2013
DOI: 10.3233/jid-2013-0011
|View full text |Cite
|
Sign up to set email alerts
|

Simplifying Firewall Setups by Using Offline Validation

Abstract: Firewalls are crucial for the security of most networks and implemented by packet filters. Those packet filters can be considered the direct opposite of a simple-to-use system. Configured with complex commands in plain text files, only experts are able to understand or even modify such a setup. Recently, this process has been improved by using a combination of external tools, a graphical modeling environment, and a model checker, enabling more users to participate in the process and clearing the way to automat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Adão et al [19] present a tool for converting abstract firewall models into concrete configurations for the Netfilter networking framework in Linux. Windmüller [7] uses a configuration that combines a model checker, a graphical modeling environment, and external tools to simplify the process of testing and validation of firewall setups for end users. Industry efforts such as Cisco's CLI [20] have focused on specific entities such as Routers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Adão et al [19] present a tool for converting abstract firewall models into concrete configurations for the Netfilter networking framework in Linux. Windmüller [7] uses a configuration that combines a model checker, a graphical modeling environment, and external tools to simplify the process of testing and validation of firewall setups for end users. Industry efforts such as Cisco's CLI [20] have focused on specific entities such as Routers.…”
Section: Related Workmentioning
confidence: 99%
“…We explore the use of a model based approach for detection of configuration errors in the planning and design phase. The verification and validation of network configurations has been studied extensively [4,5,6,7,8,9]. However, previous work either does not provide a methodology for identifying and specifying rules, or describe how the corresponding rule violation error messages are generated to help environment designers.…”
Section: Introductionmentioning
confidence: 99%