Determining firewall rules for reverse firewalls
First Claim
1. A method for securing a network using a reverse firewall, the reverse firewall accessing a profile of a host in the network, the method comprising the steps of:
- at the reverse firewall, receiving a network communication from a host in the network;
if parameters of the network communication from the host are in the profile of the host, allowing the network communication from the host; and
if parameters of the network communication from the host are not in the profile of the host, enforcing a throttling discipline on the network communication to determine whether to allow or to block the network communication from the host.
4 Assignments
0 Petitions
Accused Products
Abstract
A reverse firewall for removing undesirable traffic from a computing network, such as a virtual private network (VPN), is disclosed. The reverse firewall uses firewall rules that may be determined and maintained within the enterprise network to control communication sent between computers in the computing network. The reverse firewall rules may be used to identify the communications between computers in the network that are undesirable and/or intrusive. For example, a computer in a network that is infected with a worm or that is surreptitiously hosting a denial-of-service attack may be identified by the reverse firewall and quarantined. The reverse firewall may be implemented in hardware and/or software.
-
Citations
20 Claims
-
1. A method for securing a network using a reverse firewall, the reverse firewall accessing a profile of a host in the network, the method comprising the steps of:
-
at the reverse firewall, receiving a network communication from a host in the network;
if parameters of the network communication from the host are in the profile of the host, allowing the network communication from the host; and
if parameters of the network communication from the host are not in the profile of the host, enforcing a throttling discipline on the network communication to determine whether to allow or to block the network communication from the host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for determining a communications management policy for a reverse firewall in a network, the method comprising the steps of:
-
generating a profile for a host in the network; and
setting a throttling discipline for out-of-profile network communication from the host. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A network device for controlling a network communication sent from a host in a network, the network device configured to enforce a profile of the host and a throttling discipline, the device comprising:
-
a memory unit storing a set of rules corresponding to the profile of the host in the network, the network device accessing the memory unit to identify the set of rules corresponding to the profile of the host in the network; and
an out-of-profile counter for use by the network device to enforce the throttling discipline. - View Dependent Claims (19, 20)
-
Specification