SYSTEMS AND METHODS FOR DYNAMIC FIREWALL POLICY CONFIGURATION
First Claim
Patent Images
1. A method for firewall configuration comprising:
- receiving, at a processing device, input defining a firewall policy for a firewall managing access to a subnet of network components deployed within a communications network, the firewall policy including a firewall configuration for the firewall and a network component configuration for a network component of the subnet of network components;
processing, using the processing device, the input to determine that the firewall configuration and the network component configuration are valid;
when the firewall configuration and the network component configuration are valid, automatically implementing, using the processing device, the firewall configuration at the firewall and the network component configuration at the network component; and
activating, using the processing device, the firewall within the communications network to manage traffic to and from the subnet.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for receiving information on network firewall policy configurations are disclosed. Based on the received firewall configuration information, a configuration of a firewall and/or subnet of network devices is automatically provisioned and/or configured to control network traffic to and from the subnet.
126 Citations
18 Claims
-
1. A method for firewall configuration comprising:
-
receiving, at a processing device, input defining a firewall policy for a firewall managing access to a subnet of network components deployed within a communications network, the firewall policy including a firewall configuration for the firewall and a network component configuration for a network component of the subnet of network components; processing, using the processing device, the input to determine that the firewall configuration and the network component configuration are valid; when the firewall configuration and the network component configuration are valid, automatically implementing, using the processing device, the firewall configuration at the firewall and the network component configuration at the network component; and activating, using the processing device, the firewall within the communications network to manage traffic to and from the subnet. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for firewall configuration comprising:
-
a subnet of network components deployed within a communications network, the subnet accessible through a firewall; and at least one processor to; receive input defining a firewall policy for a firewall managing access to a subnet of network components deployed within a communications network, the firewall policy including a firewall configuration for the firewall and a network component configuration for a network component of the subnet of network components; process the input to determine that the firewall configuration and the network component configuration are valid; when the firewall configuration and the network component configuration are valid, automatically implementing the firewall configuration at the firewall and the network component configuration at the network component; and activate the firewall within the communications network to manage traffic to and from the subnet. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium for firewall configuration including instructions, executable by a processor, the instructions comprising:
-
receiving input defining a firewall policy for a firewall managing access to a subnet of network components deployed within a communications network, the firewall policy including a firewall configuration for the firewall and a network component configuration for a network component of the subnet of network components; processing the input to determine that the firewall configuration and the network component configuration are valid; when the configuration of the firewall configuration and the network component configuration are valid, automatically implementing the firewall configuration at the firewall and the network component configuration at the network component; and activating the firewall within the communications network to manage traffic to and from the subnet. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification