Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. Configuring these devices to work in unison is difficult, especially if they are made by different vendors. Even testing or reverse engineering an existing configuration (say when a new security administrator takes over) is hard. Firewall configuration files are written in low level formalisms, whose readability is comparable to assembly code, and the global policy is spread over all the firewalls that are involved. To alleviate some of these difficulties, we designed and implemented a novel firewall analysis tool. Our software allows the administrator to easily discover and test the global firewall policy (either a deployed policy or a planned one). Our tool uses a minimal description of the network topology and directly parses the various vendor-specific low level configuration files. It interacts with the user through a query-and-answer session, which is conducted at a much higher level of abstruction. A typical question our tool can answer is "from which machines can our DMZ be reached and with which services?" Thus, the tool complements existing vulnerability analysis tools, as it can be used before a policy is actually deployed it operates on a more understandable level of abstraction, and it deals with all the firewalls at once.
[1]
Eugene H. Spafford,et al.
Firewalls: An Expert Roundtable
,
1997,
IEEE Softw..
[2]
Kathryn Walker,et al.
Computer security policies and SunScreen firewalls
,
1998
.
[3]
Elizabeth D. Zwicky,et al.
Building internet firewalls
,
1995
.
[4]
Bill Cheswick,et al.
Firewalls and internet security - repelling the wily hacker
,
2003,
Addison-Wesley professional computing series.
[5]
Dan Farmer,et al.
Improving the Security of Your Site by Breaking Into it
,
2000
.
[6]
Marcus J. Ranum,et al.
Web Security Sourcebook
,
1997
.
[7]
Matthias Kalle Dalheimer,et al.
Programming with Qt
,
1999
.
[8]
Martin Freiss,et al.
Protecting Networks with SATAN
,
1998
.
[9]
Thomas A. Limoncelli.
Tricks You Can Do If Your Firewall Is a Bridge
,
1999,
NETA.