Mimic support address resolution
First Claim
1. A method for mimicking network devices, the method being performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, the method comprising the steps of:
- accessing a list of port identifiers corresponding to ports that are to be blocked;
creating a gate rule for each port identifier in the accessed list, each gate rule for blocking an incoming message from the external network or the local network which contains the corresponding port identifier from being redirected to one of a plurality of applications hosted in the computing device;
tracking a port identifier of a port opened by one of the plurality of applications;
determining if the port identifier of the opened port is equal to a port identifier in a gate rule;
accessing, in the case that the port identifier of the opened port is equal to a port identifier of a gate rule, the gate rule and modifying the gate rule from a blocking rule to a redirect rule for redirecting an incoming message from the external network or the local network which contains the port identifier of the opened port to the application which opened the port;
monitoring for a closing of the port opened by the application; and
accessing, in the case that the port opened by the application is closed, the gate rule having a port identifier equal to the port identifier of the opened port, and modifying the gate rule back from a redirect rule to a blocking rule.
0 Assignments
0 Petitions
Accused Products
Abstract
Mimicking network devices with a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, including obtaining an IP address of a device on the local network, determining an IP address for the second network interface card based on the obtained IP address of the device on the local network, and assigning the determined IP address to the second network interface card.
38 Citations
4 Claims
-
1. A method for mimicking network devices, the method being performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, the method comprising the steps of:
-
accessing a list of port identifiers corresponding to ports that are to be blocked; creating a gate rule for each port identifier in the accessed list, each gate rule for blocking an incoming message from the external network or the local network which contains the corresponding port identifier from being redirected to one of a plurality of applications hosted in the computing device; tracking a port identifier of a port opened by one of the plurality of applications; determining if the port identifier of the opened port is equal to a port identifier in a gate rule; accessing, in the case that the port identifier of the opened port is equal to a port identifier of a gate rule, the gate rule and modifying the gate rule from a blocking rule to a redirect rule for redirecting an incoming message from the external network or the local network which contains the port identifier of the opened port to the application which opened the port; monitoring for a closing of the port opened by the application; and accessing, in the case that the port opened by the application is closed, the gate rule having a port identifier equal to the port identifier of the opened port, and modifying the gate rule back from a redirect rule to a blocking rule. - View Dependent Claims (2)
-
-
3. An apparatus having first and second network interface cards, the first network interface card connecting the apparatus to an external network and the second network interface card connecting the apparatus to a local network, and comprising at least one processor executing steps stored in a memory to perform the steps of:
-
accessing a list of port identifiers corresponding to ports that are to be blocked; creating a gate rule for each port identifier in the accessed list, each gate rule for blocking an incoming message from the external network or the local network which contains the corresponding port identifier from being redirected to one of a plurality of applications hosted in the apparatus; tracking a port identifier of a port opened by one of the plurality of applications; determining if the port identifier of the opened port is equal to a port identifier in a gate rule; accessing, in the case that the port identifier of the opened port is equal to a port identifier of a gate rule, the gate rule and modifying the gate rule from a blocking rule to a redirect rule for redirecting an incoming message from the external network or the local network which contains the port identifier of the opened port to the application which opened the port; monitoring for a closing of the port opened by the application; and accessing, in the case that the port opened by the application is closed, the gate rule having a port identifier equal to the port identifier of the opened port, and modifying the gate rule back from a redirect rule to a blocking rule. - View Dependent Claims (4)
-
Specification