Firewall providing enhanced network security and user transparency
First Claim
1. A data processing system for processing data packets transferred over a network, the data processing system comprising:
- a firewall, the firewall being operable to;
receive a set of firewall policies; and
apply the firewall policies to a data packet;
an authentication application, the authentication application being operable to;
receive a set of authentication policies; and
authenticate a data packet in accordance with the authentication policies;
at least one virtual private network, each virtual private network having an associated destination address and policies; and
a controller being operable to;
detect an incoming data packet;
examine the incoming data packet for a virtual private network destination address;
identify the policies associated with the virtual private network destination;
if the policies include firewall policies, then call a firewall engine and apply the set of firewall policies corresponding to the virtual private network to the data packet;
if the policies include authentication policies, then call an authentication application and apply a set of authentication policies corresponding to the virtual private network to the data packet; and
route the data packet to the virtual private network, the virtual private network corresponding to a destination address contained in the data packet.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a firewall that achieves maximum network security and maximum user convenience. The firewall employs “envoys” that exhibit the security robustness of prior-art proxies and the transparency and ease-of-use of prior-art packet filters, combining the best of both worlds. No traffic can pass through the firewall unless the firewall has established an envoy for that traffic. Both connection-oriented (e.g., TCP) and connectionless (e.g., UDP-based) services may be handled using envoys. Establishment of an envoy may be subjected to a myriad of tests to “qualify” the user, the requested communication, or both. Therefore, a high level of security may be achieved. The usual added burden of prior-art proxy systems is avoided in such a way as to achieve fall transparency-the user can use standard applications and need not even know of the existence of the firewall. To achieve full transparency, the firewall is configured as two or more sets of virtual hosts. The firewall is, therefore, “multihomed,” each home being independently configurable. One set of hosts responds to addresses on a first network interface of the firewall. Another set of hosts responds to addresses on a second network interface of the firewall. In one aspect, programmable transparency is achieved by establishing DNS mappings between remote hosts to be accessed through one of the network interfaces and respective virtual hosts on that interface. In another aspect, automatic transparency may be achieved using code for dynamically mapping remote hosts to virtual hosts in accordance with a technique referred to herein as dynamic DNS, or DDNS.
-
Citations
38 Claims
-
1. A data processing system for processing data packets transferred over a network, the data processing system comprising:
-
a firewall, the firewall being operable to;
receive a set of firewall policies; and
apply the firewall policies to a data packet;
an authentication application, the authentication application being operable to;
receive a set of authentication policies; and
authenticate a data packet in accordance with the authentication policies;
at least one virtual private network, each virtual private network having an associated destination address and policies; and
a controller being operable to;
detect an incoming data packet;
examine the incoming data packet for a virtual private network destination address;
identify the policies associated with the virtual private network destination;
if the policies include firewall policies, then call a firewall engine and apply the set of firewall policies corresponding to the virtual private network to the data packet;
if the policies include authentication policies, then call an authentication application and apply a set of authentication policies corresponding to the virtual private network to the data packet; and
route the data packet to the virtual private network, the virtual private network corresponding to a destination address contained in the data packet.
-
-
2. A method for processing a data packet in a packet filtering device, the method comprising:
-
receiving a data packet;
determining a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination;
applying the set of rules to the data packet; and
if a virtual local area network destination has been determined for the received data packet, outputting the data packet to its virtual local area network destination, using the result from the application of the set of rules, and if a virtual local area network destination has not been determined for the received data packet, denying the data packet.
-
-
3. A packet filtering device for processing a data packet, the packet filtering device comprising:
-
an input port, the input port being operable to receive a data packet;
a processor, the processor being connected to the input port and being operable to;
determine a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination; and
apply the set of rules to the data packet; and
an output port, the output port being connected to the processor and being operable to;
output the data packet to its virtual local area network destination, using the result from the application of the rules if a virtual local area network destination has been determined for the received data packet; and
drop the data packet if a virtual local area network destination has not been determined for the received data packet.
-
-
4. A method for examining data packets transferred over a network, the method comprising:
-
connecting to at least one virtual local area networks;
associating a set of firewall configuration settings with each of the at least one virtual local area networks;
receiving an incoming data packet;
examining the incoming data packet in accordance with a set of firewall configuration settings; and
allowing the examined data packet to a particular virtual local area network among the at least one virtual local area networks, based on the result of the examination.
-
-
5. A security system, comprising:
-
security system resources including firewall services; and
a controller operable to partition the security system resources into a plurality of separate virtual hosts, each virtual host being configurable to enforce at least one policy relating to a specific set of host machines, and to allocate security system resources to the at least one virtual hosts. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing system for processing data packets transferred over a network, the data processing system comprising:
-
a firewall, the firewall being operable to;
receive a set of firewall policies; and
apply the firewall policies to a data packet;
an authentication application, the authentication application being operable to;
receive a set of authentication policies; and
authenticate a data packet in accordance with the authentication policies;
at least one virtual private network, the virtual private network having an associated destination address and policies; and
a controller being operable to;
detect an incoming data packet;
examine the incoming data packet for a virtual private network destination address;
identify the policies associated with the virtual private network destination;
if the policies include firewall policies, then call a firewall engine and apply the set of firewall policies corresponding to the virtual private network destination to the data packet;
if the policies include authentication policies, then call the authentication application and apply the set of authentication policies corresponding to the virtual private network destination to the data packet; and
route the data packet to the virtual private network containing the data packet'"'"'s destination address.
-
-
21. A method for processing a data packet in a packet filtering device, the method comprising:
-
receiving a data packet;
determining a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination;
applying the set of rules to the data packet;
if a virtual local area network destination has been determined for the received data packet, outputting the data packet to its virtual local area network destination, using the result from the application of the rules, and if a virtual local area network destination has not been determined for the received data packet, denying the data packet.
-
-
22. A packet filtering device for processing a data packet, the packet filtering device comprising:
-
an input port, the input port being operable to receive a data packet;
a processor, the processor being connected to the input port and being operable to;
determine a virtual local area network destination for the received data packet, including identifying a set of rules that are associated with the virtual local area network destination; and
apply the set of rules to the data packet; and
an output port, the output port being connected to the processor and being operable to;
output the data packet to its virtual local area network destination, using the result from the application of the rules if a virtual local area network destination has been determined for the received data packet; and
drop the data packet if a virtual local area network destination has not been determined for the received data packet.
-
-
23. A method for examining data packets transferred over a network, the method comprising:
-
connecting to at least one virtual local area networks;
associating a set of firewall configuration settings with each of the at least one virtual local area networks;
receiving an incoming data packet;
examining the incoming data packet in accordance with a set of firewall configuration settings; and
allowing the examined data packet to a particular virtual local area network among the at least one virtual local area networks, based on the result of the examination.
-
-
24. A security system, comprising:
-
security system resources including firewall services; and
a controller operable to partition the security system resources into a plurality of separate virtual hosts, each virtual host being configurable to enforce at least one policy relating to a specific host machines, and to allocate security system resources to the at least one virtual hosts. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification