POLICY-BASED CONTENT FILTERING
Methods and systems for processing application-level content of network service protocols are described. According to one embodiment, a firewall device maintains a policy database including multiple policies. The policies includes information regarding an action to take with respect to a network session based on a set of source internet protocol (IP) addresses, a set of destination IP addresses and/or a network service protocol. When the action is to allow the network session, the policy also includes information regarding a configuration scheme defining administrator-configurable content filtering processes to be performed on traffic associated with the network session. Policy-based content filtering is performed by the firewall device by (i) identifying a matching policy for the network session at issue; (ii) identifying multiple content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching policy; and (iii) applying the identified content filtering processes on the traffic.
Latest Fortinet, Inc. Patents:
- SYSTEMS AND METHODS FOR AUTOMATED RISK-BASED NETWORK SECURITY FOCUS
- Distributed security fabric generation over multiple levels of network gateways
- RISK EVALUATION FOR A VULNERABILITY ASSESSMENT SYSTEM ON A DATA COMMUNICATION NETWORK FROM A COLLECTION OF THREATS
- Deduplication of monitored communications data in a cloud environment
- Content presentation based on access point location
This application is a continuation of U.S. patent application Ser. No. 13/526,510 filed on Jun. 18, 2012, which is a continuation of U.S. patent application Ser. No. 13/114,292 filed on May 24, 2011, now U.S. Pat. No. 8,205,251, which is a continuation of U.S. patent application Ser. No. 11/283,891 filed on Nov. 22, 2005, now U.S. Pat. No. 7,966,654, each of which is hereby incorporated by reference in its entirety for all purposes.
COPYRIGHT NOTICEContained herein is material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. Copyright © 2005-2013, Fortinet, Inc.
BACKGROUND1. Field
Embodiments of the present invention generally relate to network security. In particular, embodiments of the present invention relate to application-level content processing of network service protocols using a firewall.
2. Description of the Related Art
Security threats have evolved dramatically over the past 10 years, moving from network-level, connection-oriented attacks to application-level, agent-based attacks. Conventional networking devices (firewalls) can deal with network-level packet processing; for example, conventional firewalls can stop packets that do not come from a valid source, and VPN gateways can encrypt packets on the fly, making it safe for them to traverse the Internet.
But today's critical network threats, like viruses and worms, are embedded in the application-level contents of packet streams. Enormous processing power is needed to detect and stop these application-layer threats by extracting the content from multiple packets, reconstructing the original content, and scanning it for the telltale signs of attacks or for inappropriate content.
A firewall is typically implemented as a hardware/software appliance having a number of physical networking interfaces for the incoming and outgoing network traffic. Firewalls can be software-implemented and installed on a stand-alone computer, or they can be full-blown hardware appliances placed in a network to filter traffic going between multiple computers and/or the Internet. Network traffic enters one of these interfaces and, after filtering and other appropriate processing, is routed to a remote host typically attached to a different physical interface.
In a firewall, processing of network traffic is performed in accordance with a set of specific rules, which collectively form a firewall policy. The firewall policy dictates how the firewall should handle network traffic associated with specific applications such as web browsers, email or telnet. Exemplary rules include filtering of banned words, blocking specific URLs, blocking transmission of specific file types, antivirus scans, blocking of spam, etc. The firewall policy is usually created by the network administrator and is based on the information security policy of the respective organization.
Conventional firewalls were capable of blocking traffic at the packet level but were not intelligent enough to examine the content of those packets and to protect against application-layer threats. Modern firewalls have the ability to examine the content of various network traffic streams and appropriately react to threats transferred within the content of the traffic stream. With the growth of these abilities of the firewalls, there has also been a growth in the number of options and settings that an administrator would need to configure to ensure a secure network.
Many existing firewall systems use global configuration settings, such as global lists of URLs to block, lists of spam addresses, options to scan for viruses, spam, and others similar parameters. These settings are applied globally to all policies within the firewall.
This approach, however, does not provide much flexibility to the administrator. For example it may be desirable to block general staff members of an organization from accessing certain websites that don't necessarily contain objectionable material but may be a work distraction. On the other hand, staff managers may not need to be restricted from accessing the same websites. Using global configuration options to enable the above firewall configuration presents a difficult task. In other words, the existing firewall systems, which are often configured using global settings, tend to apply the same firewall configuration scheme to all the network content passing through the firewall.
Therefore, what is needed is a firewall system providing a flexible and effective control over configuration parameters applied to filtering and/or processing of various network content. Such a system would achieve an optimal content processing performance without compromising the security of the protected network.
SUMMARYMethods and systems are described for processing application-level content of network service protocols. According to one embodiment, a firewall device maintains a security policy database including information defining multiple firewall security policies. The information defining the firewall security policies includes an action to take with respect to a particular network session based on one or more of a set of one or more source internet protocol (IP) addresses, a set of one or more destination IP addresses and a network service protocol. When the action to take for a firewall security policy is to allow the particular network session to pass through the firewall device, then the firewall security policy also includes information regarding a configuration scheme defining a set of administrator-configurable content filtering processes to be performed on traffic associated with the particular network session. Policy-based content filtering of network sessions is performed by the firewall device by (i) identifying a firewall security policy that matches traffic associated with the network session; (ii) identifying multiple content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching firewall security policy; and (iii) applying the identified content filtering processes on the traffic.
Other features of embodiments of the present invention will be apparent from the accompanying drawings and from the detailed description that follows.
Embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
Methods and systems are described for processing application-level content of network service protocols. In the following detailed description, reference will be made to the accompanying drawing(s), in which identical functional elements are designated with like numerals. The aforementioned accompanying drawings show by way of illustration, and not by way of limitation, specific embodiments and implementations consistent with principles of the present invention. These implementations are described in sufficient detail to enable those skilled in the art to practice the invention and it is to be understood that other implementations may be utilized and that structural changes and/or substitutions of various elements may be made without departing from the scope and spirit of present invention. The following detailed description is, therefore, not to be construed in a limited sense. Additionally, the various embodiments of the invention as described may be implemented in the form of a software running on a general purpose computer, in the form of a specialized hardware, or combination of software and hardware.
Embodiments of the present invention are directed to methods and systems that substantially obviate one or more of the above and other problems associated with conventional techniques for configuring firewalls to filter and/or otherwise process network content.
The inventor recognized that it would have been advantageous to provide methods and systems, which would enable more granular control over firewall settings. Such configuration flexibility was not permitted under the conventional techniques.
Firewalls and other filtering gateways have become common security devices for improving computer network security. As more features and functionality are added to these devices they become quite complex to configure. By associating configuration schemes with firewall policies, configuration can be simplified without compromising flexibility. Administrators have more options to filter different traffic streams based on their type and sources. They also have increased flexibility to be able to filter traffic on a per user basis, through authentication mechanisms tied to various filtering options.
Generally, firewall policies are designed to control the flow of network traffic through the firewall. A typical firewall policy defines a set of rules applied to handling of the entire passing network traffic or any specific portion thereof. The portion of the network traffic to which a predetermined firewall policy applies may be specified using, for example, the network address of the source entity, the network address of the destination entity as well as the networking protocol used in the transmission. Different firewall policies may be assigned to different transmission protocols, which, in turn, implement different networking services.
When a specific network connection is initiated, the connection will commonly have an associated source network address, destination network address and service port identifier. This information is gathered by the firewall and checked against existing firewall policies. If the connection information matches a specific firewall policy, the firewall applies the relevant policy to the connection.
Low-level, network layer firewalls generally may only permit or reject the network traffic, typically at the network packet level, and they make their decisions based on the source and destination addresses and the associated network ports in individual IP packets. In such firewalls, the set of rules associated with the firewall policy may generally specify which network traffic is permitted to proceed and which is rejected and the firewall policy may be defined in terms of source and destination IP addresses together with the associated communication ports. This information is contained in individual IP packets and is retrieved by the firewall upon packet inspection.
Higher-level, content-filtering application layer firewalls generally are hosts running proxy servers, which permit no traffic directly between networks, and which perform elaborate logging and auditing of traffic passing through them. Because the proxy applications are software components running on the firewall, they are used to perform logging and access control. In such systems, the firewall policy may provide an additional option for handling of the network traffic, which may include re-directing specific packets to another routine or program, such as a proxy, which may perform a specified operation upon the packets or gather the content of the packets for deeper examination and/or logging. Because of the greater flexibility of the network traffic processing in the proxy, the configuration of the proxy may involve a substantial number of configuration parameters.
In accordance with an embodiment of the invention, in a firewall system having the ability to redirect the communication stream to the proxy program, each firewall policy is provided with an associated collection of settings. These settings may generally include, but are not limited to, various types of filters. By having the ability to associate a collection of settings (hereinafter referred to as “configuration scheme”) with individual firewall polices, the administrator of the inventive firewall system has a greater control over how various communication pathways are filtered.
In an exemplary embodiment of the inventive firewall system, a configuration scheme is associated with a specific firewall policy by means of a scheme identifier, a variable, comprising numeric information, character information or binary bits, that is stored in a data structure associated with the firewall policy, which is called a “policy structure.” The policy structure may be disposed within the kernel of the firewall computer system. When a new communication session matching a particular firewall policy is initiated, this session inherits the scheme identifier value from the corresponding policy structure. The proxy program, to which the communication connection is redirected, then retrieves this identifier value from the communication connection structure and uses it to look up the scheme settings from the configuration database or, alternatively, from a local cache. The configuration database in the inventive system may be as simple as a text file holding records of information or as complex as a fully featured database system.
As shown in
As would be also appreciated by those of skill in the art, in many cases, the rules or signatures used to detect questionable data cannot be applied to individual packets.
Stream protocols, such as TCP, will break up data into smaller chunks during transmission, but the detection heuristics must be applied to the entire data stream rather than the individual packets. Therefore, in the inventive system, the data would be first buffered by the firewall 101 in order to extract the data stream, and then the filtering rules would be applied to this stream. In many cases, the packets would be redirected by the networking subsystem 106 of the kernel of the firewall 101 to a user space application (proxy) 107 that builds and interprets the data buffer.
The firewall system shown in
The networking subsystem 106 may be configured to intercept data transmissions formatted in accordance with various networking protocols including, without limitation, Server Message Block/Common Internet File System (SMB/CIFS), instant messaging (IM) protocols (e.g., AOL Instant Messenger (AIM), MICROSOFT Network (MSN) messenger, YAHOO! Messenger, SKYPE), and peer-to-peer (P2P) protocols (e.g., FASTTRACK, BEEP, GNUTELLA, AVALANCHE, BITTORRENT). Additionally, Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP), HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), telnet, etc. The intercepted data packets are routed to the proxy module 107 for re-assembly, inspection and other processing.
In one embodiment of the invention, the proxying module 107 is implemented in the OS kernel. In an alternative embodiment, the proxy 107 is implemented in the form of an application executing in the user space provided by the operating system of the firewall appliance 101. The proxying module 107 assembles the formatted packets intercepted by the networking subsystem 106 in accordance with the specification of the respective communication protocol to arrive at the transmission content. Depending on the specifics of the used communication protocol, an embodiment of the inventive system may provide for re-ordering of the data packets prior to, or during the transmission re-assembly.
A configuration database 110 stores various firewall policies, configuration schemes and other parameters used by the firewall system 101. The stored parameters are retrieved from the database 110 by the proxy 107. In one embodiment of the inventive system, the proxying module 107 is configured to support one network protocol. In such implementation, multiple proxying subsystems may be provided if the system is designed to handle multiple protocols. Additionally or alternatively, multiple instances of proxy 107 may be executed to support the same network protocol or different network protocols. Moreover, the proxy 107 may be designed to support the entire communication language of the respective protocol or any portion thereof. Finally, the proxy 107 may use an external program to retrieve various configuration settings from the database 110. Likewise, an external program may be used to apply various filters to the network transmission content processed by the proxy 107.
In an embodiment of the inventive concept, multiple configuration schemes may be specified by the network administrator using, for example, a graphical user interface or a command line interface of the firewall system 101. The settings specified by the administrator, as well as other appropriate parameters, may be stored in the configuration database 110 for subsequent retrieval. In an exemplary embodiment of the inventive technique, each created configuration scheme is assigned a unique identifier value, which may or may not be displayed to the administrator. This identifier value is subsequently stored in one or more data structures associated with the corresponding firewall policy and used to retrieve the appropriate configuration scheme.
The configuration database 110 may be implemented on the same computer platform as the rest of the firewall 101. This database may be implemented using any suitable database system, such as general-purpose relational database systems distributed by ORACLE Corporation, IBM Corporation and MICROSOFT Corporation. In an alternative embodiment of the invention, a special-purpose embedded database may be utilized. In yet alternative embodiment, the configuration database may be implemented using file system facilities of the firewall 101. Finally, the database system 110 may be implemented on separate computer hardware from the rest of the firewall 101.
The interface 400 shown in
As will be appreciated by those of skill in the art, not all configuration settings are appropriate for all protocols. Therefore, in the inventive interface 400, some settings are not available for some protocols. For example, the e-mail spam block is not available for non-email protocols. Various parameters of the specific configuration scheme displayed using the interface 400 may be input or adjusted by the network administrator by means of toggle options (checkboxes), named selections (drop down combo boxes), multi-selections, as well as number and text based entries. The configuration scheme may include lists of various items, such as lists of banned words or lists of HTTP URLs to be blocked. Such lists may be linked to appropriate graphical primitive(s) within the interface 400, such as items 408-410 shown in
As it would be appreciated by those of skill in the art, the inventive concept is by no means limited only to the shown parameters and settings. Various other settings and parameters may be displayed and appropriately configured by the interfaces 300 and 400. Moreover, the interface 400 may be configured to automatically display new parameters and configuration options when it detects that the proxy module 107 of the firewall 101 has been enhanced to support new protocols as well as new filtering and other content processing capabilities.
In addition to the capability to create and/or modify firewall configuration schemes, an embodiment of the present invention is additionally provided with a graphical user interface or, alternatively, a command line interface enabling an administrator to specify and manage multiple firewall policies. The policy settings may also be stored in the configuration database 110. In an embodiment of the invention, at least a portion of information descriptive of the policy settings is stored in the kernel of the firewall 101.
Exemplary embodiments of the policy-setting graphical user interfaces of the inventive firewall system 101 are illustrated in
As described in details above, any specific firewall policy may be provided with an associated configuration scheme such that networking protocols supported by the policy are filtered or otherwise processed in accordance with the settings of that configuration scheme. The relevant configuration scheme is identified and assigned to a session when the session is created. At that point, the configuration scheme identifier is written into the policy structure in the kernel so that it can be transferred into new session structures as new sessions connect. If more than one policy is defined, different policies may use either the same configuration scheme, all different configuration schemes, or any combination of the above. It is also permissible, in an embodiment of the invention, to apply no configuration scheme to a policy. In such a case, the policy becomes a conventional firewall policy with no filtering capabilities. In another embodiment of the invention, multiple configuration schemes may be assigned to a single firewall policy.
In another embodiment of the invention, the policy-based filters are implemented using user-authenticated groups. Specifically, certain firewall policies may utilize some form of user authentication. To enable utilization of such policies, one or more users on the network may be grouped together into one or more named groups of users, for example Accounting Team. It should be noted that certain groups may consist of only one user. A specific firewall configuration scheme may be assigned to a user group or an individual user. As would be appreciated by those of skill in the art, the utilization of user group-based firewall policies and associated configuration schemes enables flexible assignment of different levels of use restrictions of various network services to different groups of users.
At step 904, the system applies packet-layer firewall rules to determine whether the connection should be allowed. Non-compliant connections are rejected at step 909. The allowed connections are checked against a list of service protocols supported by the proxy 107, see step 905. Content formatted according to non-supported protocols is sent directly to the destination at step 908. If the connection protocol is supported by the proxy 107, at step 906, the system checks whether a specific configuration scheme is assigned to the connection, and, if so, applies the scheme at step 907. At step 910, the system checks whether the transmission content needs to be modified and modifies the content, if appropriate, at step 911.
An example of a hardware platform in accordance with an embodiment of the present invention will now be described.
The computer platform 1101 may include a data bus 1104 or other communication mechanism for communicating information across and among various parts of the computer platform 1101, and a processor 1105 coupled with bus 1101 for processing information and performing other computational and control tasks. Computer platform 1101 also includes a volatile storage 1106, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 1104 for storing various information as well as instructions to be executed by processor 1105. The volatile storage 1106 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 1105. Computer platform 1101 may further include a read only memory (ROM or EPROM) 1107 or other static storage device coupled to bus 1104 for storing static information and instructions for processor 1105, such as basic input-output system (BIOS), as well as various system configuration parameters. A persistent storage device 1108, such as a magnetic disk, optical disk, or solid-state flash memory device is provided and coupled to bus 1101 for storing information and instructions.
Computer platform 1101 may be coupled via bus 1104 to a display 1109, such as a cathode ray tube (CRT), plasma display, or a liquid crystal display (LCD), for displaying information to a system administrator or user of the computer platform 1101. An input device 1110, including alphanumeric and other keys, is coupled to bus 1101 for communicating information and command selections to processor 1105. Another type of user input device is cursor control device 1111, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 1104 and for controlling cursor movement on display 1109. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
An external storage device 1112 may be connected to the computer platform 1101 via bus 1104 to provide an extra or removable storage capacity for the computer platform 1101. In an embodiment of the computer system 1100, the external removable storage device 1112 may be used to facilitate exchange of data with other computer systems.
Embodiments of the invention relate to the use of computer system 1100 for implementing the techniques described herein. In an embodiment, the inventive content processing systems 300 and 400 may reside on a machine such as computer platform 1101. In an embodiment, database 313 may be deployed on a machine such as computer platform 1101. According to one embodiment of the invention, the techniques described herein are performed by computer system 1100 in response to processor 1105 executing one or more sequences of one or more instructions contained in the volatile memory 1106. Such instructions may be read into volatile memory 1106 from another computer-readable medium, such as persistent storage device 1108. Execution of the sequences of instructions contained in the volatile memory 1106 causes processor 1105 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to processor 1105 for execution. The computer-readable medium is just one example of a non-transitory machine-readable medium, which may carry or otherwise embody instructions for implementing any of the methods and/or techniques described herein. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 1108. Volatile media includes dynamic memory, such as volatile storage 1106.
Common forms of non-transitory computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EPROM, a flash drive, a memory card, any other memory chip or cartridge.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 1105 for execution. For example, the instructions may initially be carried on a magnetic disk from a remote computer.
Alternatively, a remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 1100 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector can receive the data carried in the infrared signal and appropriate circuitry can place the data on the data bus 1104. The bus 1104 carries the data to the volatile storage 1106, from which processor 11 05 retrieves and executes the instructions. The instructions received by the volatile memory 1106 may optionally be stored on persistent storage device 1108 either before or after execution by processor 1105. The instructions may also be downloaded into the computer platform 1101 via Internet using a variety of network data communication protocols well known in the art.
The computer platform 1101 also includes a communication interface, such as network interface card 1113 coupled to the data bus 1104. Communication interface 1113 provides a two-way data communication coupling to a network link 1114 that is connected to a local network 1115. For example, communication interface 1113 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 1113 may be a local area network interface card (LAN NIC) to provide a data communication connection to a compatible LAN. Wireless links, such as well-known 802.11a, 802.11b, 802.11g and Bluetooth may also be used for network implementation. In any such implementation, communication interface 1113 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 1113 typically provides data communication through one or more networks to other network resources. For example, network link 1114 may provide a connection through local network 1115 to a host computer 1116, or a network storage/server 1117. Additionally or alternatively, the network link 1113 may connect through gateway 1117 to the wide-area or global network 1118, such as an Internet. Thus, the computer platform 1101 can access network resources located anywhere on the Internet 1118, such as a remote network storage/server 1119. On the other hand, the computer platform 1101 may also be accessed by clients located anywhere on the local area network 1115 and/or the Internet 1118. The network clients 1120 and 1121 may themselves be implemented based on the computer platform similar to the platform 1101.
Local network 1115 and the Internet 1118 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 1114 and through communication interface 1113, which carry the digital data to and from computer platform 1101, are exemplary forms of carrier waves transporting the information.
Computer platform 1101 can send messages and receive data, including program code, through the variety of network(s) including Internet 1118 and LAN 1115, network link 1114 and communication interface 1113. In the Internet example, when the system 1101 acts as a network server, it might transmit a requested code or data for an application program running on client(s) 1120 and/or 1121 through Internet 1118, gateway 1117, local area network 1115 and communication interface 1113. Similarly, it may receive code from other network resources.
The received code may be executed by processor 1105 as it is received, and/or stored in persistent or volatile storage devices 1108 and 1106, respectively, or other non-volatile storage for later execution. In this manner, computer system 1101 may obtain application code in the form of a carrier wave.
It should be noted that embodiments of the present invention are not limited to any specific firewall system. For example, the inventive policy-based content processing system may be used in any of the three firewall operating modes and specifically NAT, routed and transparent.
Finally, it should be understood that processes and techniques described herein are not inherently related to any particular apparatus and may be implemented by any suitable combination of components. Further, various types of general purpose devices may be used in accordance with the teachings described herein. It may also prove advantageous to construct specialized apparatus to perform the method steps described herein. The present invention has been described in relation to particular examples, which are intended in all respects to be illustrative rather than restrictive. Those skilled in the art will appreciate that many different combinations of hardware, software, and firmware will be suitable for practicing the present invention. For example, the described software may be implemented in a wide variety of programming or scripting languages, such as Assembler, C/C++, perl, shell, PHP, Java, etc.
Moreover, other implementations of various embodiments of the present invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. Various aspects and/or components of the described embodiments may be used singly or in any combination in the computerized network content processing system. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
Claims
1. A computer-implemented method comprising:
- maintaining, by a firewall device, a security policy database including information defining a plurality of firewall security policies, wherein the information defining the plurality of firewall security policies includes, for each firewall security policy of the plurality of firewall security policies, an action to take with respect to a particular network session based on one or more of a set of one or more source internet protocol (IP) addresses, a set of one or more destination IP addresses and a network service protocol;
- when the action to take for a firewall security policy of the plurality of firewall security policies is to allow the particular network session to pass through the firewall device, then the firewall security policy also includes information regarding a configuration scheme defining a set of administrator-configurable content filtering processes to be performed on traffic associated with the particular network session; and
- performing, by the firewall device, policy-based content filtering of a plurality of network sessions by, for each network session of the plurality of network sessions: identifying a firewall security policy from among the plurality of firewall security policies that matches traffic associated with the network session; identifying a plurality of content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching firewall security policy; and applying the identified plurality of content filtering processes on the traffic.
2. The method of claim 1, further comprising:
- processing application-level content of a packet stream associated with the network session by reassembling the application-level content from a plurality of packets of the packet stream; and scanning the application-level content based on the identified plurality of content filtering processes.
3. The method of claim 2, wherein the network service protocol comprises at least one of a group consisting of HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS).
4. The method of claim 3, further comprising receiving from a network administrator, by the firewall device, via a graphical user interface, selections indicative of the content filtering processes to be performed on the traffic associated with the particular network session.
5. The method of claim 4, wherein content filtering options available to the network administrator via the graphical user interface include at least antivirus scanning, Uniform Resource Locator (URL) blocking and file blocking.
6. The method of claim 5, wherein the content filtering options available to the network administrator via the graphical user interface further include one or more of banned word filtering and spam blocking.
7. The method of claim 5, wherein the file blocking comprises blocking transmission of specific file types.
8. A non-transitory computer-readable storage medium tangibly embodying a set of instructions, which when executed by one or more processors of a firewall system, cause the one or more processors to perform a method comprising:
- maintaining a security policy database including information defining a plurality of firewall security policies, wherein the information defining the plurality of firewall security policies includes, for each firewall security policy of the plurality of firewall security policies, an action to take with respect to a particular network session based on one or more of a set of one or more source internet protocol (IP) addresses, a set of one or more destination IP addresses and a network service protocol;
- when the action to take for a firewall security policy of the plurality of firewall security policies is to allow the particular network session to pass through the firewall device, then the firewall security policy also includes information regarding a configuration scheme defining a set of administrator-configurable content filtering processes to be performed on traffic associated with the particular network session; and
- performing policy-based content filtering of a plurality of network sessions by, for each network session of the plurality of network sessions: identifying a firewall security policy from among the plurality of firewall security policies that matches traffic associated with the network session; identifying a plurality of content filtering processes to be performed on the traffic based on the configuration scheme associated with the matching firewall security policy; and applying the identified plurality of content filtering processes on the traffic.
9. The computer-readable storage medium of claim 8, wherein the method further comprises:
- processing application-level content of a packet stream associated with the network session by reassembling the application-level content from a plurality of packets of the packet stream; and scanning the application-level content based on the identified plurality of content filtering processes.
10. The computer-readable storage medium of claim 9, wherein the network service protocol comprises at least one of a group consisting of HyperText Transfer Protocol (HTTP), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Internet Message Access Protocol (IMAP) and Server Message Block/Common Internet File System (SMB/CIFS).
11. The computer-readable storage medium of claim 10, wherein the method further comprises receiving from a network administrator via a graphical user interface selections indicative of the content filtering processes to be performed on the traffic associated with the particular network session.
12. The computer-readable storage medium of claim 11, wherein content filtering options available to the network administrator via the graphical user interface include at least antivirus scanning, Uniform Resource Locator (URL) blocking and file blocking.
13. The computer-readable storage medium of claim 12, wherein the content filtering options available to the network administrator via the graphical user interface further include one or more of banned word filtering and spam blocking.
14. The computer-readable storage medium of claim 12, wherein the file blocking comprises blocking transmission of specific file types.
Type: Application
Filed: Nov 29, 2013
Publication Date: Mar 27, 2014
Applicant: Fortinet, Inc. (Sunnyvale, CA)
Inventor: William J. Crawford (Coquitlam)
Application Number: 14/093,142