×

Automatically generating rules for connection security

  • US 8,056,124 B2
  • Filed: 07/15/2005
  • Issued: 11/08/2011
  • Est. Priority Date: 07/15/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a processor executing computer-executable instructions stored in a memory of a computer system configured to create a security policy for a firewall policy and a connection policy, the executed method further comprising:

  • providing a user interface through which a user can specify security rules relating to the firewall policy and the connection policy; and

    automatically generating by the processor firewall rules and connection rules from the specified security rules, the security rules being higher level rules than the firewall rules and the connection rules, the generated firewall rules for input into a firewall engine and specifying addresses of computing devices that are authorized to send data to the computer system and the generated connection rules for input into an internet protocol security engine and specifying an authentication protocol for authenticating a computing device that sends data to the computer system and a confidentiality protocol and an integrity protocol for ensuring the confidentiality and integrity of data sent to the computer system wherein a connection rule specifies behavior of an IP security protocol and specifies key exchange, data protection, and authentication associated with a connection the connection rules being generated by, for each security rule,when a local address of the security rule is unspecified, setting the local address of the connection rule to specify the computer system;

    when a remote address of the security rule is unspecified, setting the remote address of the connection rule to specify any computer system;

    when remote users are specified in a remote user authorization list of the security rule, terminating the generating of the connection rule if user authentication is not specified in a default authentication suite; and

    determining whether a matching connection rule has already been created;

    after determining that a matching connection rule has already been created, setting the authentication and crypto suites of the connection rule based on the authentication and crypto suites of the matching connection security rule; and

    after determining that a matching connection security rule has not already been created, setting the authentication and crypto suites of the connection security rule to default authentication and crypto suites.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×