Web-based administration of IP tunneling on internet firewalls
First Claim
1. A method for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising the steps of:
- presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses, wherein the graphical depiction of tunnels can be selectively altered to show all defined tunnels, show only active tunnels or show only inactive tunnels;
responsive to user selection, from a user, of a first line, displaying a selected tunnel definition represented by the first line; and
responsive to user input, from the user, performing an action on the selected tunnel definition.
2 Assignments
0 Petitions
Accused Products
Abstract
Administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network in a web based interface is disclosed. Tunnels are displayed in graphical depictions as lines connecting icons representing network addresses. User selection of a line, will bring up a selected tunnel definition represented by the first line is displayed in another pane in the interface or a list of filter rules applicable to the tunnel. At this point, an action on the selected tunnel definition may be performed responsive to user input. Queries can be run on a tunnel definition to determine whether any existing tunnel definitions match the entered tunnel definition, or whether there are any filter rules in effect for a given tunnel definition. The results of the query are displayed in a scatter bar in another pane in the user interface, wherein locations of matches are indicated by lines through the scatter bar. A small bar is displayed proximate to the scatter bar, the small bar indicating the position of the displayed list relative to a complete list represented by the scatter bar.
184 Citations
30 Claims
-
1. A method for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising the steps of:
-
presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses, wherein the graphical depiction of tunnels can be selectively altered to show all defined tunnels, show only active tunnels or show only inactive tunnels; responsive to user selection, from a user, of a first line, displaying a selected tunnel definition represented by the first line; and responsive to user input, from the user, performing an action on the selected tunnel definition. - View Dependent Claims (2, 3, 4)
-
-
5. A method for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising the steps of:
-
presenting a user interface having a first pane in which a tunnel definition can be entered; responsive to user input, from the user, running a query on an entered tunnel definition to determine whether any existing tunnel definitions match the entered tunnel definition; displaying results of the query in a scatter bar in another pane in the user interface, wherein locations of matching tunnel definitions are indicated by lines through the scatter bar; and responsive to user input from the user, performing an action on a selected tunnel definition. - View Dependent Claims (6, 7)
-
-
8. A method for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising the steps of:
-
presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses; responsive to user selection, from a user, of a first line, displaying a list of filter rules applicable to a selected tunnel represented by the first line; displaying a list of filter rules in a scatter bar, wherein location of the filter rules applicable to the selected tunnel are indicated by lines through the scatter bar; and responsive to user input, from the user, performing an action on a selected filter rule. - View Dependent Claims (9, 10)
-
-
11. A system including processor and memory for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses, wherein the graphical depiction of the tunnels can be selectively altered to show defined tunnels, show only active tunnels or show only inactive tunnels; means responsive to user selection, from a user, of a first line, for displaying a selected tunnel definition represented by the first line; and means responsive to user input, from the user, for performing an action on the selected tunnel definition. - View Dependent Claims (12, 13, 14)
-
-
15. A system including processor and memory for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a user interface having a first pane in which a tunnel definition can be entered; means responsive to user input from a user for running a query on an entered tunnel definition to determine whether any existing tunnel definitions match the entered tunnel definition; means for displaying results of the query in a scatter bar in another pane in the user interface, wherein locations of matching tunnel definitions are indicated by lines through the scatter bar; and means responsive to user input from the user for performing an action on a selected tunnel definition. - View Dependent Claims (16, 17)
-
-
18. A system including processor and memory for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses; means responsive to user selection, from a user, of a first line for displaying a list of filter rules applicable to a selected tunnel represented by the first line; and means for displaying a list of filter rules in a scatter bar, wherein location of the filter rules applicable to the selected tunnel are indicated by lines through the scatter bar; means responsive to user input, from the user, for performing an action on a selected filter rule. - View Dependent Claims (19, 20)
-
-
21. A computer program product in a computer readable medium for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses, wherein the graphical depiction of the tunnels can be selectively altered to show defined tunnels, show only active tunnels or show only inactive tunnels; means responsive to user selection, from a user, of a first line for displaying a selected tunnel definition represented by the first line; and means responsive to user input, from the user, for performing an action on the selected tunnel definition. - View Dependent Claims (22, 23, 24)
-
-
25. A computer program product in a computer readable medium for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a user interface having a first pane in which a tunnel definition can be entered; means responsive to user input from a user for running a query on an entered tunnel definition to determine whether any existing tunnel definitions match the entered tunnel definition; means for displaying results of the query in a scatter bar wherein locations of matching tunnel definitions are indicated by lines through the scatter bar; and means responsive to user input from the user for performing an action on a selected tunnel definition. - View Dependent Claims (26, 27)
-
-
28. A computer program product in a computer readable medium for administering tunneling on a firewall computer between a secure computer network and a nonsecure computer network, comprising:
-
means for presenting a graphical depiction of tunnels between addresses in the networks as lines connecting icons representing network addresses; means for responsive to user selection, from a user, of a first line for displaying a list of filter rules applicable to a selected tunnel represented by the first line; and means for displaying a list of filter rules in a scatter bar, wherein location of the filter rules applicable to the selected tunnel are indicated by lines through the scatter bar; means responsive to user input, from the user for performing an action on a selected filter rule. - View Dependent Claims (29, 30)
-
Specification