Integrated Development Environment (IDE) for Network Security Configuration Files
First Claim
1. A method comprising:
- in a computer-implemented integrated development environment;
preprocessing a configuration file including security rules, each security rule including multiple security rule parameters to cause a security appliance to apply a network access control when a source attempts to access a destination, at least one of the destination or the source in some of the security rules represented as a respective object name, each object name associated with an object value defined in an object definition in the configuration file, the preprocessing including mapping each object name to the associated object value based on the object definition for that object name;
responsive to the configuration file being opened in an editor through which a user interacts with the security rules, providing the editor with access to results of the preprocessing;
searching each security rule in the opened configuration file for object names therein;
linking each object name found in the searching to the associated object value mapped thereto by the mapping performed during the preprocessing; and
receiving a selection of a particular object name in a security rule of the opened configuration file and generating for display the associated object value linked to the selected object name.
1 Assignment
0 Petitions
Accused Products
Abstract
An integrated development environment (IDE) preprocesses a configuration file including security rules. The preprocessing maps object names in the security rules to associated object values based on object definitions for the object names. Responsive to the configuration file being opened in an editor, the IDE provides the editor with access to preprocessing results. Each security rule in the opened configuration file is searched for object names. The IDE links each object name found in the search to an associated object value mapped thereto by the mapping performed during the preprocessing. The IDE receives a selection of an object name in a security rule of the opened configuration file and generates for display the associated object value linked to the selected object name.
30 Citations
20 Claims
-
1. A method comprising:
in a computer-implemented integrated development environment; preprocessing a configuration file including security rules, each security rule including multiple security rule parameters to cause a security appliance to apply a network access control when a source attempts to access a destination, at least one of the destination or the source in some of the security rules represented as a respective object name, each object name associated with an object value defined in an object definition in the configuration file, the preprocessing including mapping each object name to the associated object value based on the object definition for that object name; responsive to the configuration file being opened in an editor through which a user interacts with the security rules, providing the editor with access to results of the preprocessing; searching each security rule in the opened configuration file for object names therein; linking each object name found in the searching to the associated object value mapped thereto by the mapping performed during the preprocessing; and receiving a selection of a particular object name in a security rule of the opened configuration file and generating for display the associated object value linked to the selected object name. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A apparatus comprising:
-
a network interface unit configured to enable communications over a network; and a processor, coupled to the network interface unit, configured to, in a computer implemented integrated development environment; preprocess a configuration file including security rules, each security rule including multiple security rule parameters to cause a security appliance to apply a network access control when a source attempts to access a destination, at least one of the destination or the source in some of the security rules represented as a respective object name, each object name associated with an object value defined in an object definition in the configuration file, wherein the processor is configured to preprocess by mapping each object name to the associated object value based on the object definition for that object name; responsive to the configuration file being opened in an editor through which a user interacts with the security rules, provide the editor with access to results of the preprocessing; search each security rule in the opened configuration file for object names therein; link each object name found in the searching to the associated object value mapped thereto by the mapping performed during the preprocessing; and receive a selection of a particular object name in a security rule of the opened configuration file and generating for display the associated object value linked to the selected object name. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method comprising:
in a computer implemented integrated development environment; preprocessing a configuration file including security rules, each security rule configured to cause a security appliance to apply a network access control when a source attempts to access a destination, the preprocessing including classifying the security rules in the configuration file into security rule classifications based on commonality between the security rules; responsive to the configuration file being opened in an editor through which a user interacts with the security rules, providing the editor with access to results of the preprocessing; receiving a selection of a security rule in the opened configuration file; responsive to the selection, determining whether the selected security rule is classified into any of the security rule classifications; and if it is determined that the selected security rule is classified into one of the security rule classifications, generating for display the security rules in the one of the security rule classifications. - View Dependent Claims (18, 19, 20)
Specification