throbber
Checkpoint Fire Wall-1 White Paper
`
`Version 2.0
`September 1995
`
`Table of Contents
`
`• Executive Summary
`• Internet Firewall Technologies
`o Qyeryiev
`o Application-Layer and Circuit Gateways
`o Packet-Filtering G a t e w a ys
`o Checkpoint Fire Wall-1
`• Configuring Fire Wall-1
`o A Simple Configuration
`o A More Detailed Configuration
`o Authentication
`o AntiSpoofing
`o Logging and Alerting
`o Installing a Rule Base
`o Security Policy
`• Principles of Operation
`o Introduction
`o FireWall-1 Architecture
`o Control Module
`o Firewall Module
`o Authentication
`o Encryption
`o Address Translation
`o Outbound FTP Connections
`o UDP-based Applications
`o Performance
`• Conclusion
`• Specifications
`• Notices
`
`Executive Summary
`When you connect your local network to the Internet, the single most important measure you can take to
`prevent break-ins is to define a network security policy and establish a firewall to implement that policy. This
`document describes how to accurately and simply express such a security policy in FireWall-1 by presenting a
`number of typical example configurations. These examples and their design rationale will serve as a guide for
`your own implementation.
`
`In addition, this document describes the architecture and unique characteristics of Checkpoint's FireWall-1
`Internet Gateway, and outlines the major characteristics that enable Checkpoint FireWall-1 to establish full,
`transparent, and true Internet connectivity using the entire range of Internet protocols, while ensuring network
`security. Encryption, User and Client Authentication and other FireWall-1 features and techniques are
`described. Finally, performance data are presented.
`
`The powerful combination of Checkpoint FireWall-1's sophisticated Stateful Multi-Layer Inspection (SMLI)
`technology and its intuitive GUI deliver unmatched security, connectivity and performance.
`
`Juniper Ex. 1036-p. 1
`Juniper v Implicit
`
`

`

`Internet Firewall Technologies
`Overviev
`When you connect your network to the Internet or to another network, securing your network against intrusion
`is of critical importance. The most effective way to secure the Internet link is to put a firewall system between
`the local network and the Internet. The firewall's role is to ensure that all communication between an
`organization's network and the Internet conforms to the organization's security policies. Additional security
`measures, such as authentication and privacy enhancements, may follow and complement firewalls, but
`stopping the fire from spreading into the private network is the first step.
`
`Two methods, usually implemented together, are commonly employed to establish Internet firewalls, the major
`difference between them being in the flow of communication:
`
`Application
`
`gateways
`
`With application and circuit gateways, all packets are addressed to a user-layer application on the gateway that
`relays the packets between the two communication points. In most application gateway implementations,
`additional packet filter machines are required to control and screen the traffic between the gateway and the
`networks. A typical configuration includes two routers, with a bastion host in the middle, to serve as the
`application gateway.
`
`Application gateways are secure but inefficient. They are nontransparent to users and applications and more
`important, to the gateway host on which they run, and they are difficult to configure and manage. Only a
`limited number of applications is supported and special tailoring is required for each one.
`
`P a c k et Filtering
`
`A packet-filter gateway acts as a router between two networks. As packets flow from source to destination, the
`gateway either forwards or blocks them. A packet-filter gateway is less secure than an application gateway but
`more efficient. It is comprehensive and transparent to many protocols and applications. However, traditional
`packet filters are stateless, have only a low-level protocol understanding, and are difficult to configure and
`verify. Lack of auditing mechanisms is another major drawback.
`
`Checkpoint FireWall-1 combines the advantages of both methods - with none of their disadvantages - to create
`an efficient, protocol independent and secure firewall engine. FireWall-1 is capable of application-layer
`security, user authentication, unified support and handling of all protocols, and auditing and alerting.
`Checkpoint FireWall-1 's operation is also transparent to users and to system setup.
`
`In addition to the inspection technology, Checkpoint FireWall-1 includes an object-oriented graphical user
`interface that enables simple and flexible system management and configuration.
`
`Application-Layer and Circuit Gateways
`
`For each application relayed, application-layer gateways use specific, special-purpose code. Application
`gateways can provide a high level of security, though they suffer from a number of deficiencies, and only a
`limited number (usually only a small basic subset) of applications and services are supported. In order to use
`application gateways, users must first connect to the gatevay machine or install a specific client application for
`each application they expect to use. Each gatewayed application is a separate, proprietary piece of software and
`requires its own set of management tools and permissions.
`
`Circuit gateways provide a more general way to implement application gateways. They support some TCP
`applications, but not all. Circuit gateways do not support other protocols. Users are often forced to install and
`use different client applications or to change their work habits. Installing client applications on each internal
`
`Juniper Ex. 1036-p. 2
`Juniper v Implicit
`
`

`

`computer is likely to be a cumbersome task since the internal network is typically heterogeneous with respect to
`platforms, operating systems, versions, etc.
`
`Network performance is also affected by both application and circuit gateways; each packet must be copied and
`processed at least twice by all the communication layers, and user-layer processing and context switching is
`required. Moreover, a new process must be started for each connection.
`
`The application gateway computer itself (bastion-host or dual-homed gateway) remains exposed to the
`network, and additional means, such as packet-filtering, must be implemented to protect it. Applications and
`daemons must be carefully managed, since even with router packet filters, they are still vulnerable at the
`non-privileged ports. These protective measures typically entail acquiring additional hardware, limiting
`available services, as well as tedious and error-prone administrative overhead.
`
`Packet-Filtering Gatevays
`
`Packet-filtering technologies provide an efficient and general way to control any type of network traffic and
`applications. They require no changes in client applications, no specific application management or installation,
`and no additional hardware. Using a single, unified packet-filtering engine, all network traffic is processed and
`then either forwarded or blocked from a single point of control.
`
`However, packet filtering technologies do not address all security requirements. The information available for
`filtering (for example, source and destination addresses and port numbers) is rarely sufficient. The number of
`rules is limited, and there is a high performance penalty when many rule instances are used. Lack of context or
`state information makes it impossible to use packet filters for datagram-based protocols like UDP (User
`Datagram Protocol), RPC (Remote Procedure Call), or even FTP (File Transfer Protocol - a commonly used
`and surprisingly complex TCP based service). In most cases, packet-filtering technologies provide no auditing
`or alerting mechanisms.
`
`Previous packet-filtering technologies also suffer from poor management interfaces. Implementing them
`requires a high level of understanding of communication internals and writing low-level bit and byte code, so
`that these technologies are difficult to change and adapt. Some packet filters are implemented inside routers,
`thus limiting computing power and filtering capabilities and providing no auditing or reporting capabilities.
`Others are implemented as software packages that filter the packets in application-layer processes, an inefficient
`approach that requires multiple data copies, expensive delays and context switches, and delivers lower
`throughput.
`
`Checkpoint FireWall-1
`
`Most existing Internet firewalls use a combination of a packet-filter screening computer or a hardware-router
`for controlling the lower layers of communication, and application gateways for the enabled applications. This
`configuration provides only limited, non-transparent and nonflexible connectivity, and entails high costs in
`setup, management, and expertise.
`
`In contrast, FireWall-1 combines the advantages of both concepts:
`
`Packet F i l i t e r i ng
`
`An efficient inspection module - applicable to all protocols - with Stateful Multi-Layer Inspection (SMLI)
`technology, understands data in the packet intended for all other layers, from the network layer (IP headers) up
`to the application layer, and provides stateful context.
`
`In this way, FireWall-1 secures complex applications more effectively than technologies that have only data in
`some of the layers available to them. For example, while application gateways have access only to the
`application layer and routers have access only to to the lower layers. FireWall-1 integrates the information
`gathered from all layers into a single comprehensive inspection point.
`
`Juniper Ex. 1036-p. 3
`Juniper v Implicit
`
`

`

`At the same time, FireWall-l's SMLI technology provides transparent and efficient security to all protocols and
`applications.
`
`Application
`
`Gateways
`
`FireWall-1 provides secure application gateways (proxies) that add real value, for example, encryption and
`user authentication. There is no need for hardware routers or cumbersome system administration on the
`gateway.
`
`FireWall-1 provides logging and alerting mechanisms, as well as simple installation and setup procedures.
`
`Fire Wall-1 's single integrated security solution provides enterprise-wide security - though the security policy
`can be enforced by any number of firewalls and any number of authenticated users can be controlled, there is
`still only one security policy, one Rule Base, and one centralized log. In addition to a single integrated security
`policy, the system administrator can, if required, maintain different Rule Bases to be implemented, for
`example, at different times of day.
`
`An intuitive, objectoriented user interface enables easy, flexible, and uniform implementation of an
`organization's global security policy.
`
`The following sections of this document demonstrate how to implement a security policy in FireWall-1, and
`explain the principles of FireWall-l's operation.
`
`Configuring FireWall-1
`
`This section demonstrates how to build a FireWall-1 Rule Base to implement a security policy for a simple
`network configuration using a "diode" policy, and then for a larger network using a more detailed
`configuration.
`
`A Simple Configuration
`
`The following example illustrates how to deploy Fire Wall-1 in the network configuration shown in the diagram
`below. Note that this is not a recommended configuration, but simply an example for the purposes of this
`document.
`
`In this example, FireWall-1 will be installed on the gateway computer (named "monk" in the rules that follow).
`
`A Typical Security Policy
`
`For the configuration shown above, a typical security policy might be this:
`
`external networks may only send mail to local computers
`
`local computers may access the entire network: localnet and Internet
`
`This policy protects the private network from non-local networks, but puts no restrictions on local computers.
`
`You will begin by considering how this security policy can be implemented in Firewall-1, Next, you will see
`how this security policy can be "tightened up" so that the potential loopholes are blocked.
`
`Implementing a Security Policy
`
`In order to implement a security policy, you must perform the following actions:
`
`Juniper Ex. 1036-p. 4
`Juniper v Implicit
`
`

`

`Define the network objects used in the Rule Base.
`
`You do not have to define the entire network to FireWall-1 - only those objects that are used in the Rule Base.
`For the configuration described here, you must define the gateway (monk), the mail server (mailsrvr) and the
`local network (localnet).
`
`Define services used in your security policy (optional).
`
`You, do not have to define the commonly used services. These are already defined for you in Fire Wall-1. You
`should define only those special services that are pert of your security policy.
`
`Defining network objects and services is very straightforward. In most cases, you need only specify a name,
`because FireWall-1 can obtain the object's properties from the appropriate /etc, NIS (yp), and DNS
`databases.
`
`Define the Rule Base - the rules for accepting, rejecting and logging packets.
`
`Install the Rule Base - install the Inspection Code on the gateways.
`
`The next step in implementing a security policy is to define the Rule Base, using the Rule Base editor. In the
`Rule Base editor, rules are expressed in terms of the following elements:
`
`The first three elements describe the communication attempt.
`
`Source - where the packet is coming from
`
`Destination - where the packet is going
`
`Services-
`
`the type of application
`
`Note: If you specify "Any" under services, all TCP, UDP and RPC based applications, even those not
`defined in the Service Manager, are included. Even if you use an undefined database application, FireWall-1
`will secure the outbound connection and ensure that replies are passed through but nothing else.
`
`The next two elements indicate what is to be done.
`
`Action - what is to be done with the given communication attempt
`
`Track - whether to tog the packet or to generate an alert
`
`The last element indicates which firewall module will enforce the rule defined by the first five elements.
`
`Install On - the firewall module that will enforce this rule
`
`In this simple example, there are only two rules, corresponding to the policy given above.
`
`The first rule (non-local networks may only send mail to the mail server) can be expressed in the Rule Base
`editor as follows:
`
`Source
`
`Destination Services Action
`
`Track
`
`Install On
`
`Any
`
`mailsrvr
`
`smtp
`
`Accept
`
`Short Log Gateways
`
`Juniper Ex. 1036-p. 5
`Juniper v Implicit
`
`

`

`The second rule (local computers may access the entire network: localnet and Internet) can be expressed in the
`Rule Base editor as follows:
`
`Source
`
`Destination Services Action
`
`Track
`
`Install
`On
`
`localnet Any
`
`Any
`
`Accept
`
`Short Log Gateways
`
`You will first have to define the network objects used in the Rule Base. These objects are those shown in the
`network diagram above: localnet and a mail server (named mailsrvr). In addition, a gateway (named monk)
`must be defined, though it does not yet explicitly appear in the Rule Base. These names are of course arbitrary.
`
`Next, define the two rules, using the Rule Base Editor. When you are done, you should have a Rule Base
`similar to the one shown below:
`
`Implicit Drop
`
`FireWall-1 follows the principle "That Which Is Not Expressly Permitted is Prohibited." To enforce this
`principle, FireWall-1 implicitly adds a rule at the end of the Rule Base that drops all communication attempts
`not described by the other rules.
`
`Since the rules are examined sequentially for each packet, only packets not described by the first two rules are
`examined by the implicit rule. However, if you rely on the implicit rule to drop these packets, they will not be
`logged, because only packets which are described by a rule can be logged. In order to log these packets, you
`must explicitly define a "none of the above" rule, as follows:
`
`Source Destination Services Action
`
`Track
`
`Install On
`
`Any
`
`Any
`
`Any
`
`Reject
`
`Long Log Gateways
`
`If you do not explicitly define such a rule, FireWall-1 will implicitly define one for you, and the packets will be
`dropped. In no case will FireWall-1 allow these packets to pass. The advantages of defining such a rule
`explicitly are these:
`
`• You can then specify togging for rejected packets.
`• You can tune your security policy.
`* You can better understand your network behavior.
`
`"Stealthing" the Gateway
`
`The Rule Base described above has a shortcoming - it enables localnet computers to get on the gateway
`(assuming that they have Unix accounts and passwords). In the given configuration, this is usually not
`desirable. To prevent any computers (not just local computers) from getting on the gateway, you must add a
`rule (before the other rules) as follows:
`
`Juniper Ex. 1036-p. 6
`Juniper v Implicit
`
`

`

`Source
`
`Destination Services Action
`
`Track
`
`Install On
`
`Any
`
`monk
`
`Any
`
`Reject
`
`Long Log Sateways
`
`Protecting the gateway in this manner makes it inaccessible to other users and applications (except for
`FireWall-1 management purposes). The gateway becomes an invisible network object that, from the point of
`view of the network, does not even exist.
`
`You may wish to confirm that the gateway is indeed inaccessible by performing the following experiment (after
`you have installed the Rule Base). Telnet out through the gateway and then try to TELNET back to the
`gateway. The second TELNET will fail.
`
`Note: The icons representing network objects convey information about the objects. Gateways look like
`gates, and a brick wall inside a host or gateway icon indicates that the object is FireWalled.
`
`To further protect the gateway, you may wish to add a rule that rejects any packet which originates on the
`gateway, as follows:
`
`Source
`
`Destination Services Action
`
`Track
`
`Install On
`
`monk
`
`Any
`
`Any
`
`Reject
`
`Long Log
`
`Src
`
`The reason that Install On is specified as Src in this rule is that by default, gateways enforce rules on inbound
`traffic only. The rule is enforced on monk, but because monk is specified as Src, the rule is enforced only in
`the outbound direction (that is, it applies only to packets leaving monk which also originate on monk). If
`Install On were specified as Gateways, then the rule would apply only to packets entering monk which also
`originate on monk, in other words, to no packets at all.
`
`A More Detailed Configuration
`
`Consider the following configuration:
`
`This configuration is similar to the first one, except that a public server (DMZ - Demilitarized Zone) has been
`added. DMZ provides HTTP, FTP and other services to non-local networks, but does not initiate any traffic.
`DMZ is actually a third interface attached to the gateway, and might be a network, a sub-network or a host.
`
`The security policy for this configuration is the same as the security policy for the previous configuration, with
`the following additional rule:
`
`Source
`
`Destination Services Action
`
`Track
`
`Install On
`
`Any
`
`DMZ
`
`HTTP, FTP Accept
`
`Short Log Gateways
`
`Juniper Ex. 1036-p. 7
`Juniper v Implicit
`
`

`

`Note that under Install On, you can specify a network object either by name or by function.
`
`Install
`
`ON MENU Meaning
`
`enforce OTL all network objects defined
`as gateways in the direction specified
`in the "Apply Gateway Rules to
`Interface Direction" property in the
`Control Properties/Security Policy
`window
`
`enforce in the outbound direction on
`the FireWalled network objects defined
`as Source (typically clients
`-initiators of traffic) in this rule
`
`enforce in the inbound direction on
`the FireRalled network objects defined
`as Destination (typically servers) in
`this rule
`
`enforce on all routers
`
`If you specify Src, the rule is enforced on the FireWalled network objects specified under Source in that rule.
`The icon for Src shows arrows pointing away from the object, to indicate that the rule is enforced for outgoing
`packets only.
`
`If you specify Dst, the rule is enforced on the FireWalled network objects specified under Destination in that
`rule. The icon for Dst shows arrows pointing to the object, to indicate that the rule is enforced for incoming
`packets only.
`
`If you specify Gateways, the rule is enforced on all the hosts that are defined as gateways (in the Host
`Properties window). The rule is enforced in the direction specified in "Apply Gateway Rules to Interface
`Direction" property in Control Properties/Security Policy window (see User Authentication and Security
`Policy).
`
`If you specify routers, the rule is enforced on the appropriate interfaces on all routers, using FireWall-l's
`auto-scoping feature. FireWall-1 generates an Access List for the router. It should be noted that with Access
`Lists only a subset of FireWall-1's FireWall Module functionality can be implemented. For example, it is not
`possible to secure FTP connections as described in Outbound FTP Connections.
`
`If you specify an object by name, then the rule is enforced for both incoming and outgoing packets
`(eitherbound).
`
`Authentication
`
`User Authentication
`
`Juniper Ex. 1036-p. 8
`Juniper v Implicit
`
`

`

`User Authentication enables an administrator to grant specific users special TELNET, FTP and HTTP access
`privileges. For example, if a localnet user is temporarily away from the office and logging in from a different
`host, the administrator may wish to allow that user to continue to use TELNET and FTP on the localnet
`without extending the same privilege to all users on that host.
`
`FireWall-1 recognizes the following authentication schemes:
`
`• SecurlD
`• S/Key
`• Unix password
`• Internal FireWall-1 password
`
`HTTP Authenticating Proxy
`
`The FireWall-1 HTTP Authenticating Proxy provides a mechanism for authenticating users of HTTP services.
`The FireWall-1 HTTP Authenticating Proxy runs on a gateway, and can protect any number of HTTP servers
`behind the gateway.
`
`Client Authentication
`
`In addition to User Authentication, FireWall-1's Client Authentication feature provides a mechanism for
`authenticating users of any application, standard or custom.
`
`Note: After successsful authentication, access privileges are determined by the user's individual properties, as
`defined in the User Properties window. These properties include allowed sources, destinations and time of
`day.
`
`Antispoofing
`
`Spoofing is a technique where an intruder attempts to gain unauthorized access by altering a packet's IP
`address to make it appear as though the packet originated in a part of the network with higher access privileges.
`For example, a packet originating on the Internet may be disguised as a localnet packet. If undetected, this
`packet might then have unrestricted access to the localnet.
`
`FireWall-1 has a sophisticated antispoofing feature which detects such packets by requiring that the interface
`on which a packet enters the gateway correspond to its IP address. For example, FireWall-1 would identify a
`packet entering the gateway from the Internet which carried a localnet IP address, and would reject that packet
`and issue an alert. This type of effective anti-spoofing can only be achieved by an integrated system such as
`FireWall-1 that has access to both the interface through which the packet arrived and the IP address it claims to
`have, and that is capable of logging and alerting these events.
`
`Antispoofing is defined in the property window of the network object which enforces it. For example, if a
`gateway is to enforce antispoofing, the spoof tracking parameters are defined in the gateway's Host Properties
`window. Similarly, a router's spoof tracking parameters are defined in its Router Properties window,
`
`In the above window, spoof tracking is defined for the interfaces as follows:
`
`Ie0
`
`Ie1
`
`- allow only localnet IP addresses (that is, packets whose source IP addresses are part
`interface
`(internal)
`of the localnet network), thus preventing spoofed packets from leaving the localnet through the gateway
`
`- allow only "Others" (that is, all packets except those whose source IP addresses
`interface
`(external)
`belong to the networks listed under Valid Addresses for this object's other interfaces, in this case localnet),
`thus preventing spoofed packets from entering the gateway from the outside
`
`Juniper Ex. 1036-p. 9
`Juniper v Implicit
`
`

`

`Logging and Alerting
`
`You can record events, including acceptance and rejection of packets, in a log. The FireWall-1 Log Viewer
`enables you to examine the log, filtering and searching the log in a variety of different ways, so that you can
`quickly and efficiently extract the information you need.
`
`You can issue an alert when FireWall-1 rejects or accepts a packet. The alert can take several forms. You can
`display a message on the master console, or you can send a mail message to some pre-determined address, or
`you can issue an SNMP trap. In fact, you can specify, in the Control Properties/Logging and Alerting
`window, any Unix command to be executed. All alerts are also logged.
`
`Installing a Rule Base
`Once a Rule Base has been defined, it must be installed on the FireWall Modules which are to enforce it. When
`you install a Rule Base, FireWall-1 verifies that the Rule Base is logical and consistent, generates Inspection
`Code from the Rule Base for each of the Install On objects, and downloads the Inspection Code to the
`specified FireWall Modules.
`
`If the specified network object is a router, FireWall-1 generates and installs the appropriate access list ratter
`than Inspection Code.
`
`Security Policy
`
`A security policy is defined not only by the Rule Base, but also by parameters specified in the Control
`Properties/Security Policy window. These parameters enable the user to control all aspects of a packet's
`inspection, while at the same time freeing the user of the need to specify repetitive detail in the Rule Base
`Editor.
`
`For example, instead of explicitly defining rules in the Rule Base for the details of identifying each TCP packet
`and its responses, you can specify in this window that packets of identified and established TCP connections
`should be automatically enabled. Note that the initial connection is established under one of the rules in the
`Rule Base.
`
`Principles of Operation
`Introduction
`
`This section describes the architecture and unique characteristics of the Checkpoint FireWall-1 Internet
`gateway, and outlines the major characteristics that enable Checkpoint Fire Wall-1 to establish full, transparent,
`and true Internet connectivity using the entire range of Internet protocols, while ensuring network security. In
`addition, User Authentication and other FireWall-1 features and techniques are described. Finally, performance
`data, are presented.
`
`N o t e: In FireWall-1 terminology, the term "gateway" is used to describe a computer used primarily to route
`traffic coming into and leaving a network. In some literature, the term "router" is used to describe a gateway.
`In FireWall-1 terminology, "router" means a Cisco or Wellfleet router.
`
`FireWall-1 Architecture
`
`FireWall-1 is comprised of two primary modules:
`
`Control Module
`
`Juniper Ex. 1036-p. 10
`Juniper v Implicit
`
`

`

`The Control Module includes the GUI and the Management Module.
`
`The GUI is the front end to the Management Module, which manages the FireWall-1 database: the Rule Base,
`network objects, services, users etc.
`
`FireWall Module
`
`The FireWall Module includes the Inspection Module and two daemons (snmpd and fwd).
`
`The FireWall Module implements the security policy, logs events, and communicates with the Control Module
`using the daemons.
`
`A FireWall-1 security policy is defined in terms of network objects, services, users, and the rules that govern
`the interactions between them. Once these have been specified with the Control Module, Inspection Code is
`generated and then installed on the firewalls that will enforce the security policy. (For more information about
`defining a security policy, see Configuring FireWall-1).
`
`Control Module
`
`Rule Base
`
`Once the network administrator has defined a security policy - a Rule Base and the properties of the objects
`(networks, services, hosls, and users) used in the Rule Base - it is converted into an Inspection Script.
`Inspection Code, compiled from the Inspection Script, is then transmitted on a secured control channel from
`the FireWall-1 Management Station - the computer on which the FireWall-1 database is maintained - to the
`FireWall-1 daemons on the firewalls that will enforce the policy. The FireWall-1 daemon loads the Inspection
`Code into the FireWall-1 Inspection Module. A network object on which the FireWall-1 Inspection Module is
`installed is known as a "FireWalled system."
`
`A Fire Walled system enforces those parts of the Inspection Code that are relevant to itself, but all logging and
`alerts are sent to the network object designated as the Master. The Master also maintains the most recent
`Inspection Code for each of the FireWalled systems it controls. If a FireWalled system loses its Inspection
`Code for any reason, it can retrieve an uptodate copy from the Master. In practice, the Master and Management
`Station are always on the same system. Failover Masters can be defined, which will take over if the primary
`Master goes down.
`
`Communication between the Inspection Module hosts and the Management Station is secured. The Inspection
`Module host reports its status to the Management Station using an SNMP Version 2 agent.
`
`The FireWall-1 deployment is completely integrated. In other words, though the security policy may be
`enforced by more than one network object and, as explained below, implemented at more than one layer (see
`Inspection Module Architecture). there is still only one security policy, one Rule Base, and one centralized log.
`
`Router Extension Module
`
`In the case of routers, the Access Lists derived from the security policy are installed by FireWall-1 on the
`routers. For Cisco routers, FireWall-1 downloads the access list using an Expect session that emulates a
`TELNET session into the router. For Wellfleet routers, FireWall-1 uses SNMP.
`
`jNetvork Object Manager
`
`The Network Object Manager defines the entities which are part of the security policy. Only those objects that
`are part of the security policy must be defined by the user. These may include:
`
`Networks and sub-networks
`
`Juniper Ex. 1036-p. 11
`Juniper v Implicit
`
`

`

`Servers and workstations (FireWalled or not)
`
`Routers
`
`Internet domains
`
`Every object has a set of attributes, such as network address, subnetmask, etc. Some of these attributes are
`specified by the user, while others are extracted by FireWall-1 from the network databases, like the hosts and
`networks files, Network Information Services (NIS/Yellow Pages), network databases and the Internet
`domain service. SNMP agents are used for extracting additional information, including the interface and
`network configuration of hosts, routers and gateways. Objects can be combined in groups and hierarchies.
`
`User Manager
`
`FireWall-1 enables access privileges to be defined for users on an individual or group basis. User groups can
`be created, and access privileges, including allowed sources and destinations as well as user authentication
`schemes, can be defined (see User Authentication).
`
`Service Manager
`
`The Service Manager defines the services known to the system and used in the security policy. All network
`services are screened and controlled, even those that are not defined. A comprehensive set of TCP/IP and
`Internet services is predefined, including the following:
`
`Standard arpa-services: Telnet, FTP , SMTP, etc.
`
`Berkeley r-services: rlogin, rsh, etc.
`
`SunRPC services: NIS/yellow pages, NFS, etc.
`
`Advanced Internet protocols such as HTTP, Gopher, Archie and many others
`
`IP services: Internet Control Message Protocol (ICMP), Routing Internet Protocol (RIP), SNMP, etc.
`
`New services can be defined by selecting the service type and setting the service's attributes. Service types
`include:
`
`Transmission Control Protocol (TCP)
`
`User Datagram Protocol (UDP)
`
`Remote Procedure Call (RFC)
`
`Internet Control Message Protocol (ICMP)
`
`Others - enables definition of services and protocols that do not conform to the standard set of attributes.
`Services are defined using simple expressions and macros.
`
`Services can be grouped in families and hierarchies. Examples: NFS (the mount program, NFS-server, lock
`manager), NIS/Yellow Pages (ypserv/ypbind), and WWW (HTTP, FTP, Archie, Gopher, etc.).
`
`System

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket