Claims
- 1. A method for allowing comprehension of a network security policy specification for a network by generating a human language representation of said policy, said specification having a text representation, said method comprising:
loading said text representation of said policy specification into a parser; said parser looping through all protocols, wherein said looped protocols are supported in said policy specification, said supported protocols having actions, and said supported protocols having associated rules;
for each supported protocol, sorting said rules in order of rank;
looping in ranked order through said sorted rules;
for each rule, generating a text description of said each rule; and if said text description not first generated text description, then appending said text description to a collection of already generated descriptions, else, creating said collection of already generated descriptions with said text description.
- 2. The method of claim 1, wherein said language is any of English, French, German, Spanish, Italian, Japanese, Chinese, and Korean.
- 3. The method of claim 1, wherein looping through all protocols is from highest protocol level to lowest protocol level.
- 4. The method of claim 1, wherein ranked order of sorted rules is from highest rank to lowest rank.
- 5. The method of claim 1, further comprising:
providing an HTML flag; and formatting said text description into an HTML table when said HTML flag is set.
- 6. The method of claim 1, wherein generating said text description of said each rule uses an algorithm.
- 7. The method of claim 6, wherein for said each rule said text description generating algorithm comprising:
outputting a name of said each rule; outputting a name of an agent, wherein said agent is a network monitor on said network; looping through all combinations of said protocol and said actions;
for each action, if said action is ignored, then applying said each rule to an entirety of said protocol, else applying said each rule to some or all of said actions; evaluating an immediate outcome of said each rule;
outputting a first disposition corresponding to said immediate outcome; outputting conditions on said first disposition, if any said conditions exist; evaluating a final outcome of said each rule;
outputting a second disposition corresponding to said final outcome; outputting conditions on said second disposition, if any said conditions exist; if said each rule applies to a target and/or initiator, outputting name(s) of said target and/or initiator, else outputting a term representing any entity; and outputting prerequisites, if any exist.
- 8. A system for allowing comprehension of a network security policy specification for a network by generating a language representation of said policy, said specification having a text representation, said system comprising:
means for loading said text representation of said policy specification into a parser; means for said parser looping through all protocols, wherein said looped protocols are supported in said policy specification, said supported protocols having actions, and said supported protocols having associated rules;
for each supported protocol, means for sorting said rules in order of rank;
means for looping in ranked order through said sorted rules;
for each rule, means for generating a text description of said each rule; and means for if said text description not first generated text description, then appending said text description to a collection of already generated descriptions, else, creating said collection of already generated descriptions with said text description.
- 9. The system of claim 8, wherein said language is English.
- 10. The system of claim 8, wherein means for looping through all protocols is from highest protocol level to lowest protocol level.
- 11. The system of claim 8, wherein ranked order of sorted rules is from highest rank to lowest rank.
- 12. The system of claim 8, further comprising:
means for providing an HTML flag; and means for formatting said text description into an HTML table when said HTML flag is set.
- 13. The system of claim 8, wherein means for generating said text description of said each rule uses an algorithm.
- 14. The system of claim 13, wherein for said each rule said text description generating algorithm comprising:
means for outputting a name of said each rule; means for outputting a name of an agent, wherein said agent is a network monitor on said network; means for looping through all combinations of said protocol and said actions;
for each action, if said action is ignored, means for applying said each rule to an entirety of said protocol, else applying said each rule to some or all of said actions; means for evaluating an immediate outcome of said each rule;
means for outputting a first disposition corresponding to said immediate outcome; means for outputting conditions on said first disposition, if any said conditions exist; means for evaluating a final outcome of said each rule;
means for outputting a second disposition corresponding to said final outcome; means for outputting conditions on said second disposition, if any said conditions exist; if said each rule applies to a target and/or initiator, means for outputting name(s) of said target and/or initiator, else outputting a term representing any entity; and means for outputting prerequisites, if any exist.
- 15. A method for generating a text description of a policy rule of a network security policy specification for a network, said rule associated with a protocol and actions, said method comprising:
outputting a name of said rule; outputting a name of an agent, wherein said agent is a network monitor on said network; looping through all combinations of said protocol and said actions;
for each action, if said action is ignored, then applying said rule to entirety of said protocol, else applying said rule to some or all of said actions; evaluating an immediate outcome of said rule;
outputting a first disposition corresponding to said immediate outcome; outputting conditions on said first disposition, if any said conditions exist; evaluating a final outcome of said rule;
outputting a second disposition corresponding to said final outcome; outputting conditions on said second disposition, if any said conditions exist; if said rule applies to a target and/or initiator, outputting name(s) of said target and/or initiator, else outputting a term representing any entity; and outputting prerequisites, in any exist.
- 16. A system for generating a text description of a policy rule of a network security policy specification for a network, said rule associated with a protocol and actions, said system comprising:
means for outputting a name of said rule; means for outputting a name of an agent, wherein said agent is a network monitor on said network; means for looping through all combinations of said protocol and said actions;
for each action, if said action is ignored, means for applying said rule to entirety of said protocol, else applying said rule to some or all of said actions; means for evaluating an immediate outcome of said rule;
means for outputting a first disposition corresponding to said immediate outcome; means for outputting conditions on said first disposition, if any said conditions exist; means for evaluating a final outcome of said rule;
means for outputting a second disposition corresponding to said final outcome; means for outputting conditions on said second disposition, if any said conditions exist; if said rule applies to a target and/or initiator, means for outputting name(s) of said target and/or initiator, else outputting a term representing any entity; and means for outputting prerequisites, in any exist.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a Continuation in Part to U.S. Ser. No. 09/479,781 filed Jan. 7, 2000 (Attorney Docket No. KROL0003) and claims priority to U.S. Ser. No. 60/212,126 filed Jun. 16, 2000 (Attorney Docket No. SECU0001PR).
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09479781 |
Jan 2000 |
US |
Child |
09878098 |
Jun 2001 |
US |