The subject matter of the application relates to an automated development and use of efficiently distributed filters in packet-oriented heterogeneous networks
The subject matter of the application relates to a method for establishing distributed filters in a packet-oriented network based on security defaults with the features of claim 1.
In packet-oriented networks (e.g. Ethernet networks or IP networks), which are connected to further networks, protection mechanisms must be used to
To this end, what are referred to as firewalls are used at selected points of the network, but packets filters are also configured in routers, service servers (e.g. Softswitch) or Ethernet switches (also Digital Subscriber Line Access Module DSLAM). The configurations of all these filters are to be aligned to one another so that
The alignment of the configurations, the creation of the respective configuration files and the implementation of the configurations are nowadays carried out manually. Management systems exist, which offer a coordinated configuration for a class of network elements (e.g. for the firewalls of a manufacturer in a network).
The problem underlying the subject matter of the application is one of creating a system, which effects a coordinated configuration for a number of classes of network elements, for the elements of different manufacturers and with automatic optimization of the distribution of functions.
The problem is resolved by the features of claim 1.
The network operator need not produce any protracted and error-prone configurations of security functions manually. He/she need not attempt to appropriately distribute the functions on the network elements manually.
Advantageous developments of the subject matter of the application are specified in the subclaims.
The subject matter of the application is described in more detail below, as an exemplary embodiment on a scale required for understanding, with reference to the figures, in which;
If the query in the decision point CTDB is positive (yes), a formal formulation of these guidelines is produced in the action point PFP (path filter policy) taking into consideration a security guideline Polcfg (policy configuration) supplied externally. In the action field CC (call classifier), a list of the relevant network elements is prepared as applicable to the further processing in consideration of the present access specification. By way of example, the function call classifier provides a set of IP addresses and interface names to the assignment specification “all routers”, with the function querying the topology database in order to obtain the necessary IP addresses. By way of example, the specification “all routers and management servers” translates into 10.0.0/8 and 10.1.1. In this way, the prefixes are advantageously aggregated in order to achieve a detailed description for “all routers”. In the action point PPS (path protocol specification), the protocol specification database Protocfg is queried in order to obtain a valid expression for statements such as “via management protocol”, this being an invariant specification which must be substantiated according to the protocol used. In the action field CFL (computed filter location), the best filter positions which are suited to a specific packet flow are determined. Since the paths, by way of which the access-controlled packet flows run, can change with the change in the network-internal routing, the CFL considers several paths and adds additional filters to additional nodes. The filter positioning function may provide an estimation relating to the security characteristics of the proposed configuration and furthermore an assessment as to how these characteristics change in the event of a change in the routing. In the action point filter syntax determination CFS (compute filter syntax), the correct syntax specification for the platform and the operating system of the individual nodes, where the filters are arranged, is determined with the aid of a syntax database SDB (syntax data base), in order to convert the hitherto incomplete filter statements into real, functional filter rules. To this end, XML stylesheet formatting can be advantageously used for the conversion to syntactically correct rules. In the action point EFS (export filter statement), the syntactically correct filter rules are provided in the topology database of the network management, from where they are routed via a node configuration facility NC (node configurator) to the respective nodes, where the filter rules are implemented.
The system according to the invention allows security guidelines to be predetermined to a network operator in an abstract formulation and the system then
The system receives a network description (topology, addresses, network elements) from a network management system NM for instance. In addition, a mapping specification is required, which generally specifies which functions support which network element (e.g. packet filter, stateful firewall, filtering on MAC address level). In addition, the system contains mapping specifications for the configuration of functions for network elements in the respective configuration language (e.g. command line interface CLI for different network elements such as Cisco routers, Juniper M/T, Juniper E, Ethernet switch by Siemens, Firewall by Checkpoint, etc.).
In a first step from the abstract formulation of the security guidelines, the system produces (if necessary) a formal formulation of these guidelines, and then optimizes the distribution of the functions onto the network elements and finally generates a configuration file for each network element in its configuration language.
Options and Enhancements
Number | Date | Country | Kind |
---|---|---|---|
10 2005 001 150.0 | Jan 2005 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2006/050053 | 1/5/2006 | WO | 00 | 8/19/2008 |