×

Automated generation of configuration elements of an information technology system

  • US 20060130133A1
  • Filed: 05/03/2005
  • Published: 06/15/2006
  • Est. Priority Date: 12/14/2004
  • Status: Active Grant
First Claim
Patent Images

1. A firewall rule generation method for an Information Technology (IT) system, said method implemented by software stored on a computer readable medium and executed on a processor of a computer system, said method comprising:

  • providing a list LX of I computers Xi (i=1, 2, . . . I), said I being at least 1;

    providing a list LS of J software components Sij (j=1, 2, . . . , J) installed on computer Xi, said J being a function of i and J is at least 1, each software component of the J software components independently adapted to transmit and/or receive data in accordance with a data communication protocol;

    providing a list LP of M ports Pijm (m=1, 2, . . . , M) on which software component Sij is listening, said M being a function of i and j and M is at least 1;

    providing a list LY of N clients Yijmn (n=1, 2, . . . , N), said N being a function of i, j, and m and N is at least 1;

    computer Xi and client Yijmn configured to have data transmitted therebetween; and

    for data transmission between each computer Xi (i=1, 2, . . . I) on the list LX and each associated client Yijmn (n=1, 2, . . . , N;

    m=1, 2, . . . , M;

    j=1, 2, . . . , J) on the list LY;

    generating at least one firewall rule allowing said data transmission between Xi and Yijmn if an Internet Protocol (IP) address (IPAddrXi) of computer Xi and an IP address (IPAddrYijmn) of client Yijmn are not on a same subnet of the IT system, wherein for each firewall rule of the at least one firewall rule that allows data transmission from Xi to Yijmn the source component of said each firewall rule comprises IPAddrXi and the destination component of said each firewall rule comprises IPaddrYijmn, and wherein for each firewall rule of the at least one firewall rule that allows data transmission from Yijmn to Xi the source component of said each firewall rule comprises IPAddrYijmn and the destination component of said each firewall rule comprises IPAddrXi.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×