Firewall and method for configuring same
First Claim
1. A firewall system, comprising:
- a user interface for a user to enter a configuration command;
a shared library providing information packet filtering and management application programming interfaces;
a configuration management module for finding out which service is responsible for the configuration command, and for calling a corresponding application programming interface; and
a kernel component for performing packet filtering, network address translation and port address translation.
1 Assignment
0 Petitions
Accused Products
Abstract
A firewall includes a user interface (21) for inputting a configuration command; a shared library (25) providing information packet filtering and management application programming interfaces; a configuration management module (23) for finding out which service is responsible for the configuration command, and a kernel component (27) for performing packet filtering, network address translation and port address translation. The firewall further comprises an access database (251) for storing access lists and access rules, a NAT database (252) for storing rules on network address translation, an interface database (253) for storing information on interfaces of the firewall of the present invention, and a pool database (254) for storing NAT pool lists. A related method for configuring the firewall is also disclosed.
40 Citations
14 Claims
-
1. A firewall system, comprising:
-
a user interface for a user to enter a configuration command;
a shared library providing information packet filtering and management application programming interfaces;
a configuration management module for finding out which service is responsible for the configuration command, and for calling a corresponding application programming interface; and
a kernel component for performing packet filtering, network address translation and port address translation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for configuring a firewall, the method comprising the steps of:
-
entering a configuration command via a user interface;
transmitting the configuration command to a shared library, the shared library providing information packet filtering and management application programming interfaces;
determining whether the configuration command is legal;
processing the configuration command if the configuration command is legal; and
executing the configuration command for configuring the firewall. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification