×

System and method for implementing a bubble policy to achieve host and network security

  • US 7,376,965 B2
  • Filed: 05/14/2001
  • Issued: 05/20/2008
  • Est. Priority Date: 05/15/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. In a network security system having a plurality of bubbles, where each bubble has a plurality of bubble partitions, a method of creating a structured access list template, the method comprising:

  • dividing a first access list template into a plurality of sections, where each section includes rules that implement a function;

    assigning a first plurality of network devices to a first bubble;

    assigning a second plurality of network devices to a second bubble;

    creating an inbound local rule group for the first bubble;

    creating an outbound local rule group for the first bubble;

    creating an inbound remote rule group for the first bubble for use by the second bubble for allowing access from the first plurality of network devices of the first bubble;

    creating an outbound remote rule group for the first bubble for use by the second bubble for allowing access to the plurality of network devices of the first bubble;

    arranging the inbound local rule group and the outbound local rule group in one of the plurality of sections of the first access list template; and

    arranging the inbound remote rule group and the outbound remote rule group in one of the plurality of sections of the first access list template.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×