Claims
- 1. A method for generating a configuration file for at least one firewall in a network, said network including a plurality of hosts, said method comprising the steps of:
receiving a definition for a plurality of roles that specify the ability of a host to send and receive packets, wherein each of said roles may be assigned to said hosts independently of a topology of said network, such that said hosts inherit said definitions associated with an assigned role; receiving an assignment of said roles to said hosts in said network; and generating rules for said hosts based on said assigned roles, said rules determining whether a packet is passed to a destination host.
- 2. The method of claim 1, wherein a configuration file is generated for a plurality of firewalls in said network.
- 3. The method of claim 1, wherein a security policy for said network is expressed in terms of said roles defining network capabilities of sending and receiving services.
- 4. The method of claim 1, wherein a plurality of said roles are combined into role-groups that may be assigned to one or more hosts.
- 5. The method of claim 1, wherein a plurality of said hosts are combined into a host-group that may be assigned a role or a role-group.
- 6. The method of claim 1, further comprising the step of providing a visual representation of the structure of said hosts in said network.
- 7. The method of claim 1, further comprising the step of providing a visual representation of a set of rules in said configuration file.
- 8. The method of claim 1, wherein said generating step is performed by a vendor-specific compiler that produces a vendor-specific firewall configuration file.
- 9. A method of generating a security policy for a network, said network including a plurality of hosts, said method comprising the steps of:
receiving a definition for a plurality of roles that specify the ability of a host to send and receive packets, wherein each of said roles may be assigned to said hosts independently of a topology of said network, such that said hosts inherit said definitions associated with an assigned role; receiving an assignment of said roles to said hosts in said network; and generating said security policy from said received definitions and assignments.
- 10. The method of claim 9, further comprising the step of translating said security policy into at least one configuration file for a firewall on said network.
- 11. The method of claim 10, wherein said configuration files are generated for a plurality of firewalls in said network.
- 12. The method of claim 9, wherein a plurality of said roles are combined into a role-group that may be assigned to a host.
- 13. The method of claim 9, wherein a plurality of said hosts are combined into a host-group that may be assigned a role or role-groups.
- 14. The method of claim 9, further comprising the step of providing a visual representation of the structure of said hosts in said network.
- 15. A compiler for generating a configuration file for a firewall in a network, said network including a plurality of hosts, comprising:
a memory for storing computer-readable code; and a processor operatively coupled to said memory, said processor configured to execute said computer-readable code, said computer-readable code configuring said processor to:
receive a definition for a plurality of roles that specify the ability of a host to send and receive packets, wherein each of said roles may be assigned to said hosts independently of a topology of said network, such that said hosts inherit said definitions associated with an assigned role; receive an assignment of said roles to said hosts in said network; and generate rules for said hosts based on said assigned roles, said rules determining whether a packet is passed to a destination host.
- 16. A system for generating a security policy for a network, said network including a plurality of hosts, said system comprising:
a memory for storing computer-readable code; and a processor operatively coupled to said memory, said processor configured to execute said computer-readable code, said computer-readable code configuring said processor to:
receive a definition for a plurality of roles that specify the ability of a host to send and receive packets, wherein each of said roles may be assigned to said hosts independently of a topology of said network, such that said hosts inherit said definitions associated with an assigned role; receive an assignment of roles to said hosts in said network; and generate said security policy from said received definitions and assignments.
CROSS REFERENCE TO RELATED APPLICATION
[0001] The application is a continuation of U.S. patent application Ser. No. 09/240,934, filed Jan. 29, 1999.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09240934 |
Jan 1999 |
US |
Child |
10336874 |
Jan 2003 |
US |