-
公开(公告)号:US08266685B2
公开(公告)日:2012-09-11
申请号:US11804409
申请日:2007-05-18
IPC分类号: H04L29/06
CPC分类号: H04L63/0263 , G06F8/61 , G06F9/44505 , G06F21/57 , H04L41/0806 , H04L41/082
摘要: Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online.
摘要翻译: 本发明的实施例涉及一种防火墙安装程序,其接收一组配置指令,用于以说明性格式配置防火墙,该声明性格式描述要由防火墙实现的一个或多个规则,并且自动配置防火墙。 提供能够基于声明性输入而不是过程性过程导向输入配置防火墙的防火墙安装程序,通过允许管理员以更高的声明级别指定所需的防火墙配置,从而有助于管理防火墙,并释放管理员不需要 指定在防火墙中实现配置更改的过程。 在本发明的一个实施例中,防火墙安装者可以接收和存储用于配置防火墙的输入,即使在防火墙未运行时,防火墙安装者也可以接收和存储用于配置防火墙的输入,使得防火墙在下一次联机时对这些配置更改执行。
-
公开(公告)号:US20080289026A1
公开(公告)日:2008-11-20
申请号:US11804409
申请日:2007-05-18
IPC分类号: G06F15/16
CPC分类号: H04L63/0263 , G06F8/61 , G06F9/44505 , G06F21/57 , H04L41/0806 , H04L41/082
摘要: Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online.
摘要翻译: 本发明的实施例涉及一种防火墙安装程序,其接收一组配置指令,用于以说明性格式配置防火墙,该声明性格式描述要由防火墙实现的一个或多个规则,并且自动配置防火墙。 提供能够基于声明性输入而不是过程性过程导向输入配置防火墙的防火墙安装程序,通过允许管理员以更高的声明级别指定所需的防火墙配置,从而有助于管理防火墙,并释放管理员不需要 指定在防火墙中实现配置更改的过程。 在本发明的一个实施例中,防火墙安装者可以接收和存储用于配置防火墙的输入,即使在防火墙未运行时,防火墙安装者也可以接收和存储用于配置防火墙的输入,使得防火墙在下一次联机时对这些配置更改执行。
-
公开(公告)号:US08370919B2
公开(公告)日:2013-02-05
申请号:US11821839
申请日:2007-06-26
申请人: David Abzarian , Michael R. Surkan , Salahuddin C. J. Khan , Amit A. Sehgal , Eran Yariv , Emanuel Paleologu , Gerardo Diaz Cuellar
发明人: David Abzarian , Michael R. Surkan , Salahuddin C. J. Khan , Amit A. Sehgal , Eran Yariv , Emanuel Paleologu , Gerardo Diaz Cuellar
IPC分类号: H04L29/06
CPC分类号: H04L63/029
摘要: A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic.
-
公开(公告)号:US20090007251A1
公开(公告)日:2009-01-01
申请号:US11821839
申请日:2007-06-26
申请人: David Abzarian , Michael R. Surkan , Salahuddin C.J. Khan , Amit A. Sehgal , Eran Yariv , Emanuel Paleologu , Gerardo Diaz Cuellar
发明人: David Abzarian , Michael R. Surkan , Salahuddin C.J. Khan , Amit A. Sehgal , Eran Yariv , Emanuel Paleologu , Gerardo Diaz Cuellar
IPC分类号: G06F9/00
CPC分类号: H04L63/029
摘要: A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic.
摘要翻译: 主机防火墙可以确定并考虑来自网络边缘的未经请求的流量是否入站,并且至少部分地基于该特性来允许或阻止该流量。 在一个实现中,可以在主机防火墙规则上设置边缘遍历参数,主机防火墙规则通常包括诸如端口,协议等的其他参数。如果通过边缘遍历接口接收的未经请求的流量与具有边缘遍历的主机防火墙规则匹配 标准,那么防火墙不会阻塞流量。 另一方面,如果通过边缘遍历接口接收的未经请求的流量无法满足任何防火墙规则的边缘遍历标准,则防火墙会阻塞流量。
-
公开(公告)号:US08201234B2
公开(公告)日:2012-06-12
申请号:US11746478
申请日:2007-05-09
IPC分类号: H04L29/06
CPC分类号: H04L63/20 , H04L63/0428 , H04L63/08
摘要: Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
摘要翻译: 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。
-
公开(公告)号:US08099774B2
公开(公告)日:2012-01-17
申请号:US11589513
申请日:2006-10-30
申请人: David Abzarian , Gerardo Diaz Cuellar , Eran Yariv
发明人: David Abzarian , Gerardo Diaz Cuellar , Eran Yariv
CPC分类号: H04L63/0263
摘要: The dynamic updating of firewall parameters is described. One exemplary embodiment includes receiving a policy rule that includes a reference to a predefined container that specifies a permissible value range of at least one firewall parameter allowable under the policy rule, receiving a firewall parameter value, and populating the predefined container with the firewall parameter value if the firewall parameter value is within the permissible value range, thereby updating the policy rule.
摘要翻译: 描述了防火墙参数的动态更新。 一个示例性实施例包括接收包括对预定义容器的引用的策略规则,其指定策略规则允许的至少一个防火墙参数的允许值范围,接收防火墙参数值,以及使用防火墙参数值填充预定义容器 如果防火墙参数值在允许的值范围内,则更新策略规则。
-
公开(公告)号:US20090006847A1
公开(公告)日:2009-01-01
申请号:US11823861
申请日:2007-06-28
CPC分类号: H04L63/10 , G06F21/74 , H04L63/02 , H04L63/0227 , H04L63/0263 , H04L63/04 , H04L63/0428 , H04L63/20
摘要: Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
摘要翻译: 本发明的一些实施例涉及用于确定计算机系统上正在发送或接收数据或正试图与另一计算机系统发送或接收数据的过程在内核模式或用户模式下执行的技术,并提供指示符 对安全引擎的这种决定。 在一些实施例中,这样的指示被提供给至少部分地基于发送或接收进程是处于内核模式还是用户模式来实现安全策略的安全引擎(例如,防火墙),以及基于 过程“操作模式。 这使安全引擎能够保持更高特异性的安全策略,从而提高计算机系统的安全性。
-
公开(公告)号:US20080028457A1
公开(公告)日:2008-01-31
申请号:US11495412
申请日:2006-07-28
申请人: Gerardo Diaz-Cuellar , Eran Yariv , David Abzarian
发明人: Gerardo Diaz-Cuellar , Eran Yariv , David Abzarian
IPC分类号: G06F15/16
CPC分类号: H04L63/1441 , H04L63/08
摘要: A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
摘要翻译: 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
-
公开(公告)号:US08341723B2
公开(公告)日:2012-12-25
申请号:US11823861
申请日:2007-06-28
IPC分类号: H04L29/06
CPC分类号: H04L63/10 , G06F21/74 , H04L63/02 , H04L63/0227 , H04L63/0263 , H04L63/04 , H04L63/0428 , H04L63/20
摘要: Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
摘要翻译: 本发明的一些实施例涉及用于确定计算机系统上正在发送或接收数据或正试图与另一计算机系统发送或接收数据的过程在内核模式或用户模式下执行的技术,并提供指示符 对安全引擎的这种决定。 在一些实施例中,这样的指示被提供给至少部分地基于发送或接收进程是处于内核模式还是用户模式来实现安全策略的安全引擎(例如,防火墙),以及基于 过程“操作模式。 这使安全引擎能够保持更高特异性的安全策略,从而提高计算机系统的安全性。
-
公开(公告)号:US07836495B2
公开(公告)日:2010-11-16
申请号:US11495412
申请日:2006-07-28
申请人: Gerardo Diaz-Cuellar , Eran Yariv , David Abzarian
发明人: Gerardo Diaz-Cuellar , Eran Yariv , David Abzarian
IPC分类号: G06F9/00
CPC分类号: H04L63/1441 , H04L63/08
摘要: A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
摘要翻译: 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
-
-
-
-
-
-
-
-
-