Systems and methods for implementing protocol enforcement rules
First Claim
Patent Images
1. A protocol management system coupled with a local network, the local network interfaced with an external network, the protocol management system comprising a protocol enforcers, the protocol enforcers comprising:
- a plurality of protocol inspectors each configured to inspect packets as they enter and exit the local network, each of the plurality of protocol inspectors including a state machine configured to execute a plurality of inspection primitives, each of the plurality of inspection primitives configured to analyze a particular packet for one type of signature or pattern;
a protocol inspection manager configured to merge the state machines for each of the plurality of protocol inspectors into a composite state machine; and
a protocol state machine configured to maintain the state of all connections of interest.
30 Assignments
0 Petitions
Accused Products
Abstract
A protocol management system is capable of detecting certain message protocols and applying policy rules to the detected message protocols that prevent intrusion, or abuse, of a network'"'"'s resources. In one aspect, a protocol message gateway is configured to apply policy rules to high level message protocols, such as those that reside at layer 7 of the ISO protocol stack.
-
Citations
26 Claims
-
1. A protocol management system coupled with a local network, the local network interfaced with an external network, the protocol management system comprising a protocol enforcers, the protocol enforcers comprising:
-
a plurality of protocol inspectors each configured to inspect packets as they enter and exit the local network, each of the plurality of protocol inspectors including a state machine configured to execute a plurality of inspection primitives, each of the plurality of inspection primitives configured to analyze a particular packet for one type of signature or pattern;
a protocol inspection manager configured to merge the state machines for each of the plurality of protocol inspectors into a composite state machine; and
a protocol state machine configured to maintain the state of all connections of interest. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification