests for remotecontent, requests for local content, or the like). In an example, theDNS server may be local to the VPN server and/or may be included withinthe VPN server, thereby enabling speedy DNS services to the VPN server.

The default DNS server may fail to enable the VPN server to reach anexchange point capable of obtaining the remote content. For instance,the default DNS server may be limited to providing an access Internetprotocol (IP) address of an exchange point that is not be capable ofobtaining the remote content. An exchange point may not be capable ofobtaining the remote content because, for example, the exchange point isassociated with a VPN server and/or the exchange point is located in ageographic location (which may be similar to a location of the VPNserver and/or a location of the user device) where the remote content isunavailable. For instance, an exchange point may utilize a proxy IPaddress to obtain the remote content. A content provider of the remotecontent may decline to provide the remote content to the exchange pointbased on evaluating the proxy IP address and determining that theexchange point is associated with a VPN server. Additionally, oralternatively, the content provider may decline to provide the remotecontent to the exchange point based on evaluating the proxy IP addressand determining that the exchange point is located in a geographicallocation where the remote content is unavailable. As a result, the DNSserver may be unable to provide an access IP address of an exchangepoint capable of obtaining the remote content. Consequently, the VPNserver may be unable to provide the remote content to the user device.

To receive the remote content, the user device may disconnect theestablished VPN connection with the VPN server and establish a new VPNconnection with a new VPN server. The user device may select the new VPNserver, from a list of VPN servers presented by the VSP controlinfrastructure, based on the new VPN server being associated with adefault DNS server that is able to provide an access IP address of anexchange point capable of obtaining the remote content (e.g., located ina geographic location where the remote content is available).

Such new VPN server may be located at a threshold distance away from theuser device. As a result, the VPN connection with the new VPN server mayinclude a plurality of nodes and/or routers. For at least this reason,the new VPN server may be unable to provide the user device with speedyservice, which may be essential for streaming remote multimedia content.The user device may be unable to adequately stream the remote multimediacontent. Additionally, disconnecting the established VPN connection andestablishing the new VPN connection may inefficiently consume userdevice resources (e.g., processing resources, memory resources, powerconsumption resources, battery life, or the like) and resourcesassociated with the VPN (computational resources, network bandwidth,management resources, processing resources, memory resources, or thelike) that can otherwise be used to perform suitable tasks associatedwith the VPN. Also, based on a threshold amount of user devicesconnecting to the new VPN server to receive the remote content, the newVPN server may become overloaded, thereby consuming the resourcesassociated with the VPN that may otherwise be used for suitable tasksassociated with the VPN.

Various aspects of systems and techniques discussed in the presentdisclosure enable providing a split-configuration VPN. In some aspects,providing a split-configuration may include a VSP control infrastructureconfiguring a VPN server to utilize a first DNS server to service remotecontent requests requesting remote content and a second DNS server(e.g., default DNS server) to service local content requests requestinglocal content. Local content may include content that is available in ageographic location where the user device (and/or the VPN server) islocated. In some aspects, the VPN server may be configured to receive,from the user device, remote content information indicating parametersassociated with the remote content. The VPN server may receive theremote content information along with an initiation request from theuser device requesting to establish a VPN connection with the VPNserver. Based at least in part on the remote content information, theVPN server may configure the VPN connection to be associated with one ormore remote DNS servers that may enable the VPN server to reach anexchange point capable of obtaining the remote content. In some aspects,the exchange point may be capable of obtaining the remote content basedat least in part on being located in a geographic location where theremote content is available. During the VPN connection, the VPN servermay transmit at least a portion of the remote content information toenable the exchange point to obtain the remote content.

In this way, the VSP control infrastructure may configure the VPN serverto receive the remote content and to provide the remote content to theuser device without the user device disconnecting an established VPNconnection with the VPN server and establishing a new VPN connectionwith a new VPN server. As a result, efficient consumption of user deviceresources and resources associated with the VPN may be enabled.Additionally, because the VPN server may be an optimal VPN server toprovide VPN services to the user device, the user device may receivespeedier service as compared to the new VPN server. Also, overloading ofthe new VPN server by users receiving the remote content may be avoided,thereby conserving resources associated with the VPN.

In some aspects, a processing unit (e.g., processing unit 110) includedin the VSP control infrastructure may configure a VPN server to receivean initiation request from a user device to establish a VPN connection,the initiation request including remote content information associatedwith remote content; and to transmit at least a portion of the remotecontent information to a remote domain name services (DNS) server toenable the remote DNS server to provide an access internet protocol (IP)address associated with a first exchange point that is capable ofobtaining the remote content.

FIG. 2 is an illustration of an example system 200 associated withproviding a split-configuration VPN, according to various aspects of thepresent disclosure. The example system 200 may include a user device102, a VPN server 120 associated with a default DNS server 210, one ormore remote DNS servers 220, an exchange point 230, and an exchangepoint 240. The default DNS server 210 may be local to the VPN server 120and/or may be included within the VPN server 120, thereby enablingspeedy DNS services to the VPN server 120 with respect to obtaininglocal content. The one or more remote DNS servers 220 may be locatedremotely with respect to the VPN server 120 and may enable the VPNserver 120 to obtain remote content. The VPN server 120 may beconfigured by a VSP control infrastructure (not shown) to provide VPNservices to the user device 102. In some aspects, the exchange point 230and the exchange point 240 may include, or may be included within, aproxy server.

The user device 102 may undergo an authentication process with a VSPcontrol infrastructure (e.g., VSP control infrastructure) to receive VPNservices via a VPN network. Such VPN services may include receivingremote content and receiving local content. Remote content may includecontent unavailable in a geographic location associated with the userdevice 102 and/or the VPN server 120. Local content may include contentavailable in the geographic location associated with the user device 102and/or the VPN server 120. Remote content may include remote multimediacontent such as, for example, audio content, video content, audio-videocontent, images, animations, slideshows, interactive gaming media,low-latency applications such as gambling applications, or the likeand/or may include remote data content such as, for example, textualdata, textual information, or the like. The user device 102 may receiveremote multimedia content via streaming, which may include real-timereception and rendering of the remote multimedia content on the userdevice 120 and/or on a device associated with the user device 120. Assuch, streaming may enable low-latency, instantaneous distribution andreception of the remote multimedia content. Local content may includelocal multimedia content and/or local data content. The local multimediacontent may be similar to remote multimedia content and the local datacontent may be similar to the remote data content.

Upon authentication of the user device 102, the VSP controlinfrastructure may enable the user device 102 to establish a VPNconnection with the VPN server 120, which may be an optimal VPN serverfor providing VPN services to the user device 102. In some aspects, theVPN server 120 may be the optimal server because, for example, becausethe VPN server 120 may be located geographically/physically closer (andtherefore able to provide speedier service) to the user device 102 ascompared to the other VPN servers, the VPN server 120 may have thehighest available bandwidth to provide VPN services to the user device102 as compared to the other VPN servers, and/or the VPN server 120 maybe located geographically/physically closer to an international Internetexchange hub (and therefore able to provide speedier service) ascompared to the other VPN servers.

To establish the VPN connection, the user device 102 may transmit, andthe VPN server 120 may receive, an initiation request. Substantiallysimultaneously to receiving the initiation request, the VPN server 120may receive remote content information. In some aspects, the remotecontent information may be included in the initiation request. In someaspects, the remote content information may be appended to a messageincluding the initiation request. In some aspects, the remote contentinformation and the initiation request may be received in separatecommunications. In some aspects, a client application installed on theuser device 102 may enable the user device 102 to transmit theinitiation request and the remote content information to the VPN server120. The client application may include a graphical interface to acceptremote content information via an input interface (e.g., touch screen,keyboard, mouse, pointer, etc.) associated with the user device 102. Insome aspects, the client application may activate, at a time associatedwith transmitting the initiation request, the graphical interface foraccepting remote content information. In some aspects, the graphicalinterface may present, for example, a pop-up menu on a screen associatedwith the user device 102 requesting entry of the remote contentinformation via the input interface.

The remote content information may include information associated withthe remote content that the user device 120 may receive. The remotecontent information may describe the remote content. In an example, theremote content information may indicate that the remote content isremote multimedia content (e.g., audio content, video content,audio-video content, etc.). In another example, the remote contentinformation may identify a content provider of the remote content. Forinstance, the remote content information may indicate a domain nameassociated with the content provider. In yet another example, the remotecontent information may indicate a geographical location where theremote content is available.

Based at least in part on receiving the initiation request, the VPNserver 120 may enable the user device 102 to establish a VPN connectionwith the VPN server 120. In some aspects, the VPN connection may beestablished using a VPN protocol such as, for example, proxy protocolv2, IP in IP (Protocol 4): IP in IPv4/IPv6; SIT/IPv6 (Protocol 41): IPv6in IPv4/IPv6; GRE (Protocol 47): Generic Routing Encapsulation; OpenVPN(UDP port 1194); SSTP (TCP port 443): Secure Socket Tunneling Protocol;IPSec (Protocol 50 and 51): Internet Protocol Security; L2TP (Protocol115): Layer 2 Tunneling Protocol; VXLAN (UDP port 4789): VirtualExtensible Local Area Network; WireGuard; Quic, and other available datacommunication protocols and their future iterations.

Further, based at least in part on the remote content information, theVPN server 120 may configure the VPN connection to be associated withone or more remote DNS servers 220 that may enable the VPN server 120 toreach an exchange point capable of obtaining the remote content. Forinstance, the VPN server 120 may configure the VPN connection to beassociated with the one or more remote DNS servers 220 that can provideaccess IP addresses of exchange points (e.g., exchange point 240)capable of obtaining the remote content. In some aspects, such exchangepoints may be located in a geographic location where the remote contentis available.

In some aspects, the one or more remote DNS servers 220 may haverespective predetermined lists of exchange points for whom the one ormore remote DNS servers 220 are capable of providing access IPaddresses. The VPN server 120 may evaluate such predetermined lists todetermine exchange points capable of obtaining the remote content to bereceived by the user device 102 and, therefore, select the one or moreremote DNS servers 220 with which to associate the VPN connection. Suchone or more remote DNS servers 220 may be separate from the default DNSserver 210.

In an example, when a user device 102 located in a first geographicallocation (e.g., Sweden) transmits remote content information indicatingthat remote content available in a second geographical location (e.g.,United States) may be received, the VPN server 120, which may be locatedin or near the first geographical location, may configure the VPNconnection to be associated with one or more remote DNS servers 220 thatcan provide access IP addresses of exchange points located in or nearthe second geographical location where the remote content is available.The VPN server 120 may evaluate respective predetermined lists ofexchange points associated with the one or more remote DNS servers 220to determine exchange points located in or near the second geographicallocation (e.g., capable of obtaining the remote content) and, therefore,the one or more remote DNS servers 220 with which to associate the VPNconnection.

Further, the VPN server 120 may configure DNS settings associated withthe VPN connection such that when a remote content request for theremote content is received from the user device 102 during the VPNconnection (e.g., after the VPN connection is established), the VPNserver 120 may utilize the one or more remote DNS servers 220 to receivean access IP address for an exchange point (e.g., exchange point 240)located in or near the second geographical location where the remotecontent is available. In some aspects, the VPN server 120 may transmitat least a portion of the remote content information to the one or moreremote DNS servers 220 to enable the one or more remote DNS servers 220to provide an access IP address associated with the exchange point. Insome aspects, the exchange point located in or near the secondgeographical location may utilize a proxy IP address associated with aproxy device (e.g., a laptop computer, a desktop computer, a smartphone, a tablet computer, or the like) that is also located in or nearthe second geographical location. As a result, the content provider mayagree to provide the remote content to the exchange point based at leastin part on evaluating the proxy IP address and determining that theexchange point is located in or near the second geographical locationwhere the remote content is available. In this way, the VPN server 120may enable the user device 102, that is located in the firstgeographical location where the remote content is unavailable, toreceive the remote content via the exchange point located in or near thesecond geographical location where the remote content is available.

During the VPN connection, the VPN server 120 may receive a remotecontent request for the remote content. Based at least in part onreceiving the remote content request, the VPN server 120 may communicate(e.g., transmit and/or receive) with the one or more remote DNS servers220 to receive an access IP address associated with, for example,exchange point 240 (e.g., remote exchange point) that is located in ageographical location where the remote content is available. Based atleast in part on receiving the access IP address associated with theexchange point 240, the VPN server 120 may transmit at least a portionof the remote content information and/or the remote content request tothe exchange point 240. The exchange point 240 may utilize a proxy IPaddress associated with a proxy device that is also located in thegeographical location where the remote content is available to obtainthe remote content. Based at least in part on obtaining the remotecontent, the exchange point 240 may transmit, and the VPN server 120 mayreceive, the remote content. Based at least in part on receiving theremote content from the exchange point 240, the VPN server 120 mayprovide the remote content to the user device 102 via the VPNconnection.

During the VPN connection, the VPN server 120 may also receive a localcontent request including local content information for requesting localcontent. In some aspects, the VPN server 120 may receive the localcontent request substantially simultaneously with the remote contentrequest. In some aspects, the VPN server may receive the local contentrequest at a different time with respect to the remote content request.Based at least in part on receiving the local content request and/ordetermining that the local content request is associated with localcontent, the VPN server 120 may select to utilize the default DNS server210 to receive an access IP address associated with, for example,exchange point 230 (e.g., local exchange point) that is capable ofobtaining the local content. Based at least in part on receiving theaccess IP address associated with the exchange point 230, the VPN server120 may transmit at least a portion of the local content informationand/or the local content request to the exchange point 230. The exchangepoint 230 may utilize a proxy IP address associated with a proxy devicethat is also located in the geographical location where the localcontent is available to obtain the local content. Based at least in parton obtaining the local content, the exchange point 230 may transmit, andthe VPN server 120 may receive, the local content. Based at least inpart on receiving the local content from the exchange point 230, the VPNserver 120 may provide the local content to the user device 102 via theVPN connection.

In this way, by providing a split-configuration to utilize a remote DNSserver to service remote content requests requesting remote content anda default DNS server to service local content requests requesting localcontent, a VPN server may enable a user device located in a geographicallocation, where the remote content is unavailable, to receive the remotecontent via the VPN connection. Additionally, the VPN server may providethe remote content to a user device without the user devicedisconnecting an established VPN connection with the VPN server andestablishing a new VPN connection with a new VPN server. As a result,efficient consumption of user device resources and resources associatedwith the VPN may be enabled. Additionally, because the VPN server may bean optimal VPN server to provide VPN services to the user device, theuser device may receive speedier service as compared to the new VPNserver. Also, overloading of a VPN server (e.g., new VPN server) that iscapable of providing the remote content may be avoided, therebyconserving resources associated with the VPN.

As indicated above, FIG. 2 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 2 .

FIG. 3 is an illustration of an example flow 300 associated withproviding a split-configuration VPN, according to various aspects of thepresent disclosure. The example flow 300 may include a user device 102in communication with a VPN server 120. In some aspects, as discussedelsewhere herein, a VSP control infrastructure associated with the VPNserver 120 may configure the VPN server 120 to provide VPN services tothe user device 102.

As shown by reference numeral 310, upon authentication of the userdevice 102, the VPN server 120 may receive an initiation request and/orremote content information to establish a VPN connection, as discussedelsewhere herein. Based at least in part on receiving the initiationrequest and/or the remote content information, as shown by referencenumeral 320, the VPN server 120 may establish and configure the VPNconnection. In some aspects, as discussed elsewhere herein, configuringthe VPN connection may include associating the VPN connection with oneor more remote DNS servers (e.g., remote DNS server 220) that may enablethe VPN server 120 to reach an exchange point (e.g., exchange point 240)capable of obtaining the remote content. Further, as discussed elsewhereherein, configuring the VPN connection may include configuring DNSsettings associated with the VPN connection such that when a remotecontent request for the remote content is received from the user device102 during the VPN connection (e.g., after the VPN connection isestablished), the VPN server 120 may utilize the one or more remote DNSservers 220 to receive an access IP address for the exchange pointcapable of obtaining the remote content.

During the VPN connection, as shown by reference numeral 330, the VPNserver 120 may receive a remote content request for the remote content.As shown by reference numeral 340, the VPN server 120 may receive theremote content by communicating with the exchange point capable ofobtaining the remote content, as discussed elsewhere herein. Based atleast in part on receiving the remote content, as shown by referencenumber 350, the VPN server 120 may provide the remote content to theuser device 102 via the VPN connection as discussed elsewhere herein.

During the VPN connection, as shown by reference numeral 360, the VPNserver 120 may receive a local content request for the local content. Asshown by reference numeral 370, the VPN server 120 may receive the localcontent by communicating with the exchange point capable of obtainingthe local content, as discussed elsewhere herein. Based at least in parton receiving the local content, as shown by reference number 380, theVPN server 120 may provide the local content to the user device 102 viathe VPN connection as discussed elsewhere herein.

As indicated above, FIG. 3 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 3 .

FIG. 4 is an illustration of an example process 400 associated withproviding a split-configuration VPN, according to various aspects of thepresent disclosure. In some aspects, the process 400 may be performed bya memory (e.g., memory 730) and/or a processor (e.g., processor 720)associated with a VPN server (e.g., VPN server 120). As shown byreference numeral 410, process 400 may include receiving, at a VPNserver, an initiation request from a user device to establish a VPNconnection with the VPN server, the initiation request including remotecontent information associated with remote content. For instance, theVPN server may utilize a communication interface (e.g., communicationinterface 770) and the associated memory and/or processor to receive aninitiation request from a user device to establish a VPN connection withthe VPN server, the initiation request including remote contentinformation associated with remote content, as discussed elsewhereherein.

As shown by reference numeral 420, process 400 may include transmittingat least a portion of the remote content information to a remote domainname services (DNS) server to enable the remote DNS server to provide anaccess internet protocol (IP) address associated with a first exchangepoint that is capable of obtaining the remote content. For instance, theVPN server may utilize the communication interface (e.g., communicationinterface 770) and the associated memory and/or processor to transmit atleast a portion of the remote content information to a remote domainname services (DNS) server to enable the remote DNS server to provide anaccess internet protocol (IP) address associated with a first exchangepoint that is capable of obtaining the remote content, as discussedelsewhere herein.

Process 400 may include additional aspects, such as any single aspect orany combination of aspects described below and/or in connection with oneor more other processes described elsewhere herein.

In a first aspect, process 400 may include selecting the remote DNSserver based at least in part on an association of the remote DNS serverwith the first exchange point that is capable of obtaining the remotecontent.

In a second aspect, alone or in combination with the first aspect,process 400 may include selecting the remote DNS server based at leastin part on determining that the remote DNS server can provide the accessIP address of the first exchange point.

In a third aspect, alone or in combination with the first through secondaspects, process 400 may include receiving, from the remote DNS server,the access IP address associated with the first exchange point based atleast in part on transmitting at least a portion of the remote contentinformation to the remote DNS server.

In a fourth aspect, alone or in combination with the first through thirdaspects, process 400 may include receiving, during the VPN connection, aremote content request for the remote content; transmitting informationassociated with the remote content request to the first exchange point;receiving the remote content from the first exchange point; andtransmitting the remote content to the user device.

In a fifth aspect, alone or in combination with the first through fourthaspects, in process 400, the remote content information indicates ageographical location where the remote content is available.

In a sixth aspect, alone or in combination with the first through fifthaspects, process 400 may include receiving, during the VPN connection, alocal content request for the local content; transmitting informationassociated with the local content request to a second exchange point;receiving the local content from the second exchange point; andtransmitting the local content to the user device.

Although FIG. 4 shows example blocks of the process, in some aspects,the process may include additional blocks, fewer blocks, differentblocks, or differently arranged blocks than those depicted in FIG. 4 .Additionally, or alternatively, two or more of the blocks of the processmay be performed in parallel.

As indicated above, FIG. 4 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 4 .

FIG. 5 is an illustration of an example process 500 associated withproviding a split-configuration VPN, according to various aspects of thepresent disclosure. In some aspects, the process 500 may be performed bya memory (e.g., memory 730) and/or a processor (e.g., processor 720)associated with a VPN server (e.g., VPN server 120). As shown byreference numeral 510, process 500 may include receiving, during a VPNconnection, a local content request requesting local content. Forinstance, the VPN server may utilize a communication interface (e.g.,communication interface 770) and the associated memory and/or processorto receive, during a VPN connection, a local content request requestinglocal content, as discussed elsewhere herein.

As shown by reference numeral 520, process 500 may include transmitting,to a local exchange point that is capable of obtaining the localcontent, at least a portion of the local content request to enable thelocal exchange point to provide the local content. For instance, the VPNserver may utilize the communication interface (e.g., communicationinterface 770) and the associated memory and/or processor to transmit,to a local exchange point that is capable of obtaining the localcontent, at least a portion of the local content request to enable thelocal exchange point to provide the local content, as discussedelsewhere herein.

As shown by reference numeral 530, process 500 may include receiving,during the VPN connection, a remote content request requesting remotecontent. For instance, the VPN server may utilize the communicationinterface (e.g., communication interface 770) and the associated memoryand/or processor to receive, during the VPN connection, a remote contentrequest requesting remote content, as discussed elsewhere herein.

As shown by reference numeral 540, process 500 may include receiving,during the VPN connection, a remote content request requesting remotecontent. For instance, the VPN server may utilize the communicationinterface (e.g., communication interface 770) and the associated memoryand/or processor to transmit, to a remote exchange point that is capableof obtaining the remote content, at least a portion of the remotecontent request to enable the remote exchange point to provide theremote content, as discussed elsewhere herein.

Process 500 may include additional aspects, such as any single aspect orany combination of aspects described below and/or in connection with oneor more other processes described elsewhere herein.

In a first aspect, in process 500, the local content request and theremote content request are received substantially simultaneously.

In a second aspect, alone or in combination with the first aspect,process 500 may include receiving, prior to establishment of the VPNconnection, remote content information associated with the remotecontent.

In a third aspect, alone or in combination with the first through secondaspects, process 500 may include selecting, based at least in part onremote content information received prior to establishment of the VPNconnection, a domain name services (DNS) server to provide an accessinternet protocol (IP) address associated with the remote exchangepoint.

In a fourth aspect, alone or in combination with the first through thirdaspects, process 500 may include transmitting, to a remote domain nameservices (DNS) server, at least a portion of remote content informationreceived prior to establishment of the VPN connection; and receiving,from the remote DNS server, an access internet protocol (IP) addressassociated with the remote exchange point, wherein transmitting at leastthe portion of the remote content request includes transmitting at leastthe portion of the remote content request using the IP addressassociated with the remote exchange point.

In a fifth aspect, alone or in combination with the first through fourthaspects, process 500 may include receiving, from the local exchangepoint, the local content based at least in part on transmitting at leastthe portion of the local content request to the local exchange point;and transmitting the local content to a user device.

In a sixth aspect, alone or in combination with the first through fifthaspects, process 500 may include receiving, during the VPN connection, alocal content request for the local content; transmitting informationassociated with the local content request to a second exchange point;receiving the local content from the second exchange point; andtransmitting the local content to the user device.

Although FIG. 5 shows example blocks of the process, in some aspects,the process may include additional blocks, fewer blocks, differentblocks, or differently arranged blocks than those depicted in FIG. 5 .Additionally, or alternatively, two or more of the blocks of the processmay be performed in parallel.

As indicated above, FIG. 5 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 5 .

FIG. 6 is an illustration of an example process 600 associated withproviding a split-configuration VPN, according to various aspects of thepresent disclosure. In some aspects, the process 600 may be performed bya memory (e.g., memory 730) and/or a processor (e.g., processor 720,processing unit 110, etc.) associated with a VSP control infrastructure(e.g., VSP control infrastructure 104). As shown by reference numeral610, process 600 may include configuring a VPN server to receive, duringa VPN connection, a local content request requesting local content. Forinstance, the VSP control infrastructure may utilize an associatedmemory and/or a processor to configure a VPN server to receive, during aVPN connection, a local content request requesting local content, asdiscussed elsewhere herein.

As shown by reference numeral 620, process 600 may include configuringthe VPN server to transmit, to a local exchange point that is capable ofobtaining the local content, at least a portion of the local contentrequest to enable the local exchange point to provide the local content.For instance, the VPN server may utilize the associated memory and/orprocessor to configure the VPN server to transmit, to a local exchangepoint that is capable of obtaining the local content, at least a portionof the local content request to enable the local exchange point toprovide the local content, as discussed elsewhere herein.

As shown by reference numeral 630, process 600 may include configuringthe VPN server to receive, during the VPN connection, a remote contentrequest requesting remote content. For instance, the VPN server mayutilize the associated memory and/or processor to configure configuringthe VPN server to receive, during the VPN connection, a remote contentrequest requesting remote content, as discussed elsewhere herein.

As shown by reference numeral 640, process 600 may include configuringthe VPN server to transmit, to a remote exchange point that is capableof obtaining the remote content, at least a portion of the remotecontent request to enable the remote exchange point to provide theremote content. For instance, the VPN server may utilize the associatedmemory and/or processor to configure the VPN server to transmit, to aremote exchange point that is capable of obtaining the remote content,at least a portion of the remote content request to enable the remoteexchange point to provide the remote content, as discussed elsewhereherein.

Process 600 may include additional aspects, such as any single aspect orany combination of aspects described below and/or in connection with oneor more other processes described elsewhere herein.

In a first aspect, process 600 includes configuring the VPN server toreceive the local content request and the remote content requestsubstantially simultaneously.

In a second aspect, alone or in combination with the first aspect,process 600 includes configuring the VPN server to receive, prior toestablishment of the VPN connection, remote content informationassociated with the remote content.

In a third aspect, alone or in combination with the first through secondaspects, process 600 includes configuring the VPN server to select,based at least in part on remote content information received prior toestablishment of the VPN connection, a domain name services (DNS) serverto provide an access internet protocol (IP) address associated with theremote exchange point.

In a fourth aspect, alone or in combination with the first through thirdaspects, process 600 includes configuring the VPN server to transmit, toa remote domain name services (DNS) server, at least a portion of remotecontent information received prior to establishment of the VPNconnection; and configuring the VPN server to receive, from the remoteDNS server, an access internet protocol (IP) address associated with theremote exchange point, wherein configuring the VPN server to transmit atleast the portion of the remote content request includes configuring theVPN server to transmit at least the portion of the remote contentrequest using the IP address associated with the remote exchange point.

In a fifth aspect, alone or in combination with the first through fourthaspects, process 600 includes configuring the VPN server to receive,from the remote exchange point, the remote content based at least inpart on transmitting at least the portion of the remote content requestto the remote exchange point; and configuring the VPN server to transmitthe remote content to a user device.

In a sixth aspect, alone or in combination with the first through fifthaspects, process 600 includes configuring the VPN server to receive,from the local exchange point, the local content based at least in parton transmitting at least the portion of the local content request to thelocal exchange point; and configuring the VPN server to transmit thelocal content to a user device.

Although FIG. 6 shows example blocks of the process, in some aspects,the process may include additional blocks, fewer blocks, differentblocks, or differently arranged blocks than those depicted in FIG. 6 .Additionally, or alternatively, two or more of the blocks of the processmay be performed in parallel.

As indicated above, FIG. 6 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 6 .

FIG. 7 is an illustration of example devices 700, according to variousaspects of the present disclosure. In some aspects, the example devices700 may form part of or implement the systems, servers, environments,infrastructures, components, devices, or the like described elsewhereherein (e.g., VSP control infrastructure, VPN server, etc.). The exampledevices 700 may include a universal bus 710 communicatively coupling aprocessor 720, a memory 730, a storage component 740, an input component750, an output component 760, and a communication interface 770.

Bus 710 may include a component that permits communication amongmultiple components of a device 700. Processor 720 may be implemented inhardware, firmware, and/or a combination of hardware and software.Processor 720 may take the form of a central processing unit (CPU), agraphics processing unit (GPU), an accelerated processing unit (APU), amicroprocessor, a microcontroller, a digital signal processor (DSP), afield-programmable gate array (FPGA), an application-specific integratedcircuit (ASIC), or another type of processing component. In someaspects, processor 720 may include one or more processors capable ofbeing programmed to perform a function. Memory 730 may include arandom-access memory (RAM), a read only memory (ROM), and/or anothertype of dynamic or static storage device (e.g., a flash memory, amagnetic memory, and/or an optical memory) that stores informationand/or instructions for use by processor 720.

Storage component 740 may store information and/or software related tothe operation and use of a device 700. For example, storage component740 may include a hard disk (e.g., a magnetic disk, an optical disk,and/or a magneto-optic disk), a solid-state drive (SSD), a compact disc(CD), a digital versatile disc (DVD), a floppy disk, a cartridge, amagnetic tape, and/or another type of non-transitory computer-readablemedium, along with a corresponding drive.

Input component 750 may include a component that permits a device 700 toreceive information, such as via user input (e.g., a touch screendisplay, a keyboard, a keypad, a mouse, a button, a switch, and/or amicrophone). Additionally, or alternatively, input component 750 mayinclude a component for determining location (e.g., a global positioningsystem (GPS) component) and/or a sensor (e.g., an accelerometer, agyroscope, an actuator, another type of positional or environmentalsensor, and/or the like). Output component 760 may include a componentthat provides output information from device 700 (via, for example, adisplay, a speaker, a haptic feedback component, an audio or visualindicator, and/or the like).

Communication interface 770 may include a transceiver-like component(e.g., a transceiver, a separate receiver, a separate transmitter,and/or the like) that enables a device 700 to communicate with otherdevices, such as via a wired connection, a wireless connection, or acombination of wired and wireless connections. Communication interface770 may permit device 700 to receive information from another deviceand/or provide information to another device. For example, communicationinterface 770 may include an Ethernet interface, an optical interface, acoaxial interface, an infrared interface, a radio frequency (RF)interface, a universal serial bus (USB) interface, a Wi-Fi interface, acellular network interface, and/or the like.

A device 700 may perform one or more processes described elsewhereherein. A device 700 may perform these processes based on processor 720executing software instructions stored by a non-transitorycomputer-readable medium, such as memory 730 and/or storage component740. As used herein, the term “computer-readable medium” may refer to anon-transitory memory device. A memory device may include memory spacewithin a single physical storage device or memory space spread acrossmultiple physical storage devices.

Software instructions may be read into memory 730 and/or storagecomponent 740 from another computer-readable medium or from anotherdevice via communication interface 770. When executed, softwareinstructions stored in memory 730 and/or storage component 740 may causeprocessor 720 to perform one or more processes described elsewhereherein. Additionally, or alternatively, hardware circuitry may be usedin place of or in combination with software instructions to perform oneor more processes described elsewhere herein. Thus, implementationsdescribed herein are not limited to any specific combination of hardwarecircuitry and software.

The quantity and arrangement of components shown in FIG. 7 are providedas an example. In practice, a device 700 may include additionalcomponents, fewer components, different components, or differentlyarranged components than those shown in FIG. 7 . Additionally, oralternatively, a set of components (e.g., one or more components) of adevice 700 may perform one or more functions described as beingperformed by another set of components of a device 700.

As indicated above, FIG. 7 is provided as an example. Other examples maydiffer from what is described with regard to FIG. 7 .

FIG. 8 is a block diagram of an example of a computing device 800. Thecomputing device 800 may implement, execute, or perform, one or moreaspects of the methods and techniques described herein. The computingdevice 800 includes a data interface 810, a processor 820, memory 830, apower component 840, a user interface 850, and a bus 860 (collectively,components of the computing device 800). Although shown as a distinctunit, one or more of the components of the computing device 800 may beintegrated into respective distinct physical units. For example, theprocessor 820 may be integrated in a first physical unit and the userinterface 850 may be integrated in a second physical unit. The computingdevice 800 may include aspects or components not expressly shown in FIG.8 , such as an enclosure or one or more sensors. The computing device800 may be similar to the devices 700 shown in FIG. 7 , except as isdescribed herein or as is otherwise clear from context.

In some implementations, the computing device 800 is a stationarydevice, such as a personal computer (PC), a server, a workstation, aminicomputer, or a mainframe computer. In some implementations, thecomputing device 800 is a mobile device, such as a mobile telephone, apersonal digital assistant (PDA), a laptop, or a tablet computer.

The data interface 810 communicates, such as transmits, receives, orexchanges, data via one or more wired, or wireless, electroniccommunication mediums, such as a radio frequency (RF) communicationmedium, an ultraviolet (UV) communication medium, a visible lightcommunication medium, a fiber optic communication medium, a wirelinecommunication medium, or a combination thereof. For example, the datainterface 810 may include, or may be, a transceiver. Although not shownseparately in FIG. 8 , the data interface 810 may include, or may beoperatively coupled with, an antenna for wireless electroniccommunication. Although not shown separately in FIG. 8 , the datainterface 810 may include, or may be operatively coupled with, a wiredelectronic communication port, such as an Ethernet port, a serial port,or another wired port, that may interface with, or may be operativelycoupled to, a wired electronic communication medium. In someimplementations, the data interface 810 may be or may include a networkinterface card (NIC) or unit, a universal serial bus (USB), a SmallComputer System Interface (SCSI), a Peripheral Component Interconnect(PCI), a near field communication (NFC) device, card, chip, or circuit,or another component for electronic data communication between thecomputing device 800, or one or more of the components thereof, and oneor more external electronic or computing devices. Although shown as oneunit in FIG. 8 , the data interface 810 may include multiple physicalcomponents, such as a wired data interface and a wireless datainterface.

For example, the computing device 800 may electronically communicate,such as transmit, receive, or exchange computer accessible data, withone or more other computing devices via one or more wired or wirelesscommunication links, or connections, such as via a network, using thedata interface 810, which may include using one or more electroniccommunication protocols, which may be network protocols, such asEthernet, Transmission Control Protocol/Internet Protocol (TCP/IP), userdatagram protocol (UDP), power line communication (PLC), infrared, ultraviolet (UV), visible light, fiber optic, wire line, general packet radioservice (GPRS), Global System for Mobile communications (GSM),code-division multiple access (CDMA), Long-Term Evolution (LTE),Universal Mobile Telecommunications System (UMTS), Institute ofElectrical and Electronics Engineers (IEEE) standardized protocols, orother suitable protocols.

The processor 820 is a device, a combination of devices, or a system ofconnected devices, capable of manipulating or processing an electronic,computer accessible, signal, or other data, such as an opticalprocessor, a quantum processor, a molecular processor, or a combinationthereof.

In some implementations, the processor 820 is implemented as a centralprocessing unit (CPU), such as a microprocessor. In someimplementations, the processor 820 is implemented as one or more specialpurpose processors, one or more graphics processing units, one or moredigital signal processors, one or more microprocessors, one or morecontrollers, one or more microcontrollers, one or more integratedcircuits, one or more Application Specific Integrated Circuits, one ormore Field Programmable Gate Arrays, one or more programmable logicarrays, one or more programmable logic controllers, firmware, one ormore state machines, or a combination thereof.

The processor 820 includes one or more processing units. A processingunit may include one or more processing cores. The computing device 800may include multiple physical or virtual processing units (collectively,the processor 820), which may be interconnected, such as via wired, orhardwired, connections, via wireless connections, or via a combinationof wired and wireless connections. In some implementations, theprocessor 820 is implemented in a distributed configuration includingmultiple physical devices or units that may be coupled directly oracross a network. The processor 820 includes internal memory (notexpressly shown), such as a cache, a buffer, a register, or acombination thereof, for internal storage of data, such as operativedata, instructions, or both. For example, the processor 820 may readdata from the memory 830 into the internal memory (not shown) forprocessing.

The memory 830 is a non-transitory computer-usable or computer-readablemedium, implemented as a tangible device or component of a device. Thememory 830 contains, stores, communicates, transports, or a combinationthereof, data, such as operative data, instructions, or both. Forexample, the memory 830 stores an operating system of the computingdevice 800, or a portion thereof. The memory 830 contains, stores,communicates, transports, or a combination thereof, data, such asoperative data, instructions, or both associated with implementing, orperforming, the methods and techniques, or portions or aspects thereof,described herein. For example, the non-transitory computer-usable orcomputer-readable medium may be implemented as a solid-state drive, amemory card, removable media, a read-only memory (ROM), a random-accessmemory (RAM), any type of disk including a hard disk, a floppy disk, anoptical disk, a magnetic or optical card, an application-specificintegrated circuits (ASICs), or another type of non-transitory mediasuitable for storing electronic data, or a combination thereof. Thememory 830 may include non-volatile memory, such as a disk drive, oranother form of non-volatile memory capable of persistent electronicdata storage, such as in the absence of an active power supply. Thememory 830 may include, or may be implemented as, one or more physicalor logical units.

The memory 830 stores executable instructions or data, such asapplication data, an operating system, or a combination thereof, foraccess, such as read access, write access, or both, by the othercomponents of the computing device 800, such as by the processor 820.The executable instructions may be organized as program modules oralgorithms, functional programs, codes, code segments, or combinationsthereof to perform one or more aspects, features, or elements of themethods and techniques described herein. The application data mayinclude, for example, user files, database catalogs, configurationinformation, or a combination thereof. The operating system may be, forexample, a desktop or laptop operating system; an operating system for amobile device, such as a smartphone or tablet device; or an operatingsystem for a large device, such as a mainframe computer. For example,the memory 830 may be implemented as, or may include, one or moredynamic random-access memory (DRAM) modules, such as a Double Data RateSynchronous Dynamic Random-Access Memory module, Phase-Change Memory(PCM), flash memory, or a solid-state drive.

The power component 840 obtains, stores, or both, power, or energy, usedby the components of the computing device 800 to operate. The powercomponent 840 may be implemented as a general-purposealternating-current (AC) electric power supply, or as a power supplyinterface, such as an interface to a household power source or otherexternal power distribution system. In some implementations, the powercomponent 840 may be implemented as a single use battery or arechargeable battery such that the computing device 800 operates, orpartially operates, independently of an external power distributionsystem. For example, the power component 840 may include a wired powersource; one or more dry cell batteries, such as nickel-cadmium (NiCad),nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion);solar cells; fuel cells; or any other device, or combination of devices,capable of powering the computing device 800.

The user interface 850 includes one or more units or devices forinterfacing with an operator of the computing device 800, such as ahuman user. In some implementations, the user interface 850 obtains,receives, captures, detects, or otherwise accesses, data representinguser input to the computing device, such as via physical interactionwith the computing device 800. In some implementations, the userinterface 850 outputs, presents, displays, or otherwise makes available,information, such as to an operator of the computing device 800, such asa human user.

The user interface 850 may be implemented as, or may include, a virtualor physical keypad, a touchpad, a display, such as a liquid crystaldisplay (LCD), a cathode-ray tube (CRT), a light emitting diode (LED)display, an organic light emitting diode (OLED) display, anactive-matrix organic light emitting diode (AMOLED), a touch display, aspeaker, a microphone, a video camera, a sensor, a printer, or anycombination thereof. In some implementations, a physical user interface850 may be omitted, or absent, from the computing device 800.

The bus 860 distributes or transports data, power, or both among thecomponents of the computing device 800 such that the components of thecomputing device are operatively connected. Although the bus 860 isshown as one component in FIG. 8 , the computing device 800 may includemultiple busses, which may be connected, such as via bridges,controllers, or adapters. For example, the bus 860 may be implementedas, or may include, a data bus and a power bus. The execution, orperformance, of instructions, programs, code, applications, or the like,so as to perform the methods and techniques described herein, or aspectsor portions thereof, may include controlling, such as by sendingelectronic signals to, receiving electronic signals from, or both, theother components of the computing device 800.

Although not shown separately in FIG. 8 , data interface 810, the powercomponent 840, or the user interface 850 may include internal memory,such as an internal buffer or register.

Although an example of a configuration of the computing device 800 isshown in FIG. 8 , other configurations may be used. One or more of thecomponents of the computing device 800 shown in FIG. 8 may be omitted,or absent, from the computing device 800 or may be combined orintegrated. For example, the memory 830, or a portion thereof, and theprocessor 820 may be combined, such as by using a system on a chipdesign.

FIG. 9 is a diagram of a computing and communications system 900. Thecomputing and communications system 900 includes a first network 910, anaccess point 920, a first computing and communications device 930, asecond network 940, and a third network 950. The second network 940includes a second computing and communications device 941 and a thirdcomputing and communications device 942. The third network 950 includesa fourth computing and communications device 951, a fifth computing andcommunications device 952, and a sixth computing and communicationsdevice 953. Other configurations, including fewer or more computing andcommunications devices, fewer or more networks, and fewer or more accesspoints, may be used. The computing and communications system 900 may besimilar to the system 100 shown in FIG. 1 or the system 200 shown inFIG. 2 , except as is described herein or as is otherwise clear fromcontext.

One or more of the networks 910, 940, 950 may be, or may include, alocal area network (LAN), wide area network (WAN), virtual privatenetwork (VPN), a mobile or cellular telephone network, the Internet, orany other means of electronic communication. The networks 910, 940, 950respectively transmit, receive, convey, carry, or exchange wired orwireless electronic communications using one or more communicationsprotocols, or combinations of communications protocols, the transmissioncontrol protocol (TCP), the user datagram protocol (UDP), the internetprotocol (IP), the real-time transport protocol (RTP), the HyperTextTransport Protocol (HTTP), or a combination thereof. For example, arespective network 910, 940, 950, or respective portions thereof, maybe, or may include a circuit-switched network, or a packet-switchednetwork wherein the protocol is a packet-based protocol. A packet is adata structure, such as a data structure that includes a header, whichmay contain control data or ‘meta’ data describing the packet, and abody, or payload, which may contain the substantive data conveyed by thepacket.

The access point 920 may be implemented as, or may include, a basestation, a base transceiver station (BTS), a Node-B, an enhanced Node-B(eNode-B), a Home Node-B (HNode-B), a wireless router, a wired router, ahub, a relay, a switch, a bridge, or any similar wired or wirelessdevice. Although the access point 920 is shown as a single unit, anaccess point can include any number of interconnected elements. Althoughone access point 920 is shown, fewer or more access points may be used.The access point 920 may communicate with other communicating devicesvia wired or wireless electronic communications links or via a sequenceof such links.

As shown, the access point 920 communicates via a first communicationslink 960 with the first computing and communications device 930.Although the first communications link 960 is shown as wireless, thefirst communications link 960 may be implemented as, or may include, oneor more wired or wireless electronic communications links or a sequenceof such links, which may include parallel communications links formultipath communications.

As shown, the access point 920 communicates via a second communicationslink 961 with the first network 910. Although the second communicationslink 961 is shown as wired, the second communications link 961 may beimplemented as, or may include, one or more wired or wireless electroniccommunications links or a sequence of such links, which may includeparallel communications links for multipath communications.

As shown, the first network 910 communicates with the second network 940via a third communications link 962. Although the third communicationslink 962 is shown as wired, the third communications link 962 may beimplemented as, or may include, one or more wired or wireless electroniccommunications links or a sequence of such links, which may includeparallel communications links for multipath communications.

As shown, the first network 910 communicates with the third network 950via a fourth communications link 963. Although the fourth communicationslink 963 is shown as wired, the fourth communications link 963 may beimplemented as, or may include, one or more wired or wireless electroniccommunications links or a sequence of such links, which may includeparallel communications links for multipath communications.

The computing and communications devices 930, 941, 942, 951, 952, 953are, respectively, computing devices, such as the computing device 800shown in FIG. 8 . For example, the first computing and communicationsdevice 930 may be a user device, such as a mobile computing device or asmartphone, the second computing and communications device 941 may be auser device, such as a laptop, the third computing and communicationsdevice 942 may be a user device, such as a desktop, the fourth computingand communications device 951 may be a server, such as a databaseserver, the fifth computing and communications device 953 may be aserver, such as a cluster or a mainframe, and the sixth computing andcommunications device 953 may be a server, such as a web server.

The computing and communications devices 930, 941, 942, 951, 952, 953communicate, or exchange data, such as voice communications, audiocommunications, data communications, video communications, messagingcommunications, broadcast communications, or a combination thereof, withone or more of the other computing and communications devices 930, 941,942, 951, 952, 953 respectively using one or more of the networks 910,940, 950, which may include communicating using the access point 920,via one or more of the communication links 960, 961, 962, 963.

For example, the first computing and communications device 930 maycommunicate with the second computing and communications device 941, thethird computing and communications device 942, or both, via the firstcommunications link 960, the access point 920, the second communicationslink 961, the network 910, the third communications link 962, and thesecond network 940. The first computing and communications device 930may communicate with one or more of the third computing andcommunications device 951, the fourth computing and communicationsdevice 952, the fifth computing and communications device 953, via thefirst communications link 960, the access point 920, the secondcommunications link 961, the network 910, the fourth communications link963, and the third network 950.

For simplicity and clarity, the sequence of communications links, accesspoints, networks, and other communications devices between a sendingcommunicating device and a receiving communicating device may bereferred to herein as a communications path. For example, the firstcomputing and communications device 930 may send data to the secondcomputing and communications device 941 via a first communications path,or via a combination of communications paths including the firstcommunications path, and the second computing and communications device941 may send data to the first computing and communications device 930via the first communications path, via a second communications path, orvia a combination of communications paths, which may include the firstcommunications path.

The first computing and communications device 930 includes, such asexecutes, performs, or operates, one or more applications, or services,931. The second computing and communications device 941 includes, suchas executes, performs, or operates, one or more applications, orservices, 941.2. The third computing and communications device 942includes, such as executes, performs, or operates, one or moreapplications, or services, 942.2. The fourth computing andcommunications device 951 includes, such as stores, hosts, executes,performs, or operates, one or more documents, applications, or services,951.2. The fifth computing and communications device 952 includes, suchas stores, hosts, executes, performs, or operates, one or moredocuments, applications, or services, 952.2. The sixth computing andcommunications device 953 includes, such as stores, hosts, executes,performs, or operates, one or more documents, applications, or services,953.2.

In some implementations, one or more of the computing and communicationsdevices 930, 941, 942, 951, 952, 953 may communicate with one or moreother computing and communications devices 930, 941, 942, 951, 952, 953,or with one or more of the networks 940, 950, via a virtual privatenetwork. For example, the second computing and communications device 941is shown as communicating with the third network 950, and therefore withone or more of the computing and communications devices 951, 952, 953 inthe third network 950, via a virtual private network 970, which is shownusing a broken line to indicate that the virtual private network 970uses the first network 910, the third communications link 962, and thethird communications link 963.

In some implementations, two or more of the computing and communicationsdevices 930, 941, 942, 951, 952, 953 may be in a distributed, orclustered, configuration. For example, the third computing andcommunications device 951, the fourth computing and communicationsdevice 952, and the fifth computing and communications device 953 may,respectively, be elements, or nodes, in a distributed configuration.

In some implementations, one or more of the computing and communicationsdevices 930, 941, 942, 951, 952, 953 may be a virtual device. Forexample, the third computing and communications device 951, the fourthcomputing and communications device 952, and the fifth computing andcommunications device 953 may, respectively, be virtual devicesoperating on shared physical resources.

FIG. 10 is a block diagram of another example of a computing andcommunications system 1000 for domain name system configuration duringvirtual private network connection. The computing and communicationssystem 1000 shown in FIG. 10 is similar to the computing andcommunications system 900 shown in FIG. 9 , the system shown in FIG. 1 ,the system 200 shown in FIG. 2 , except as is described herein or as isotherwise clear from context.

The computing and communications system 1000 for domain name systemconfiguration during virtual private network connection shown in FIG. 10includes a user device 1010, a virtual private network server 1020, aprimary domain name system server 1030, a secondary domain name systemserver 1040, a first exchange point 1050, and a second exchange point1060.

The user device 1010 may be one or more computing devices, such as oneor more of the computing device 800 shown in FIG. 8 , one or more of thecomputing and communications device 930, 941, 942, 951, 952, 953 shownin FIG. 9 , the user device 102 shown in FIG. 1 , the user device 102shown in FIG. 3 , or the device 700 shown in FIG. 7 , except as isdescribed herein or as is otherwise clear from context. The user device1010 may be similar to the user device 102 shown in FIG. 2 , except asis described herein or as is otherwise clear from context.

The virtual private network server 1020 may be one or more computingdevices, such as one or more of the computing device 800 shown in FIG. 8, one or more of the computing and communications device 930, 941, 942,951, 952, 953 shown in FIG. 9 , the virtual private network serviceprovider control infrastructure 104 shown in FIG. 1 , one or morecomponents 106, 108, 110, 116, 120, of the virtual private networkservice provider control infrastructure 104 shown in FIG. 1 , thevirtual private network server 120 shown in FIG. 2 , or the device 700shown in FIG. 7 , except as is described herein or as is otherwise clearfrom context. The virtual private network server 1020 may be, or mayinclude, a virtual private network entry server. The virtual privatenetwork server 1020 may be similar to the virtual private network server120 shown in FIG. 3 , except as is described herein or as is otherwiseclear from context.

The primary domain name system server 1030 may be one or more computingdevices, such as one or more of the computing device 800 shown in FIG. 8, one or more of the computing and communications device 930, 941, 942,951, 952, 953 shown in FIG. 9 , or the device 700 shown in FIG. 7 ,except as is described herein or as is otherwise clear from context. Theprimary domain name system server 1030 may be similar to the defaultdomain name system server 210 or the remote domain name system server220 shown in FIG. 2 , except as is described herein or as is otherwiseclear from context.

The secondary domain name system server 1040 may be one or morecomputing devices, such as one or more of the computing device 800 shownin FIG. 8 , one or more of the computing and communications device 930,941, 942, 951, 952, 953 shown in FIG. 9 , or the device 700 shown inFIG. 7 , except as is described herein or as is otherwise clear fromcontext. The secondary domain name system server 1040 may be similar tothe default domain name system server 210 or the remote domain namesystem server 220 shown in FIG. 2 , except as is described herein or asis otherwise clear from context.

The first exchange point 1050 may be one or more computing devices, suchas one or more of the computing device 800 shown in FIG. 8 , one or moreof the computing and communications device 930, 941, 942, 951, 952, 953shown in FIG. 9 , or the device 700 shown in FIG. 7 , except as isdescribed herein or as is otherwise clear from context. The firstexchange point 1050 may be similar to one or more of the virtual privatenetwork servers 120 shown in FIG. 1 , or one or more of the exchangepoints 230, 240 shown in FIG., except as is described herein or as isotherwise clear from context.

The second exchange point 1060 may be one or more computing devices,such as one or more of the computing device 800 shown in FIG. 8 , one ormore of the computing and communications device 930, 941, 942, 951, 952,953 shown in FIG. 9 , or the device 700 shown in FIG. 7 , except as isdescribed herein or as is otherwise clear from context. The secondexchange point 1060 may be similar to one or more of the virtual privatenetwork servers 120 shown in FIG. 1 , or one or more of the exchangepoints 230, 240 shown in FIG., except as is described herein or as isotherwise clear from context.

The user device 1010 may establish, initiate, or obtain, and use, orcommunicate, such as send, receive, or both, data, such as protocol dataunits, via, a virtual private network tunnel 1070 (VPN connection) toexchange electronic communications with the virtual private networkserver 1020, one or more of the exchange points 1050, 1060, one or moreof the domain name system servers 1030, 1040, or one or more externaldevices or system (not shown). The virtual private network tunnel 1070may be similar to the VPN connection shown in FIG. 2 , except as isdescribed herein or as is otherwise clear from context.

The exchange points 1050, 1060 may be respective virtual private networkexit nodes, such that data transmitted by the user device 1010, via thetunnel 1070, may be received by the virtual private network server 1020,or a virtual private network entry server thereof, the virtual privatenetwork server 1020, or the virtual private network entry serverthereof, may transmit the data to one of the exchange points 1050, 1060,the respective exchange point 1050, 1060, may receive the data, and therespective exchange point 1050, 1060, may transmit the data to anexternal server, system, or network, which may be a public network.

The user device 1010, the virtual private network server 1020, or acombination of the user device 1010 and the virtual private networkserver 1020 may use one or more of the domain name system servers 1030,1040 to obtain an internet protocol address, or other electroniccommunication routing or delivery information.

The user device 1010, the virtual private network server 1020, or acombination of the user device 1010 and the virtual private networkserver 1020 may use one or more of the exchange points 1050, 1060 toobtain data, such as content, from the external device or system (notshown). An example of establishing the virtual private network tunnel1070 and using the virtual private network tunnel 1070 to obtain datafrom the external server or system is shown in FIGS. 11 and 12 .

FIG. 11 is a flowchart of an example of domain name system configurationduring virtual private network connection 1100. Domain name systemconfiguration during virtual private network connection 1100, or one ormore portions thereof, may be implemented by one or more computingdevices, such as one or more of the computing device 800 shown in FIG. 8, one or more of the computing and communications device 930, 941, 942,951, 952, 953 shown in FIG. 9 , the user device 102 shown in FIG. 1 ,the user device 102 shown in FIG. 2 , the user device 102 shown in FIG.3 , or the device 700 shown in FIG. 7 , or by a system, such as thenetwork 950 shown in FIG. 9 , including one or more computing devices.

Domain name system configuration during virtual private networkconnection 1100 includes establishing a virtual private network tunnel1110, requesting content 1120, receiving domain name systemreconfiguration data 1130, reconfiguring domain name systemconfiguration 1140, and receiving content 1150.

A client device, such as the user device 1010 shown in FIG. 10 , mayinitiate, establish, or obtain the virtual private network tunnel 1110between the client device and a virtual private network service providerinfrastructure device, such as a virtual private network entry server,such as the virtual private network server 1020 shown in FIG. 10 .

Obtaining, initiating, or establishing, a virtual private network tunnel1110 may include authentication (not shown), such as in response toobtaining user input data at the client device indicating a request toauthenticate with the virtual private network service providerinfrastructure system. The authentication may be similar to theauthentication described with respect to FIG. 2 , except as is describedherein or as is otherwise clear from context. For example, a clientdevice, such as the user device 1010 shown in FIG. 10 , or a componentthereof, such as virtual private network component, may send, transmit,or otherwise make available, authentication data, such as credentials,for authenticating the user device to a component, such as anauthentication server, of a virtual private network service providercontrol infrastructure, such as the virtual private network serviceprovider control infrastructure 104 shown in FIG. 1 . In someimplementations, authentication may include the client device obtainingan IP address for the component of the virtual private network serviceprovider control infrastructure, from a domain name system server, suchas a local domain name system server, such as a domain name systemserver associated with, or operated by, an Internet service providerthat provides Internet service to the client device, wherein the clientdevice is configured to use the local domain name system server fordomain name resolution. The virtual private network service providercontrol infrastructure component may authenticate, or validate, theauthentication data and may identify the client device, or the virtualprivate network component thereof, as authenticated.

Although not shown separately in FIG. 11 , establishing the virtualprivate network tunnel 1110 may include the client device obtaining,receiving, or otherwise accessing, available virtual private networkserver data, such as data identifying, such as by domain name, URL, IPaddress, or a combination thereof, virtual private network serversavailable for establishing and operating a virtual private networktunnel between the client device and the virtual private network serviceprovider infrastructure, or network. The virtual private network serveravailability data may include one or more IP addresses for one or moreentry virtual private network servers available for establishing andoperating a virtual private network tunnel between the client device andthe virtual private network service provider infrastructure, or network.

Establishing the virtual private network tunnel 1110 may include theuser device identifying a virtual private network entry server for thevirtual private network tunnel. For example, the virtual private networkentry server may be identified in response to obtaining input data, suchas in response to input, such as user input, obtained at the clientdevice, selecting, or otherwise indicating, the virtual private networkentry server. The input data identifying the virtual private networkentry server may include attribute data defining or describing one ormore attributes for establishing, or using, the virtual private networktunnel. For example, the attribute data may include attribute datadefining or describing an attribute indicating a location of the entryvirtual private network server relative to the location (geographiclocation) of the client device. In another example, the attribute datamay include attribute data defining or describing an attributeindicating a virtual private network protocol compatible with the entryvirtual private network server. In another example, the attribute datamay include attribute data defining or describing an attributeindicating the peak, or highest, available bandwidth of the entryvirtual private network server. In another example, the attribute datamay include attribute data defining or describing an attributeindicating a location (geographic location) of the entry virtual privatenetwork server relative to an international Internet exchange hub. Inanother example, the attribute data may include attribute data definingor describing an attribute indicating one or more virtual privatenetwork service features, such as ad blocking or malware blocking,available via the entry virtual private network server.

Although not shown separately in FIG. 11 , establishing the virtualprivate network tunnel 1110 may include the client device obtaining,receiving, or otherwise accessing, the virtual private network entryserver data, or a portion thereof, from a component of the virtualprivate network service provider infrastructure system, such as from theapplication programming interface 106, 110 shown in FIG. 1 . The virtualprivate network entry server may be an optimal available virtual privatenetwork entry server identified based on the location (geographiclocation) of the client device.

The client device establishes, initiates, instantiates, or obtains, thevirtual private network tunnel with the virtual private network entryserver. Establishing the virtual private network tunnel 1110 may includesending, transmitting, or otherwise making available, data, such as oneor more protocol data units, indicating a request to establish thevirtual private network tunnel between the client device and the virtualprivate network entry server. In some implementations, the client devicemay include the attribute data, or a portion thereof, in the request toestablish the virtual private network tunnel.

The client device configures one or more domain name system servers touse for the virtual private network tunnel 1112, which includesconfiguring a domain name system server as an operative domain namesystem server for the virtual private network tunnel. For example, theclient device may configure a primary domain name system server, such asthe primary domain name system server 1030 shown in FIG. 10 , asecondary domain name system server, such as the secondary domain namesystem server 1040 shown in FIG. 10 , or both for use with the virtualprivate network tunnel. The configured domain name system servers aredomain name system servers accessible by the virtual private networkentry server.

The client device may include data identifying, such as by domain nameor by IP address, one or more domain name system servers, such as aprimary domain name system server, such as the primary domain namesystem server 1030 shown in FIG. 10 , a secondary domain name systemserver, such as the secondary domain name system server 1040 shown inFIG. 10 , or both, in the request to establish the virtual privatenetwork tunnel.

The primary domain name system server may have, such as store, a definedlist, or other data structure, of available virtual private network exitservers, one or more respective defined lists, or other data structures,of external devices, systems, or domains accessible via the respectivevirtual private network exit servers available, or accessible, via theprimary domain name system server. The secondary domain name systemserver may have, such as store, a defined list, or other data structure,of available virtual private network exit servers, one or morerespective defined lists, or other data structures, of external devices,systems, or domains accessible via the respective virtual privatenetwork exit servers available, or accessible, via the secondary domainname system server.

The virtual private network exit servers available, or accessible, viathe primary domain name system server may differ, or partially differ,from the virtual private network exit servers available, or accessible,via the secondary domain name system server. The external devices,systems, or domains available, or accessible, via the primary domainname system server may differ, or partially differ, from the externaldevices, systems, or domains available, or accessible, via the secondarydomain name system server. For example, the primary domain name systemserver may be located (geographic location) relatively near the clientdevice, which may be in a geofenced location such that devices, systems,or IP addresses located in some areas (geographic areas) may beunavailable or inaccessible to the primary domain name system server. Insome implementations, one or more of the devices, systems, or IPaddresses unavailable or inaccessible to the primary domain name systemserver may be available or accessible to the secondary domain namesystem server.

The client device sends, transmits, or otherwise makes available, arequest for content 1120, such as by sending the request as one or moreprotocol data units, to the virtual private network entry server. Therequest for content identifies an external device, such as an externalserver, system, or domain, as a source for the content. For example, theclient device may send a request for content hosted by an externaldevice or system.

The virtual private network entry server receives, or otherwiseaccesses, the request for content. The virtual private network serviceprovider control infrastructure determines whether the requested contentis available, or accessible, from an external device, or server,accessible or available via the operative domain name system server forthe virtual private network tunnel, such as the primary domain namesystem server.

In some implementations, the requested content, or feature, may beaccessible or available from an external device that is accessible oravailable via the operative domain name system server for the virtualprivate network tunnel and reconfiguring the operative domain namesystem server 1140 may be omitted.

In some implementations, the requested content, or feature, may beinaccessible or unavailable from an external device that is accessibleor available via the operative domain name system server for the virtualprivate network tunnel, indicating that a virtual private network systemexit server for obtaining the content is unavailable using the operativedomain name system server, and the virtual private network entry servermay send, transmit, or otherwise make available, to the client device,one or more protocol data units, including a domain name systemreconfiguration message, wherein the domain name system reconfigurationmessage indicates a another domain name system server, wherein a virtualprivate network system exit server for obtaining the content isavailable using the other domain name system server.

Responsive to transmitting the request for content, and on the conditionthat the virtual private network entry server responds to the requestfor content by sending the domain name system reconfiguration message,the client device receives, obtains, or otherwise accesses, the domainname system reconfiguration message or data 1130.

Responsive to receiving the domain name system reconfiguration data, theclient device, or the virtual private network component of the clientdevice, configures, or reconfigures, the domain name system serverindicated in the domain name system reconfiguration data as theoperative domain name system server for the virtual private networktunnel 1140. The domain name system server configured at the clientdevice may be reconfigured for the current virtual private networktunnel, which may omit or exclude resetting or reestablishing thevirtual private network tunnel with the current virtual private networkentry server.

Subsequent to the client device reconfiguring the domain name systemserver 1140, the virtual private network entry server determines anoptimal virtual private network exit server for obtaining the requestedcontent from among one or more available and accessible virtual privatenetwork exit servers available and accessible using the operative domainname system server. For example, the request for content may indicate adomain name of the external system that hosts the requested content, andthe virtual private network entry server may obtain an IP address of anexternal server, corresponding to the domain name, from the operativedomain name system server.

The virtual private network entry server may send, transmit, orotherwise make available, the request for content to the identifiedvirtual private network exit server. The virtual private network exitserver may receive the request for content. The virtual private networkexit server may sent, transmit, or otherwise make available the requestfor content to the external server. Responsive to the request forcontent, the virtual private network exit server may obtain the contentfrom the external server. The virtual private network exit server maysend, transmit, or otherwise make available the content to the virtualprivate network entry server. The virtual private network entry servermay obtain the requested content from the virtual private network exitserver. The virtual private network entry server may send, transmit, orotherwise make available, the requested content to the client device viathe virtual private network tunnel.

The client device receives the requested content 1150 via the virtualprivate network tunnel from the virtual private network entry server.

As indicated by the broken directional line 1160 from receiving therequested content 1150 to requesting content 1120, requesting content1120, receiving domain name system reconfiguration data 1130,reconfiguring domain name system configuration 1140, and receivingcontent 1150, may be repeated.

FIG. 12 is a flowchart of an example of domain name system configurationduring virtual private network connection 1200 for a virtual privatenetwork service provider infrastructure system. Domain name systemconfiguration during virtual private network connection 1200, or one ormore portions thereof, may be implemented by one or more computingdevices, such as one or more of the computing device 800 shown in FIG. 8, one or more of the computing and communications device 930, 941, 942,951, 952, 953 shown in FIG. 9 , the user device 102 shown in FIG. 1 ,the user device 102 shown in FIG. 2 , the user device 102 shown in FIG.3 , or the device 700 shown in FIG. 7 , or by a system, such as thenetwork 950 shown in FIG. 9 , including one or more computing devices.

Domain name system configuration during virtual private networkconnection 1200 includes establishing a virtual private network tunnel1210, obtaining a content request 1220, generating domain name systemreconfiguration data 1230, reconfiguring domain name systemconfiguration 1240, obtaining the requested content 1250, and sendingthe requested content 1260.

A virtual private network service provider infrastructure device, suchas a virtual private network entry server, such as one of the virtualprivate network servers 120 shown in FIGS. 1-3 or the virtual privatenetwork server 1020 shown in FIG. 10 , may establish the virtual privatenetwork tunnel 1210 between the client device and a virtual privatenetwork service provide infrastructure device. For example, the virtualprivate network entry server may establish the virtual private networktunnel in response to receiving a request from the client device toestablish the virtual private network tunnel.

Obtaining, initiating, or establishing, a virtual private network tunnel1210 may include authentication (not shown), such as in response toreceiving a request to authenticate with the virtual private networkservice provider infrastructure system from the client device. Theauthentication may be similar to the authentication described withrespect to FIG. 2 or the authentication described with respect to FIG.11 , except as is described herein or as is otherwise clear fromcontext.

Although not shown separately in FIG. 11 , establishing the virtualprivate network tunnel 1210 may include the virtual private networkservice provide infrastructure system, or a component thereof, sending,transmitting, or otherwise making available, available virtual privatenetwork server data, such as data identifying, such as by domain name,URL, IP address, or a combination thereof, virtual private networkservers available for establishing and operating a virtual privatenetwork tunnel between the client device and the virtual private networkservice provider infrastructure, or network. The virtual private networkserver availability data may include one or more IP addresses for one ormore entry virtual private network servers available for establishingand operating a virtual private network tunnel between the client deviceand the virtual private network service provider infrastructure, ornetwork. Establishing the virtual private network tunnel 1210 mayinclude the user device identifying the virtual private network entryserver for the virtual private network tunnel.

Although not shown separately in FIG. 11 , establishing the virtualprivate network tunnel 1210 may include a component of the virtualprivate network service provider infrastructure system, such as from theapplication programming interface 106, 110 shown in FIG. 1 , sending,transmitting, or otherwise making available, the virtual private networkentry server data, or a portion thereof, to the client device. Thevirtual private network entry server may be an optimal available virtualprivate network entry server identified based on the location(geographic location) of the client device.

Establishing the virtual private network tunnel 1210 may includereceiving, obtaining, or otherwise accessing, from the client device,data, such as one or more protocol data units, indicating a request toestablish the virtual private network tunnel between the client deviceand the virtual private network entry server. In some implementations,the client device may include the attribute data, or a portion thereof,in the request to establish the virtual private network tunnel. In someimplementations, the data received by the virtual private network entryserver, from the client device, to establish the virtual private networktunnel, may include data identifying, such as by domain name or by IPaddress, one or more domain name system servers, such as a primarydomain name system server, such as the primary domain name system server1030 shown in FIG. 10 , a secondary domain name system server, such asthe secondary domain name system server 1040 shown in FIG. 10 , or both,for the virtual private network tunnel. The virtual private networkentry server may configure domain name system configuration data for thevirtual private network tunnel 1212 by associating the domain namesystem server, or servers, obtained from the client device, with thevirtual private network tunnel, the client device, or both.

The primary domain name system server may have, such as store, a definedlist, or other data structure, of available virtual private network exitservers, such as the exchange points 1050, 1060 shown in FIG. 10 , oneor more respective defined lists, or other data structures, of externaldevices, systems, or domains accessible via the respective virtualprivate network exit servers available, or accessible, via the primarydomain name system server. The secondary domain name system server mayhave, such as store, a defined list, or other data structure, ofavailable virtual private network exit servers, one or more respectivedefined lists, or other data structures, of external devices, systems,or domains accessible via the respective virtual private network exitservers available, or accessible, via the secondary domain name systemserver.

The virtual private network exit servers available, or accessible, viathe primary domain name system server may differ, or partially differ,from the virtual private network exit servers available, or accessible,via the secondary domain name system server. The external devices,systems, or domains available, or accessible, via the primary domainname system server may differ, or partially differ, from the externaldevices, systems, or domains available, or accessible, via the secondarydomain name system server. For example, the primary domain name systemserver may be located (geographic location) relatively near the clientdevice, which may be in a geofenced location such that devices, systems,or IP addresses located in some areas (geographic areas) may beunavailable or inaccessible to the primary domain name system server. Insome implementations, one or more of the devices, systems, or IPaddresses unavailable or inaccessible to the primary domain name systemserver may be available or accessible to the secondary domain namesystem server.

The virtual private network entry server receives, obtains, or otherwiseaccesses, a content request 1220, such as by receiving the request forcontent as one or more protocol data units, from the client device. Therequest for content identifies an external device, such as an externalserver, system, or domain, as a source for the content. For example, theclient device may send a request for content hosted by an externaldevice or system.

The virtual private network service provider control infrastructure, orone or more components thereof, determines whether the requested contentis available, or accessible, from an external device, or server,accessible or available via the operative domain name system server forthe virtual private network tunnel, such as the primary domain namesystem server.

In some implementations, the requested content, or feature, may beaccessible or available from an external device that is accessible oravailable via the operative domain name system server for the virtualprivate network tunnel and reconfiguring the operative domain namesystem server 1240 may be omitted. For example, the virtual privatenetwork entry server may obtain an IP address for an external serverhosting the requested content from the operative domain name systemserver configured for the virtual private network tunnel, may identify avirtual private network exit server for obtaining the content from theexternal server, and may determine that the requested content isavailable from the external server via the virtual private network exitserver.

In some implementations, the requested content, or feature, may beinaccessible or unavailable from an external device that is accessibleor available via the operative domain name system server for the virtualprivate network tunnel, indicating that a virtual private network systemexit server for obtaining the content is unavailable using the operativedomain name system server, and the virtual private network entry servermay send, transmit, or otherwise make available, to the client device,one or more protocol data units, including a domain name systemreconfiguration message, wherein the domain name system reconfigurationmessage indicates a another domain name system server, wherein a virtualprivate network system exit server for obtaining the content isavailable using the other domain name system server.

Responsive to determining that the requested content is unavailable fromthe external server accessible via the operative domain name systemserver, the virtual private network service provider controlinfrastructure, or one or more components thereof, identifies anotherdomain name system server, wherein the requested content is availablefrom an external server accessible using the other domain name systemserver. The virtual private network service provider controlinfrastructure, or one or more components thereof, generates the domainname system reconfiguration message 1230 indicating the other domainname system server to be configured at the client device for the virtualprivate network tunnel. The virtual private network service providercontrol infrastructure, or one or more components thereof, sends, viathe virtual private network entry server, the domain name systemreconfiguration message to the client device and configures, orassociates, the client device, the virtual private network tunnel, orboth, with the reconfigured domain name system server 1240.

Responsive to receiving the domain name system reconfiguration data, theclient device, or the virtual private network component of the clientdevice, configures, or reconfigures, the domain name system serverindicated in the domain name system reconfiguration data as theoperative domain name system server for the virtual private networktunnel. The domain name system server configured at the client devicemay be reconfigured for the current virtual private network tunnel,which may omit or exclude resetting or reestablishing the virtualprivate network tunnel with the current virtual private network entryserver.

Subsequent to reconfiguring the domain name system server 1240, thevirtual private network entry server obtains the requested content 1250.For example, the virtual private network entry server determines anoptimal virtual private network exit server for obtaining the requestedcontent from among one or more available and accessible virtual privatenetwork exit servers available and accessible using the operative domainname system server as reconfigured. For example, the request for contentmay indicate a domain name of the external system that hosts therequested content, and the virtual private network entry server mayobtain an IP address of an external server, corresponding to the domainname, from the operative domain name system server.

The virtual private network entry server may send, transmit, orotherwise make available, the request for content to the identifiedvirtual private network exit server. The virtual private network exitserver may receive the request for content. The virtual private networkexit server may send, transmit, or otherwise make available the requestfor content to the external server. Responsive to the request forcontent, the virtual private network exit server may obtain the contentfrom the external server. The virtual private network exit server maysend, transmit, or otherwise make available the content to the virtualprivate network entry server. The virtual private network entry servermay obtain the requested content from the virtual private network exitserver. The virtual private network entry server may send, transmit, orotherwise make available, the requested content to the client device viathe virtual private network tunnel 1260.

As indicated by the broken directional line 1270 from sending therequested content 1260 to obtaining the request for content 1220,obtaining the request for content 1220, generating domain name systemreconfiguration data 1230, reconfiguring domain name systemconfiguration 1240, obtaining the requested content 1250, and sendingthe requested content 1260, may be repeated, such as to obtain othercontent.

Unless expressly stated, or otherwise clear from context, theterminology “computer,” and variations or wordforms thereof, such as“computing device,” “computing machine,” “computing and communicationsdevice,” and “computing unit,” indicates a “computing device,” such asthe computing device 800 shown in FIG. 8 , that implements, executes, orperforms one or more aspects of the methods and techniques describedherein, or is represented by data stored, processed, used, orcommunicated in accordance with the implementation, execution, orperformance of one or more aspects of the methods and techniquesdescribed herein.

Unless expressly stated, or otherwise clear from context, theterminology “instructions,” and variations or wordforms thereof, such as“code,” “commands,” or “directions,” includes an expression, orexpressions, of an aspect, or aspects, of the methods and techniquesdescribed herein, realized in hardware, software, or a combinationthereof, executed, processed, or performed, by a processor, orprocessors, as described herein, to implement the respective aspect, oraspects, of the methods and techniques described herein. Unlessexpressly stated, or otherwise clear from context, the terminology“program,” and variations or wordforms thereof, such as “algorithm,”“function,” “model,” or “procedure,” indicates a sequence or series ofinstructions, which may be iterative, recursive, or both.

Unless expressly stated, or otherwise clear from context, theterminology “communicate,” and variations or wordforms thereof, such as“send,” “receive,” or “exchange,” indicates sending, transmitting, orotherwise making available, receiving, obtaining, or otherwiseaccessing, or a combination thereof, data in a computer accessible formvia an electronic data communications medium.

To the extent that the respective aspects, features, or elements of thedevices, apparatus, methods, and techniques described or shown herein,are shown or described as a respective sequence, order, configuration,or orientation, thereof, such sequence, order, configuration, ororientation is explanatory and other sequences, orders, configurations,or orientations may be used, which may be include concurrent or parallelperformance or execution of one or more aspects or elements thereof, andwhich may include devices, methods, and techniques, or aspects,elements, or components, thereof, that are not expressly describedherein, except as is expressly described herein or as is otherwise clearfrom context. One or more of the devices, methods, and techniques, oraspects, elements, or components, thereof, described or shown herein maybe omitted, or absent, from respective embodiments.

The figures, drawings, diagrams, illustrations, and charts, shown anddescribed herein express or represent the devices, methods, andtechniques, or aspects, elements, or components, thereof, as disclosedherein. The elements, such as blocks and connecting lines, of thefigures, drawings, diagrams, illustrations, and charts, shown anddescribed herein, or combinations thereof, may be implemented orrealized as respective units, or combinations of units, of hardware,software, or both.

Unless expressly stated, or otherwise clear from context, theterminology “determine,” “identify,” and “obtain,” and variations orwordforms thereof, indicates selecting, ascertaining, computing, lookingup, receiving, determining, establishing, obtaining, or otherwiseidentifying or determining using one or more of the devices and methodsshown and described herein. Unless expressly stated, or otherwise clearfrom context, the terminology “example,” and variations or wordformsthereof, such as “embodiment” and “implementation,” indicates adistinct, tangible, physical realization of one or more aspects,features, or elements of the devices, methods, and techniques describedherein. Unless expressly stated, or otherwise clear from context, theexamples described herein may be independent or may be combined.

Unless expressly stated, or otherwise clear from context, theterminology “or” is used herein inclusively (inclusive disjunction),rather than exclusively (exclusive disjunction). For example, unlessexpressly stated, or otherwise clear from context, the phrase “includesA or B” indicates the inclusion of “A,” the inclusion of “B,” or theinclusion of “A and B.” Unless expressly stated, or otherwise clear fromcontext, the terminology “a,” or “an,” is used herein to expresssingular or plural form. For example, the phrase “an apparatus” mayindicate one apparatus or may indicate multiple apparatuses. Unlessexpressly stated, or otherwise clear from context, the terminology“including,” “comprising,” “containing,” or “characterized by,” isinclusive or open-ended such that some implementations or embodimentsmay be limited to the expressly recited or described aspects orelements, and some implementations or embodiments may include elementsor aspects that are not expressly recited or described.

As used herein, numeric terminology that expresses quantity (orcardinality), magnitude, position, or order, such as numbers, such as 1or 20.7, numerals, such as “one” or “one hundred,” ordinals, such as“first” or “fourth,” multiplicative numbers, such as “once” or “twice,”multipliers, such as “double” or “triple,” or distributive numbers, suchas “singly,” used descriptively herein are explanatory and non-limiting,except as is described herein or as is otherwise clear from context. Forexample, a “second” element may be performed prior to a “first” element,unless expressly stated, or otherwise clear from context.

While the disclosure has been described in connection with certainembodiments, it is to be understood that the disclosure is not to belimited to the disclosed embodiments but, on the contrary, is intendedto cover various modifications and equivalent arrangements includedwithin the scope of the appended claims, which scope is to be accordedthe broadest interpretation so as to encompass all such modificationsand equivalent structures as is permitted under the law.

What is claimed is:
 1. A method for domain name system configurationduring virtual private network connection, the method comprising:establishing, by a virtual private network entry server, a virtualprivate network tunnel between the virtual private network entry serverand a client device, wherein establishing the virtual private networktunnel includes receiving, from the client device, virtual privatenetwork configuration data indicating a first domain name system serverconfigured as an operative domain name system server for the virtualprivate network tunnel; receiving, by the virtual private network entryserver, a first protocol data unit, wherein the first protocol data unitincludes at least a portion of a first request for first content,wherein the first request identifies a first external source for thefirst content; determining, by the virtual private network entry server,that a first virtual private network system exit server for obtainingthe first content from the first external source is unavailable usingthe first domain name system server; in response to determining that thefirst virtual private network system exit server for obtaining the firstcontent from the first external source is unavailable using the firstdomain name system server: identifying, by the virtual private networkentry server, a second domain name system server, such that the firstvirtual private network system exit server for obtaining the firstcontent is available using the second domain name system server;transmitting, by the virtual private network entry server, to the clientdevice, a second protocol data unit including a domain name systemconfiguration message, wherein the domain name system configurationmessage indicates the second domain name system server, such that theclient device configures the second domain name system server as theoperative domain name system server for the virtual private networktunnel; obtaining, by the virtual private network entry server, from thefirst virtual private network system exit server, the first content,wherein the first virtual private network system exit server obtainedthe first content from the first external source; and transmitting, tothe client device, via the virtual private network tunnel, the firstcontent.
 2. The method of claim 1, wherein: receiving the virtualprivate network configuration data includes receiving the first protocoldata unit.
 3. The method of claim 1, wherein: receiving the firstprotocol data unit includes receiving a universal resource locator valueindicative of the first external source.
 4. The method of claim 1,further comprising: receiving, by the virtual private network entryserver, from the client device, a third protocol data unit, wherein thethird protocol data unit includes at least a portion of a second requestfor second content that identifies a second external source for thesecond content; determining, by the virtual private network entryserver, that a second virtual private network system exit server forobtaining the second content from the second external source isavailable using the operative domain name system server; in response todetermining that the second virtual private network system exit serverfor obtaining the second content from the second external source isavailable using the operative domain name system server: obtaining, bythe virtual private network entry server, from the second virtualprivate network system exit server, the second content, wherein thesecond virtual private network system exit server obtained the secondcontent from the second external source; and transmitting, to the clientdevice, via the virtual private network tunnel, the second content, suchthat the client device omits reconfiguring the operative domain namesystem server to obtain the second content.
 5. The method of claim 4,wherein: the second content is obtained prior to obtaining the firstcontent, such that the second content is obtained wherein the operativedomain name system server is the first domain name system server.
 6. Themethod of claim 4, wherein: the second content is obtained subsequent toobtaining the first content, such that the second content is obtainedwherein the operative domain name system server is the second domainname system server.
 7. The method of claim 4, wherein a geographiclocation of the first virtual private network exit server differs from ageographic location of the second virtual private network exit server.8. A virtual private network entry server apparatus comprising: anon-transitory computer-readable storage medium; and a processorconfigured to execute instructions stored in the non-transitorycomputer-readable storage medium to: establish a virtual private networktunnel between the virtual private network entry server apparatus and aclient device, wherein to establish the virtual private network tunnelthe processor executes the instructions to receive, from the clientdevice, virtual private network configuration data indicating a firstdomain name system server configured as an operative domain name systemserver for the virtual private network tunnel; receive a first protocoldata unit, wherein the first protocol data unit includes at least aportion of a first request for first content, wherein the first requestidentifies a first external source for the first content; determine thata first virtual private network system exit server for obtaining thefirst content from the first external source is unavailable using thefirst domain name system server; in response to determining that thefirst virtual private network system exit server for obtaining the firstcontent from the first external source is unavailable using the firstdomain name system server: identify a second domain name system server,such that the first virtual private network system exit server forobtaining the first content is available using the second domain namesystem server; transmit, to the client device, a second protocol dataunit including a domain name system configuration message, wherein thedomain name system configuration message indicates the second domainname system server, such that the client device configures the seconddomain name system server as the operative domain name system server forthe virtual private network tunnel; obtain, from the first virtualprivate network system exit server, the first content, wherein the firstvirtual private network system exit server obtained the first contentfrom the first external source; and transmit, to the client device, viathe virtual private network tunnel, the first content.
 9. The virtualprivate network entry server apparatus of claim 8, wherein: to receivethe virtual private network configuration data, the processor executesthe instructions to receive the first protocol data unit.
 10. Thevirtual private network entry server apparatus of claim 8, wherein: toreceive the first protocol data unit, the processor executes theinstructions to receive a universal resource locator value indicative ofthe first external source.
 11. The virtual private network entry serverapparatus of claim 8, wherein the processor executes the instructionsto: receive, from the client device, a third protocol data unit, whereinthe third protocol data unit includes at least a portion of a secondrequest for second content that identifies a second external source forthe second content; determine that a second virtual private networksystem exit server for obtaining the second content from the secondexternal source is available using the operative domain name systemserver; in response to determining that the second virtual privatenetwork system exit server for obtaining the second content from thesecond external source is available using the operative domain namesystem server: obtain, from the second virtual private network systemexit server, the second content, wherein the second virtual privatenetwork system exit server obtained the second content from the secondexternal source; and transmit, to the client device, via the virtualprivate network tunnel, the second content, such that the client deviceomits reconfiguring the operative domain name system server to obtainthe second content.
 12. The virtual private network entry serverapparatus of claim 11, wherein: the processor executes the instructionsto obtain the second content prior to obtaining the first content, suchthat the operative domain name system server is the first domain namesystem server.
 13. The virtual private network entry server apparatus ofclaim 11, wherein: the processor executes the instructions to obtain thesecond content subsequent to obtaining the first content, such that theoperative domain name system server is the second domain name systemserver.
 14. The virtual private network entry server apparatus of claim11, wherein a geographic location of the first virtual private networkexit server differs from a geographic location of the second virtualprivate network exit server.
 15. A non-transitory computer-readablestorage medium, comprising executable instructions that, when executedby a processor, perform: establishing, by a virtual private networkentry server, a virtual private network tunnel between the virtualprivate network entry server and a client device, wherein establishingthe virtual private network tunnel includes receiving, from the clientdevice, virtual private network configuration data indicating a firstdomain name system server configured as an operative domain name systemserver for the virtual private network tunnel; receiving, by the virtualprivate network entry server, a first protocol data unit, wherein thefirst protocol data unit includes at least a portion of a first requestfor first content, wherein the first request identifies a first externalsource for the first content; determining, by the virtual privatenetwork entry server, that a first virtual private network system exitserver for obtaining the first content from the first external source isunavailable using the first domain name system server; in response todetermining that the first virtual private network system exit serverfor obtaining the first content from the first external source isunavailable using the first domain name system server: identifying, bythe virtual private network entry server, a second domain name systemserver, such that the first virtual private network system exit serverfor obtaining the first content is available using the second domainname system server; transmitting, by the virtual private network entryserver, to the client device, a second protocol data unit including adomain name system configuration message, wherein the domain name systemconfiguration message indicates the second domain name system server,such that the client device configures the second domain name systemserver as the operative domain name system server for the virtualprivate network tunnel; obtaining, by the virtual private network entryserver, from the first virtual private network system exit server, thefirst content, wherein the first virtual private network system exitserver obtained the first content from the first external source; andtransmitting, to the client device, via the virtual private networktunnel, the first content.
 16. The non-transitory computer-readablestorage medium of claim 15, wherein: receiving the virtual privatenetwork configuration data includes receiving the first protocol dataunit.
 17. The non-transitory computer-readable storage medium of claim15, wherein: receiving the first protocol data unit includes receiving auniversal resource locator value indicative of the first externalsource.
 18. The non-transitory computer-readable storage medium of claim15, further comprising: receiving, by the virtual private network entryserver, from the client device, a third protocol data unit, wherein thethird protocol data unit includes at least a portion of a second requestfor second content that identifies a second external source for thesecond content; determining, by the virtual private network entryserver, that a second virtual private network system exit server forobtaining the second content from the second external source isavailable using the operative domain name system server; in response todetermining that the second virtual private network system exit serverfor obtaining the second content from the second external source isavailable using the operative domain name system server: obtaining, bythe virtual private network entry server, from the second virtualprivate network system exit server, the second content, wherein thesecond virtual private network system exit server obtained the secondcontent from the second external source; and transmitting, to the clientdevice, via the virtual private network tunnel, the second content, suchthat the client device omits reconfiguring the operative domain namesystem server to obtain the second content.
 19. The non-transitorycomputer-readable storage medium of claim 18, wherein: the secondcontent is obtained prior to obtaining the first content, such that theoperative domain name system server is the first domain name systemserver.
 20. The non-transitory computer-readable storage medium of claim18, wherein: the second content is obtained subsequent to obtaining thefirst content, such that the operative domain name system server is thesecond domain name system server.