OBJECT-RELATION USER INTERFACE FOR VIEWING SECURITY CONFIGURATIONS OF NETWORK SECURITY DEVICES
First Claim
1. A computer implemented method comprising:
- generating for display selectable device icons that represent respective network security devices;
responsive to a selection of one of the device icons, generating for display selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon;
responsive to a selection of one of the interface icons, generating for display selectable policy icons that represent respective security polices used by the network interface represented by the selected interface icon, the security policies including security rules, each security rule including objects arranged according to a predetermined rule syntax to control access to a resource, at least some of the objects having respective object values; and
responsive to a selection of one of the policy icons, generating for display selectable object group icons that represent respective groups of objects used in the security policy represented by the selected policy icon.
1 Assignment
0 Petitions
Accused Products
Abstract
In a computer implemented method, selectable device icons that represent respective network security devices are generated for display. Responsive to a selection of one of the device icons, selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon are generated for display. Responsive to a selection of one of the interface icons, selectable policy icons that represent respective security polices applied to the network interface represented by the selected interface icon are generated for display. Responsive to a selection of one of the policy icons, selectable object group icons that represent respective groups of security rule objects used in the network security policy represented by the selected policy icon are generated for display.
44 Citations
23 Claims
-
1. A computer implemented method comprising:
-
generating for display selectable device icons that represent respective network security devices; responsive to a selection of one of the device icons, generating for display selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon; responsive to a selection of one of the interface icons, generating for display selectable policy icons that represent respective security polices used by the network interface represented by the selected interface icon, the security policies including security rules, each security rule including objects arranged according to a predetermined rule syntax to control access to a resource, at least some of the objects having respective object values; and responsive to a selection of one of the policy icons, generating for display selectable object group icons that represent respective groups of objects used in the security policy represented by the selected policy icon. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
a network interface unit configured to enable communications over a network; and a processor, coupled to the network interface unit, configured to; generate for display selectable device icons that represent respective network security devices; responsive to a selection of one of the device icons, generate for display selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon; responsive to a selection of one of the interface icons, generate for display selectable policy icons that represent respective security polices used by the network interface represented by the selected interface icon, the security policies including security rules, each security rule including objects arranged according to a rule syntax to control access to a resource, at least some of the objects having respective object values; and responsive to a selection of one of the policy icons, generate for display selectable object group icons that represent respective groups of objects used in the security policy represented by the selected policy icon. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A non-transitory computer readable storage media encoded with instructions that, when executed by a processor, cause the processor to:
-
generate for display selectable device icons that represent respective network security devices; responsive to a selection of one of the device icons, generate for display selectable interface icons that represent respective network interfaces used by the network security device represented by the selected device icon; responsive to a selection of one of the interface icons, generate for display selectable policy icons that represent respective security polices used by the network interface represented by the selected interface icon, the security policies including security rules, each security rule including objects arranged according to a rule syntax to control access to a resource, at least some of the objects having respective object values; and responsive to a selection of one of the policy icons, generate for display selectable object group icons that represent respective groups of objects used in the security policy represented by the selected policy icon. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification