Architecting the Lumeta Firewall Analyzer

نویسنده

  • Avishai Wool
چکیده

Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverseengineering existing firewall configurations should be important components of every corporation’s network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendor-specific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that will allow them to analyze the policy on a firewall. The first passive, analytical, firewall analysis system was the Fang prototype system [MWZ00]. This was the starting point for the new Lumeta Firewall Analyzer (LFA) system. LFA improves upon Fang in many ways. The most significant improvements are that human interaction is limited to providing the firewall configuration, and that LFA automatically issues the “interesting” queries and displays the outputs of all of them, in a way that highlights the risks without cluttering the high-level view. This solves a major usability problem we found with Fang, namely, that users do not know which queries to issue. The input to the LFA consists of the firewall’s routing table, and the firewall’s configuration files. The LFA parses these various low-level, vendor-specific, files, and simulates the firewall’s behavior against all the packets it could possibly receive. The simulation is done completely offline, without sending any packets. The administrator gets a comprehensive report showing which types of traffic the firewall allows to enter from the Internet into the customer’s intranet and which types of traffic are allowed out of the intranet. The LFA’s report is presented as a set of explicit web pages, which are rich with links and cross references to further detail (allowing for easy drill-down). This paper describes the design and architecture of the LFA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible Rule-Based Programming for Autonomic Computing

The ECAP rule programming language DLRL is currently being developed for architecting autonomic systems by coupling deduction and interaction. Three of the fundamental properties of autonomic systems, namely self-configuration, self-optimization and self-healing, are provided by DLRL: high-level program specification that can be userdefined for self-configuration; program introspection that all...

متن کامل

Intranet Security via Firewalls

Firewalls, forefront defense for corporate intranet security, filter traffic by comparing arriving packets against stored security policies in a sequential manner. In a large organization, traffic typically goes through several firewalls before it reaches the destination. Setting polices device-by-device in an organization with large number of firewalls may easily create conflicts in policies. ...

متن کامل

The Process of Architecting for Software / System Engineering

With the advent of potent network technology, software/system engineering has evolved from a traditional platform-centric focus into a network-centric paradigm where the " system of systems " perspective has been the norm. Under this paradigm, architecting has become a critical process in the life cycle of software/system engineering. The need for a structured description of the architecting pr...

متن کامل

QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services

Web services are expected to play significant role for message communications over internet applications. Most of the future work is web security. Online shopping and web services are increasing at rapid rate. In this paper we presented the fundamental concepts related to Network security, web security threats. QoS web service security intrusion detection is important concern in network communi...

متن کامل

ScienceDirect 24 th CIRP Design Conference Communication in multidisciplinary systems architecting

Systems architecting is multidisciplinary by nature. It is interesting to note that the methods and tools that are developed and presented in literature are mostly based on one or a very limited number of formalisms. This means that an often large part of the stakeholders involved in the architecting process are hindered in the understanding of, and contributing to the architecture. The paper i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001