Network adapter firewall system and method
First Claim
Patent Images
1. A network adapter, comprising:
- at least one designated trusted port;
at least one designated untrusted port; and
a processor provisioned in the network adapter, configured for providing firewall capabilities, and coupled within a computer, the network adapter coupled to a network via the ports, wherein network traffic from the at least one trusted port bypasses the processor, wherein the network adapter processor is configured for;
assembling the network traffic into packets;
performing an initial determination whether certain assembled incoming packets are of interest for screening activities based on determining a timing of the certain assembled incoming packets and content within the certain assembled incoming packets;
bypassing the firewall capabilities and communicating the certain assembled incoming packets directly to a network driver of the computer if the certain assembled incoming packets are determined to not be of interest;
determining whether the certain assembled incoming packets of interest violate a plurality of predetermined rules for packet transmissions, wherein the plurality of predetermined rules include at least one rule based on a security level selected from among a plurality of security levels, and wherein each security level includes specific rules to indicate whether incoming packets associated with a particular protocol violate the security level specific rule; and
denying access to certain areas of the computer based on a violation of the predetermined rules.
9 Assignments
0 Petitions
Accused Products
Abstract
A network adapter system and associated method are provided. Included is a network adapter having a plurality of designated trusted and untrusted ports. The network adapter includes a processor coupled to a computer. Such processor is further coupled to a network via the ports. In use, the processor is configured for conditionally preventing network traffic from accessing the computer from the network via the untrusted ports and/or preventing unauthorized software from accessing the network in an untrusted manner from the computer.
-
Citations
21 Claims
-
1. A network adapter, comprising:
-
at least one designated trusted port; at least one designated untrusted port; and a processor provisioned in the network adapter, configured for providing firewall capabilities, and coupled within a computer, the network adapter coupled to a network via the ports, wherein network traffic from the at least one trusted port bypasses the processor, wherein the network adapter processor is configured for; assembling the network traffic into packets; performing an initial determination whether certain assembled incoming packets are of interest for screening activities based on determining a timing of the certain assembled incoming packets and content within the certain assembled incoming packets; bypassing the firewall capabilities and communicating the certain assembled incoming packets directly to a network driver of the computer if the certain assembled incoming packets are determined to not be of interest; determining whether the certain assembled incoming packets of interest violate a plurality of predetermined rules for packet transmissions, wherein the plurality of predetermined rules include at least one rule based on a security level selected from among a plurality of security levels, and wherein each security level includes specific rules to indicate whether incoming packets associated with a particular protocol violate the security level specific rule; and denying access to certain areas of the computer based on a violation of the predetermined rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for screening network traffic by a processor of a network adapter configured for providing firewall capabilities, the network adapter being coupled to a computer and further coupled to a network via at least one designated trusted port and at least one designated untrusted port, wherein network traffic from the at least one trusted port bypasses the processor, the method comprising:
-
assembling the network traffic into packets; performing an initial determination whether certain assembled incoming packets are of interest for screening activities based on determining a timing of the certain assembled incoming packets and content within the certain assembled incoming packets; bypassing the firewall capabilities and communicating the certain assembled incoming packets directly to a network driver of the computer if the certain assembled incoming packets are determined to not be of interest; determining whether the certain assembled incoming packets of interest violate a plurality of predetermined rules for packet transmissions, wherein the plurality of predetermined rules include at least one rule based on a security level selected from among a plurality of security levels, and wherein each security level includes specific rules to indicate whether incoming packets associated with a particular protocol violate the security level specific rule; and denying access to certain areas of the computer based on a violation of the predetermined rules.
-
Specification