Claims
- 1. A method of restricting packet transfer to a computer across a network, wherein the computer includes a network interface device coupled to the network and wherein the network interface device includes a packet filter, the method comprising:
providing a security server connected to the network; receiving a packet at the network interface device; determining, at the network interface device, whether the packet is an authorized transaction; if the packet is not an authorized transaction, routing the packet to the security server; determining, at the security server, whether the packet is an authorized transaction; and if the security server determines that the packet is an authorized transaction, configuring the network interface device to accept similar transactions.
- 2. The method according to claim 1, wherein determining whether the packet is an authorized transaction at the security server includes authenticating the source of the packet.
- 3. The method according to claim 1, wherein configuring includes filtering the packet using a packet filter.
- 4. The method according to claim 3, wherein filtering includes applying quality of service policies to the packet.
- 5. The method according to claim 1, wherein configuring includes initiating end-to-end IPSEC for similar transactions.
- 6. The method according to claim 1, wherein configuring includes encrypting a packet to be transferred to the network interface device, transferring the encrypted packet to the network interface device, decrypting the encrypted packet at the network interface device, and configuring the network interface device as a function of the decrypted packet.
- 7. The method according to claim 1, wherein determining whether the packet is an authorized transaction at the security server includes configuring the network interface device to reject similar transactions if the packet is not an authorized transaction.
- 8. The method according to claim 1, wherein determining whether the packet is an authorized transaction at the security server further includes configuring other network interface devices to reject similar transactions if the packet is not an authorized transaction.
- 9. An article comprising a computer readable medium having instructions thereon, wherein the instructions, when executed in a computer, create a system for executing the method of claim 1.
- 10. A method of restricting packet transfer from a computer across a network, wherein the computer includes a network interface device coupled to the network and wherein the network interface device includes a packet filter, the method comprising:
providing a security server connected to the network; receiving a packet at the network interface device; determining, at the network interface device, whether the packet is an authorized transaction; if the packet is not an authorized transaction, routing the packet to the security server; determining, at the security server, whether the packet is an authorized transaction; and if the security server determines that the packet is an authorized transaction, configuring the network interface device to permit similar transactions.
- 11. The method according to claim 10, wherein determining, at the network interface device, whether the packet is an authorized transaction at the network interface device includes comparing the source address to the host address.
- 12. The method according to claim 10, wherein determining whether the packet is an authorized transaction at the security server includes authenticating the source of the packet.
- 13. The method according to claim 10, wherein configuring includes filtering the packet using a packet filter.
- 14. The method according to claim 13, wherein filtering includes applying quality of service policy to the packet.
- 15. The method according to claim 10, wherein configuring includes initiating end-to-end IPSEC for similar transactions.
- 16. The method according to claim 10, wherein configuring includes encrypting a packet to be transferred to the network interface device, transferring the encrypted packet to the network interface device, decrypting the encrypted packet at the network interface device, and configuring the network interface device as a function of the decrypted packet.
- 17. The method according to claim 10, wherein determining whether the packet is an authorized transaction at the security server includes configuring the network interface device to reject similar transactions if the packet is not an authorized transaction.
- 18. The method according to claim 10, wherein determining whether the packet is an authorized transaction at the security server further includes configuring other network interface devices to reject similar transactions if the packet is not an authorized transaction.
- 19. An article comprising a computer readable medium having instructions thereon, wherein the instructions, when executed in a computer, create a system for executing the method of claim 10.
- 20. A method of limiting source spoofing in the transfer of packets from a computer across a network, wherein the computer includes a network interface device coupled to the network, wherein the computer has a computer address and wherein the network interface device includes a packet filter, the method comprising:
transferring a packet from the computer to the network interface device, wherein the packet includes a source address; examining the packet within the network interface device, wherein examining includes comparing the source address to the computer address; and if the source address matches the computer address, placing the packet on the network.
- 21. The method of claim 20, wherein examining the packet further includes forwarding the packet to a security server.
- 22. The method of claim 21, wherein forwarding includes encrypting the packet and transferring the encrypted packet to the security server.
- 23. An article comprising a computer readable medium having instructions thereon, wherein the instructions, when executed in a computer, create a system for executing the method of claim 20.
- 24. A computer system, comprising:
a network; a computer connected to the network through a network interface device; and a security server; wherein the network interface device includes logic for transmitting information from the network interface device to the security server independent of the computer and wherein the security server configures the network interface device as a function of the transmitted information.
- 25. The system of claim 24, wherein the logic includes an encryption circuit for encrypting data to be transferred from the network interface device to the security server.
- 26. The system of claim 24, wherein the security server includes means for authenticating a user to the system.
- 27. The system of claim 24, wherein the security server includes audit analysis.
- 28. A computer system, comprising:
a network; a computer connected to the network; a router connected to the network, wherein the router includes a packet filter; and a security server; wherein the router receives packets from the network, filters the packets using the packet filter to detect unauthorized packets and transmits unauthorized packets to the security server independent of the computer; and wherein the security server configures the router packet filter after analysis of the unauthorized packets.
- 29. The system of claim 28, wherein the router includes an encryption circuit for decrypting encrypted packets and for encrypting the decrypted packets before forwarding them to their destination.
- 30. The system of claim 29, wherein the security server includes an encryption circuit and wherein communication from the security server to the router can be encrypted by the security server's encryption circuit.
- 31. The system of claim 28, wherein the security server includes means for authenticating a user to the system.
- 32. The system of claim 28, wherein the security server includes audit analysis.
- 33. A computer system, comprising:
a network; a computer connected to the network through a network interface device; and a security server capable of communicating with the network interface device; wherein the network interface device includes a packet filter, wherein the packet filter includes quality of service control for managing traffic flowing through the network interface device; and wherein the security server transfers configuration information to the network interface device to modify quality of service parameters on the network interface device as a function of changing security conditions within the computer system.
- 34. The system of claim 33, wherein the logic includes an encryption circuit for encrypting data to be transferred from the network interface device to the security server.
- 35. The system of claim 33, wherein the security server includes means for authenticating a user to the system.
- 36. The system of claim 33, wherein the computer system further comprises a router having a packet filter, wherein the packet filter includes quality of service control for managing traffic flowing through the router and wherein the security server transfers configuration information to the router to modify quality of service parameters on the router as a function of changing security conditions within the computer system
- 37. A distributed firewall system, comprising:
a plurality of computers, including a first computer, wherein the plurality of computers are connected through network interface cards to a network; and a security server connected to the network; wherein the network interface card for the first computer includes logic which selectively forwards packets addressed to the first computer from the network interface card to the security server.
- 38. The system according to claim 37, wherein the network interface card for the first computer includes encryption and decryption logic.
- 39. The system according to claim 38, wherein the security server includes encryption and decryption logic, wherein the encryption and decryption logic encrypts packets to be transferred to the network interface card for the first computer.
- 40. The system according to claim 37, wherein the network interface card for the first computer includes a packet filter and wherein the packet filter detects packets to be forwarded to the security server.
- 41. The system according to claim 37, wherein the network interface card for the first computer includes encryption and decryption logic and wherein the packets to be forwarded to the security server are encrypted on the network interface card before being transmitted to the security server.
- 42. A method of providing computer security services to the computer of a remote user, comprising:
providing a security server; installing a network interface device in the computer, wherein the network interface device includes logic for transmitting information from the network interface device to the security server independent of the computer; transmitting information from the network interface device to the security server; and configuring the network interface device as a function of the information transmitted from the network interface device to restrict packet transfer to the network interface device.
- 43. The method of claim 42, wherein transmitting includes initiating a session, wherein initiating a session includes authenticating the user to the security server; and
wherein configuring the network interface device includes restricting packet transfer as a function of the user.
- 44. The method of claim 42, wherein the network interface device includes a packet filter and wherein configuring the network interface device includes transferring packet filtering rules from the security server to the network interface device, wherein transferring includes modifying the packet filtering rules as a function of changing security conditions.
- 45. The method of claim 42, wherein the network interface device includes a packet filter, wherein the packet filter includes quality of service control for managing traffic flowing through the network interface device; and
wherein configuring the network interface device includes transferring information from the security server to the network interface device modifying quality of service parameters on the network interface device as a function of changing security conditions.
- 46. An article comprising a computer readable medium having instructions thereon, wherein the instructions, when executed in a computer, create a system for executing the method of claim 42.
RELATED APPLICATIONS
[0001] This application is a continuation under 35 U.S.C. 111(a) of International Application No. PCT/US01/17153 filed May 25, 2001 and published in English as WO 01/91418 A2 on Nov. 29, 2001, which claimed priority from U.S. application Ser. No. 09/578,314 filed May 25, 2002 (now abandoned), which applications and publication are incorporated herein by reference.
Continuations (1)
|
Number |
Date |
Country |
Parent |
PCT/US01/17153 |
May 2001 |
US |
Child |
10304469 |
Nov 2002 |
US |