Computing networks can include multiple network devices such as routers, switches, hubs, servers, desktop PCs, laptops, workstations, and peripheral devices, e.g., printers, facsimile devices, and scanners, networked together across a local area network (LAN) and/or wide area network (WAN).
Networks can include a network appliance (NA), e.g., a checking functionality (CF) such as an intrusion prevention system (IPS) and/or intrusion detection system (IDS) that serves to detect unwanted intrusions/activities to the computer network. Unwanted network intrusions/activities may take the form of attacks through computer viruses and/or hackers, among others, trying to access the network. To this end, a CF can identify different types of suspicious network traffic and network device usage that can not be detected by a conventional firewall. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, denial of service attacks, port scans, unauthorized logins and access to sensitive files, viruses, Trojan horses, and worms, among others. An NA can also include other forms of diagnostic devices, accounting devices, counting devices, etc., operable on network packets of interest.
Network appliances are a class of products that provide network security services such as firewalling, intrusion detection, content filtering, spam filtering, and/or virtual private networks (VPNs). Network appliances arose and evolved independently of traditional high-speed network infrastructure devices such as routers, switches, bridges, etc. However, the underpinnings of modern network appliances are in fact a bridging or routing engine that in many instances replicates the functionality of the traditional high-speed network infrastructure device.
Network appliances, e.g., IPS/IDSs, counting/accounting, or diagnostic devices, may be slower than other network devices, such as switches and routers, and hence have slower throughput. Additionally, network appliances tend to replicate bridging and routing functions that have already been well-optimized and are significantly faster in network infrastructure devices, e.g., routers, switches, etc. For example, network devices have become more “intelligent” in their decision making capability at very fast speeds, e.g., 100+Gbps. In contrast, network appliances can be several orders of magnitude slower in terms of throughput as compared to such modern high-speed network devices. Network appliances also tend to introduce latency issues when compared to network devices. Latency is a troublesome facet to introduce into a network because it negatively effects real time applications such as voice over IP (VoIP), e.g., latency can cause choppiness in conversations, etc., or storage area networks (SANs), e.g., latency can cause slow file operations.
Previous approaches use network appliances to examine each packet to determine what security-related action should be taken with respect to the packet. In some cases, the network appliance can signal the network device that a port should be disabled. However, if this port is shared among many users, or if a host is shared among many applications, disabling the port penalizes too many users.
Embodiments of the present invention may include network devices and methods for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port according to the adjusted access control list.
In some embodiments, the method includes adjusting the access control list (ACL) in relation to a new client sending packets through the particular port. Some embodiments also include adjusting the ACL in relation to a change in behavior of a client sending packets through the particular port. According to various embodiments, the ACL can be adjusted such that packets later received from the particular port are: dropped, sent to the checking functionality with an applied rate limit, forwarded on their original path with an applied rate limit, forwarded on their original path without an applied rate limit, and various combinations thereof. Embodiments described herein allow for the efficient collaboration of a checking functionality and a network device to improve the efficacy of the checking functionality by allowing it to operate on other traffic while the network device handles known bad traffic.
As used herein, “checking functionality” (CF) means an intrusion prevention system (IPS), an intrusion detection system (IDS), and can also include other forms of security devices, diagnostic devices, accounting devices, counting devices, etc., operable on network packets of interest, whether connected as a network appliance (e.g., 250-1 or 250-2 as described in connection with
A checking functionality can include a network appliance supplied by a third party vendor of network security devices or otherwise. As used herein, the term “network appliance” is used to mean an add-on device, e.g., “plug-in” or “application module” (as defined below), to a network as contrasted with a “network device”, e.g., router, switch, and/or hub, etc., which are sometimes considered more as “backbone” component devices to a network. The operations of such devices will be recognized and understood by one of ordinary skill in the art. A checking functionality can be provided in the form of software, application modules, application specific integrated circuit (ASIC) logic, and/or executable instructions operable on the systems and devices shown herein or otherwise.
“Software”, e.g., computer executable instructions as used herein, includes a series of executable instructions that can be stored in memory and executed by the hardware logic of a processor (e.g., transistor gates) to perform a particular task. Memory, as the reader will appreciate, can include random access memory (RAM), read only memory (ROM), non-volatile memory (such as Flash memory), etc.
An “application module” means a self-contained hardware or software component that interacts with a larger system. As the reader will appreciate a software module may come in the form of a file and handle a specific task within a larger software system. A hardware module may be a separate set of logic, e.g., transistor/circuitry gates, that “plug-in” as a card, appliance, or otherwise, to a larger system/device.
In some embodiments, logic in the form of hardware, e.g. application specific integrated circuits (ASICs) on a network chip on a network device, receives a network packet. The logic processes network packets on ingress to a network chip, e.g., using an ASIC for processing well-known packet header information, such as layer 2 to layer 4, associated with the network packets. The logic is further operable to establish a bi-directional communication path between the network chip and a checking functionality (CF) as is described in more detail in copending, commonly assigned U.S. patent application Ser. No. 11/809,512, entitled “Packet Processing”, by the same inventors, filed Jun. 1, 2007, which is incorporated in full herein.
As used herein, a “network” can provide a communication system that links two or more computers and peripheral devices, and allows users to access resources on other computers and exchange messages with other users. A network allows users to share resources on their own systems with other network users and to access information on centrally located systems or systems that are located at remote offices. It may provide connections to the Internet or to the networks of other organizations. Users may interact with network-enabled software applications to make a network request, such as to get a file or print on a network printer. Applications may also communicate with network management software, which can interact with network hardware to transmit information between devices on the network.
The example network of
The network embodiment of
The designators “N” and “M” are used to indicate that a number of fat or thin clients can be attached to the network 100. The number that N represents can be the same or different from the number represented by M. The embodiment of
Additionally as the reader will appreciate, a number of mobile devices, e.g., wireless device 121, can connect to the network 100 via a wireless air interface (e.g., 802.11) which can provide a signal link between the mobile device 121 and an access point (AP) 119. The AP 119 serves a similar role to a base station in a wireless network, as the same will be known and understood by one of ordinary skill in the art. As shown in
Program instructions, as described in more detail here, can reside on some network devices. For example, program instructions in the form of firmware and/or application modules can be resident on the network 100 in the memory of a network management station 112 and/or one or more routers, 116-1, 116-2, 116-3, 116-4, hubs, and/or switches 118-1, 118-2, 118-3, 118-4, 118-5, etc., and can be executable by the logic (e.g., hardware in the form of transistor gates) thereon.
As one of ordinary skill in the art will appreciate, each network device in the network 100 can be physically associated with a port of a switch to which it is connected. Information in the form of network packets, e.g., data packets, can be passed through the network 100. Users, e.g., clients, physically connect to the network through ports or APCs 123 on the network 100. Data frames, or packets, can be transferred between network devices by means of a network device's, e.g., switch's, logic link control (LLC)/media access control (MAC) circuitry, as associated with ports on a network device. A network switch forwards network packets received from a transmitting network device to a destination network device based on the header information in received network packets. A network device can also forward packets from a given network to other networks through ports on one or more other network devices. As the reader will appreciate, an Ethernet network is described herein. However, embodiments are not limited to use in an Ethernet network, and may be equally well suited to other network types, e.g., asynchronous transfer mode (ATM) networks, etc.
According to embodiments described herein, a checking functionality, e.g., a network appliance intrusion system (IS) which serves to detect and/or evaluate suspicious activity, can be located in a “centralized” location in network 100. As used herein, the term “centralized” means a particular location in the network 100 accessible from a number of network devices, e.g., 118-1, . . . , 118-5, whether or not the topographical location is in-line with a given packet's intended network path or topographically central to the network 100. To further explain, in network 100 of
However, the term “central” in central network devices is not to be confused with the use of the term “centralized”. In some embodiments, a “centralized” CF, as defined above, may be integral to or associated with an edge network device. That is, the topographical location in a given network of the CF can be in association with switch 118-1, connected to “fat” and “thin” clients, 114-1, . . . , 114-N, and 115-1, . . . , 115-M, in
In the example network implementation of
In certain embodiments, the checking functionality performed by the network appliance 150 can perform the role of an intrusion prevention system (IPS), as may be supplied by a third party vendor of network security devices. In certain embodiments, the checking functionality performed by the network appliance 150 can perform the role of an intrusion detection system (IDS), or another diagnostic device, accounting device, counting device, etc., as may be supplied by a third party vendor. Embodiments are not limited to the examples given here. The various configurations and operations of such different checking functionalities are known and understood by one of ordinary skill in the art.
As described in connection with
As shown in
As shown in the embodiment of
The network appliances 250-1 and 250-2 can serve as checking functionalities. As also shown in the embodiment of
Although the illustration of
As described in connection with
In the embodiment of
As shown in the example embodiment of
In the example embodiment of
In the packet processing example embodiment illustrated in
After processing the packets, the CF, e.g., 350 in
If the information 410 indicates that the ACL should be adjusted to drop additional packets received from a particular port, then logic can adjust the ACL accordingly at 408. If the information 412 indicates that a portion of additional packets received from a particular port should be forwarded to the CF with an applied rate limit and the remainder of the packets should be dropped, logic can adjust the ACL accordingly at 414. If the information 416 indicates that additional packets received from the particular port should be forwarded on the original path of the packets with an applied rate limit, logic can adjust the ACL accordingly at 418. If the information 420 indicates that additional packets received from a particular port should be forwarded on the original path of the packets without an applied rate limit, logic can adjust the ACL accordingly at 422. The examples given here are illustrative and do not limit the range of adjustments that could be made to an ACL in response to information received from a CF related to packets processed by the CF. The adjusted ACL, as encoded with the appropriate adjustments is represented by block 424.
The network device can receive additional packets from the particular port at 426. At 428, if the additional packets are from a new client, they can be sent to the CF for processing at 404. If the additional packets are not from a new client, a determination can be made as to whether the additional packets exhibit a change in client behavior at 430. If the additional packets indicate a change in client behavior, they can be sent to the CF for processing at 404. If the additional packets do not indicate a change in client behavior, at 432, the network device can handle the packets according to the adjusted ACL 424.
In some embodiments the logic will tunnel encapsulate selected “mirror-stolen” data packets and can forward those packets to the network appliance 250-1 through a secure tunnel, e.g., 290 in
In some embodiments, the CF may chose to drop a suspicious packet received from the mirror-stealing operation. However, if a packet passes the checking functionality applied by the network appliance, e.g., is “cleared,” the logic of a network device associated with the network appliance will securely tunnel encapsulate the packet and can forward the packet to the originating switch, e.g., switch 218-1. One example of the manner in which the logic of the network device associated with the appliance can securely tunnel encapsulate the packet and forward the packet to the originating switch is provided in a co-pending, commonly assigned U.S. patent application Ser. No. 11/788,179, entitled “Marked Packet Forwarding”, by inventors Mark Gooch, et. al., filed Apr. 19, 2007, which is incorporated in full herein. The same is not described more fully herein so as not to obscure embodiments of the present invention.
Upon arrival at the originating switch, this switch may allow the packet to be forwarded based upon application of regular forwarding logic. One example of the manner in which an originating switch, e.g., 218-1, may forward a returned “mirror-stolen” packet is provided in a co-pending, commonly assigned U.S. patent application Ser. No. 11/784,664, entitled, “Locating Original Port Information”, by inventors Bruce LaVigne, et. al., filed Apr. 9, 2007, which is incorporated in full herein. The same is not described more fully herein so as not to obscure embodiments of the present invention.
According to various embodiments, the instructions communicated back to the network device, e.g., switch 318 in
According to certain embodiments, providing the bi-directional communication between the network device and the CF includes communicating information related to forwarded packets back to the network device. Logic on the network device can then proceed to enforce traffic flow decisions, e.g., ACL rules, on packets based on the information communicated from the CF.
It is to be understood that the above description has been made in an illustrative fashion, and not a restrictive one. Although particular embodiments have been illustrated and described herein, those of ordinary skill in the art will appreciate that other component arrangements and device logic can be substituted for the particular embodiments shown. This claims are intended to cover such adaptations or variations of some embodiments of the disclosure, except to the extent limited by the prior art:
In the foregoing Detailed Description, some features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of description is not to be interpreted as reflecting an intention that any claim requires more features than are expressly recited in the claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment of the invention.
This application is a Continuation (Divisional) application of U.S. patent application Ser. No. 11/827,295, filed Jul. 11, 2007, entitled “Package Processing”. The disclosure of this document is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6763018 | Puthiyandyil et al. | Jul 2004 | B1 |
7031304 | Arberg et al. | Apr 2006 | B1 |
7096498 | Judge | Aug 2006 | B2 |
7103045 | LaVigne et al. | Sep 2006 | B2 |
7111072 | Matthews et al. | Sep 2006 | B1 |
7159242 | Genty et al. | Jan 2007 | B2 |
7167922 | Narayanan | Jan 2007 | B2 |
7174378 | Yoon et al. | Feb 2007 | B2 |
7185365 | Tang et al. | Feb 2007 | B2 |
7215637 | Ferguson et al. | May 2007 | B1 |
7362702 | Terrell et al. | Apr 2008 | B2 |
7447901 | Sullenberger et al. | Nov 2008 | B1 |
7458098 | Judge et al. | Nov 2008 | B2 |
7464407 | Nakae et al. | Dec 2008 | B2 |
7486674 | Regan | Feb 2009 | B2 |
7555562 | See et al. | Jun 2009 | B2 |
7570640 | LaVigne et al. | Aug 2009 | B2 |
7735116 | Gauvin | Jun 2010 | B1 |
7793138 | Rastogi et al. | Sep 2010 | B2 |
7823195 | Xie et al. | Oct 2010 | B1 |
7849503 | Sanchez et al. | Dec 2010 | B2 |
7903655 | Gooch et al. | Mar 2011 | B2 |
7924720 | Wackerly | Apr 2011 | B2 |
8045550 | LaVigne et al. | Oct 2011 | B2 |
8340091 | LaVigne et al. | Dec 2012 | B2 |
8416773 | LaVigne et al. | Apr 2013 | B2 |
20050102414 | Hares et al. | May 2005 | A1 |
20050114522 | LaVigne et al. | May 2005 | A1 |
20050220092 | LaVigne et al. | Oct 2005 | A1 |
Number | Date | Country | |
---|---|---|---|
20130074147 A1 | Mar 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11827295 | Jul 2007 | US |
Child | 13679483 | US |