【24h】

Offline firewall analysis

机译:离线防火墙分析

获取原文
获取原文并翻译 | 示例
           

摘要

Practically every corporation that is connected to the Internet has at least one firewall, and often many more. However, the protection that these firewalls provide is only as good as the policy they are configured to implement. Therefore, testing, auditing, or reverse-engineering existing firewall configurations are important components of every corporation’s network security practice. Unfortunately, this is easier said than done. Firewall configuration files are written in notoriously hard to read languages, using vendor-specific GUIs. A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that allows them to analyze the policy on a firewall. To alleviate some of these difficulties, we designed and implemented two generations of novel firewall analysis tools, which allow the administrator to easily discover and test the global firewall policy. Our tools use a minimal description of the network topology, and directly parse the various vendor-specific low-level configuration files. A key feature of our tools is that they are passive: no packets are sent, and the analysis is performed offline, on a machine that is separate from the firewall itself. A typical question our tools can answer is “from which machines can our DMZ be reached, and with which services?.” Thus, our tools complement existing vulnerability analyzers and port scanners, as they can be used before a policy is actually deployed, and they operate on a more understandable level of abstraction. This paper describes the design and architecture of these tools, their evolution from a research prototype to a commercial product, and the lessons we have learned along the way.
机译:实际上,每个连接到Internet的公司都至少具有一个防火墙,并且往往还有更多。但是,这些防火墙提供的保护仅与配置为实施的策略一样好。因此,测试,审核或对现有防火墙配置进行反向工程是每个公司的网络安全实践的重要组成部分。不幸的是,这说起来容易做起来难。众所周知,防火墙配置文件是使用特定于供应商的GUI以难以阅读的语言编写的。防火墙管理员和审计人员所缺少的一种工具是允许他们分析防火墙策略的工具。为了减轻其中的一些困难,我们设计并实现了两代新颖的防火墙分析工具,使管理员可以轻松地发现和测试全局防火墙策略。我们的工具仅使用网络拓扑的最小描述,并直接解析各种特定于供应商的低级配置文件。我们的工具的主要功能是被动的:在与防火墙本身不同的机器上,不发送任何数据包,并且脱机执行分析。我们的工具可以回答的一个典型问题是“可以从哪些机器访问我们的DMZ,并提供哪些服务?”。因此,我们的工具是对现有漏洞分析器和端口扫描器的补充,因为它们可以在实际部署策略之前就使用,并且它们以更易于理解的抽象级别运行。本文介绍了这些工具的设计和架构,它们从研究原型到商业产品的演变以及我们在此过程中所学到的经验教训。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号