【24h】

Architecting the Lumeta Firewall Analyzer

机译:架构Lumeta防火墙分析仪

获取原文
获取原文并翻译 | 示例

摘要

Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations should be important components of every corporation's network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendor-specific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that will allow them to analyze the policy on a firewall. The first passive, analytical, firewall analysis system was the Fang prototype system [MWZOO]. This was the starting point for the new Lumeta Firewall Analyzer (LFA) system. LFA improves upon Fang in many ways. The most significant improvements are that human interaction is limited to providing the firewall configuration, and that LFA automatically issues the "interesting" queries and displays the outputs of all of them, in a way that highlights the risks without cluttering the high-level view. This solves a major usability problem we found with Fang, namely, that users do not know which queries to issue. The input to the LFA consists of the firewall's routing table, and the firewall's configuration files. The LFA parses these various low-level, vendor-specific, files, and simulates the firewall's behavior against all the packets it could possibly receive. The simulation is done completely offline, without sending any packets. The administrator gets a comprehensive report showing which types of traffic the firewall allows to enter from the Internet into the customer's intranet and which types of traffic are allowed out of the intranet. The LFA's report is presented as a set of explicit web pages, which are rich with links and cross references to further detail (allowing for easy drill-down). This paper describes the design and architecture of the LFA.
机译:实际上,每个连接到Internet的公司都至少具有一个防火墙,并且往往还有更多。但是,这些防火墙提供的保护仅与配置为实施的策略一样好。因此,对现有防火墙配置进行测试,审计或反向工程应成为每个公司网络安全实践的重要组成部分。不幸的是,这说起来容易做起来难。众所周知,防火墙配置文件是使用特定于供应商的GUI以难以理解的语言编写的。防火墙管理员和审计人员中非常缺少的一种工具是允许他们分析防火墙策略的工具。 Fang原型系统[MWZOO]是第一个被动的分析防火墙分析系统。这是新的Lumeta防火墙分析器(LFA)系统的起点。 LFA在许多方面改进了Fang。最重大的改进是,人机交互仅限于提供防火墙配置,并且LFA自动发出“有趣的”查询并显示所有查询的输出,从而突出显示风险而又不会使高级视图混乱。这解决了我们在Fang中发现的一个主要的可用性问题,即用户不知道要发出哪些查询。 LFA的输入包括防火墙的路由表和防火墙的配置文件。 LFA解析这些特定于供应商的各种低级文件,并针对防火墙可能收到的所有数据包模拟防火墙的行为。模拟是完全脱机完成的,无需发送任何数据包。管理员可以获得一份全面的报告,其中显示了防火墙允许从Internet进入客户的Intranet的流量类型,以及允许从Intranet流出的流量类型。 LFA的报告以一组显式网页的形式呈现,其中包含丰富的链接和交叉引用,以提供更多详细信息(以便于深入研究)。本文介绍了LFA的设计和体系结构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号