Automatically Recommending Firewall Rules During Enterprise Information Technology Transformation
First Claim
1. A method for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment, the method comprising:
- obtaining at least one communication pattern occurring in a pre-transformation source environment; and
automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment;
wherein at least one of the steps is carried out by a computer device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment. A method includes obtaining at least one communication pattern occurring in a pre-transformation source environment, and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment.
81 Citations
20 Claims
-
1. A method for automatically generating one or more rules during IT transformation for configuring one or more firewall interfaces in a post-transformation target environment, the method comprising:
-
obtaining at least one communication pattern occurring in a pre-transformation source environment; and automatically generating one or more vendor-neutral rules for one or more intended firewall interfaces in a post-transformation target environment based on the at least one communication pattern occurring in the source environment and based on information derived from the target environment; wherein at least one of the steps is carried out by a computer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification