Packet Filtering Rule List Analysis

Size: px
Start display at page:

Download "Packet Filtering Rule List Analysis"

Transcription

1 Filtering List Analysis Chotipat Pornavalai and Thawatchai Chomsiri Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang Ladkrabang, Bangkok 10520, Thailand. Abstract: Firewalls is an important device for network security. However managing and writing firewall rules must be carefully done in order to implement the security policy correctly. Alternating rule order incorrectly may change meaning of the policy. Many research works proposed methods for finding anomalies within rule set by using several approaches, but they are not cover all anomalies. For example, it could not find shadowed rule which might be shadowed by more than one previous rule, and could not find correlation anomaly that is a correlation within the same attribute. This kind of correlation can be occurred in many firewall products, such as port-range in IPTABLES [5] or using multi-address in Check Point FW- 1 [4]. Many researches consider only two rules. This could possibly get incorrectly results. In this paper, we propose a new technique for analyses packet filtering rule list by using Relational Algebra technique. It can find all anomalies by considering more than two rules at the same time. We also propose an approach to remove anomalies within the rule set, and to combine rules to reduce the rule set s size. 1. Introduction Firewall is essential equipment to secure network that is connected to the Internet. Conflicts and incorrectly order within firewall rules can make system work improperly too. Writing a rule set usually contain many hidden conflicts. Many research works tried to find these conflicts using several approaches. For example, Pasi Eronen [2] proposed an Expert System that is based on constraint logic programming (CLP) for user to write higher-level operations for detecting common configuration mistakes. Scott Hazelhurst [3] using Binary Decision Diagrams (BDDs) to present and analyze rule set. Ehab Al-Shader et.al [1] presents an anomaly discovery algorithm using SET theory. They described a method for finding some error within rule set that called anomalies, Process of simply managing anomalies. But their research can not discovery all anomalies when considering more than two rules at the same time. To solve this problem, we propose an alternative approach using Relational Algebra technique for finding anomalies within the rule sets using Relational Algebra operations. Thus it is easy to resolve relationship between rules, which can discover all the anomalies. This paper is organized as follows. In section 2, we give a background about firewall and Relational Algebra. In section 3, we present how to map the firewall rules into relation. In section 4, we classify and define firewall policy anomalies, and we describe the anomaly discoverng. In section 5, we present how to remove anomalies and how to reduce the rule set s size by combining rules together. We conclude this paper with our future works in section Firewall and Relational Algebra Background Firewall detects all packets IN/OUT of the networks. It can allow or deny any packets by considering the specified rule set. When it receives any packets, it will compare header of packets with all rules defined in rule set from first rule to last rule or until it has found rule matched with condition. Then it performs action specified on that rule. Example of rule set is shown in Figure accept accept deny accept / deny /30 80 accept / /30 80 deny accept , deny / /24 any accept / /24 80 deny any any any deny Figure 1. rule set

2 Relation is a subset of a Cartesian product of a set of domain [6]. Relation Algebra is a procedural query language that consists of a set of operations on the relations. Operations in Relational Algebra are select, project, union, set difference, Cartesian product and rename. The operations that used frequently are shown Figure 2. R1 (Relation 1) is SELECT src_ip dst_ip dst_port action R5 = select (dst_port=80) R deny src_ip dst_ip dst_port deny deny deny UNION R2 (Relation 2) is R6 = R3 union R4 src_ip dst_ip dst_port action src_ip dst_ip dst_port accept accept accept accept PROJECT R3 = project (src_ip, dst_ip, dst_port) R1 src_ip dst_ip dst_port INTERSECTION R = R3 intersect R src_ip dst_ip dst_port R4 = project (src_ip, dst_ip, dst_port) R2 DIFFERENCE src_ip dst_ip dst_port R8 = R3 difference R src_ip dst_ip dst_port Figure 2. Relational Algebra Operation 3. Mapping s into Relation Mapping any rules in the rule set to the relation can be done by doing a Cartesian product between set of attributes in that rule. For example, when src_ip = /30, dst_ip = , dst_port = 80, action = deny, it can be mapped to relation 1 (R1) as shown in Figure 2, while R2 is the relation that is mapped from rule; src_ip = /31, dst_ip = , dst_port = 80-81, action = accept. 4. Firewall Policy Anomaly Discovery In this section, we present theories for discover firewall policy anomaly. We define and classify the types of anomaly using Raining 2D-Box Model. In this section, we define -n as a rule number n from the rule set table. Therefore, if n < m, then -m follows -n. Rn is a relation that has been mapped from -n using PROJECT operation to exclude action attribute Firewall Policy anomaly Classification Ehab S. Al-Shaer et.al [1] classified anomaly into 4 types. They are Shadowing anomaly, Correlation anomaly, Generalization anomaly and Redundancy anomaly. We also classify anomaly into 4 types but it covers all anomalies that are occurred when considering many rules at the same time. Our definition here for each anomaly is also different from [1]. We also present many theorems that will be used to discover anomalies which will be used in any anomaly discovery algorithms. Definition 1: -i will be shadowed when Ri (Ri 1U Ri 2 U U R1) = φ Where R i is relation i Definition 2: -x and -y are partially correlated when action of -x is differen from -y Rx Ry, Ry Rx, Ry Rx and Rx I Ry φ, where Definition 3: -x and -y are completely correlated when Rx Ry, and action of -x is different from -y.

3 Definition 4: -x and -y are correlated when either they are partially correlated or completely correlated. Definition 5: -x and -y are consecutively non-correlated when -x and -y are not correlated, and y = x + 1. Definition 6: We can say that -x is consecutively non-correlated downward to -y, (x < y) if we can recursively swap -x with -(x+1) downward to -y without any changes in firewall policy Definition : We can say that -y is consecutively non-correlated upward to -x, (x < y) if we can recursively swap -y with -(y-1) upward to -x without any changes in firewall policy Definition 8: -y is generalized to -x if -x and -y are completely correlated and x < y. Definition 9: -x is said to be redundant by -y,(x < y) if action is the same and Rx Ry. Definition 10: -x is said to be consecutively redundant by -y if -x is redundant by -y and y = x Shadowing Anomaly Shadowed rule is a rule which will never be executed because all the packets that matched this rule are already matched by the one or more rules that are written above in the rule set. For example, -4 is shadowed because R4 (R3 U R2) = φ. No packet can be passed to -4 (see Figure 1). In [1], shadowed rule is defined as a rule that is shadowed by a (and only one) previous rule which has different action. Thus it can not classify that rule-4 is shadowed because it is shadowed by rule 2 and 3. This can be easily shown using Raining 2D-Box model in Figure 3(a). When shadowed rules occur, we should remove them to reduce the rule set s size. Theorem 1: The firewall policy does not change even if we remove -x, when rule-x is shadowed Correlation Anomaly Two rules (with different actions) are correlated if the first rule in order matches some packets that match the second rule and the second rule matches some packets that matched the first rule This definition is similar to [1]. But in their definition, this correlation is occurred by considering only when two or more attributes are different in those two rules. For example, in Figure 1, if we placed -6 above -5, firewall will accept packet where source from to destination at port 80. Another example of Correlation anomaly is -3 and -4 (see Figure 1. and Figure 3(b)). However, this kind of anomaly will not be discovered by the algorithm proposed in [1] because both -3 and -4 have only one attribute (dst_port) that is partially correlated. In other words, -3 and -4 are partially correlated because of only one (i.e. dst_port) attribute. There are many firewall products available in the market that allows this kind of correlation can be occurred such as port range port-range attribute in IPTABLES [5] and multi-address in Check Point FW-1 [4]. Therefore using our definition, we can discover this kind of correlations. Theorem 2: The firewall policy does not change even if we swap -x and -y, when -x and -y are consecutively non-correlated. Theorem 3: The firewall policy does not change even if we swap -x and -y, where x < y, and -x is consecutively non-correlated downward to rule-y, and -y is consecutively non-correlated upward to -x. However, by combining definition 1 and 2, we also found that even though -x and -y are correlated, we can swap the order of these two rules in the rule set. For example see -8 and -9. The reason of this example came from that correlate part between -8 and -9 is shadowed by previous rules (in this case -). It can also be explained using Raining 2D-Box model in Figure 3(c). We therefore define -x-y as a rule that is inverse-mapped from the relation resulted from Rx I Ry. -x-y is not in the rule set but we virtually assume that the order of -x-y in the rule set is at x, where x < y. Theorem 4: The firewall policy does not change even if we swap -x and -y, where -x and -y are correlated and -x-y is shadowed, and -x is consecutively non-correlated downward to rule-(y-1), and -y is consecutively non-correlated upward to -(x+1).

4 Generalization Anomaly A rule is said to be generalized to previous rule if it matches all packets which matched with previous rule, where actions are different. In general, two rules that are generalized can not be swapped. But in some cases, such as shown in Figure 3 (e), when -y is generalized -x, but it can be swapped because -x is shadowed by previous rules. Theorem 4 already covered this case because, in fact, generalization is special case of correlation (generalization is a completely correlation when x less than y) Redundancy Anomaly Theorem 5: The firewall rule does not change even if we remove -x from the rule set when -x is consecutively redundant by -y. For example as shown in Figure 3 (f), we can remove rule-11 without any changes in firewall policy. Theorem 6: The firewall rule does not change even if we remove -x from the rule set when -x is redundant by -y, and -x is consecutively non-correlated downward to rule-(y-1). For example, -5 is redundant by rule- (as shown in Figure 1 and Figure 3 (g)). But we cannot remove -5 because firewall will accept packet came from and destination to at port 80 (the intersection part of R5 and R6). Because -5 and -6 are correlated, then R5 cannot be removed which is described in Theorem 6. By considering more than two rules at the same time, we can discover anomaly that cannot be explained by using Set approach. For example, Firewall Policy Advisor in [1] will recommend user to remove -5 because it is redundant by -, which in fact it may not be removed as explained Anomaly Representation Raining 2D-Box Model We also propose a model to describe how it occur any anomaly. We called it Raining 2-Dimension Box Model as shown in Figure 3. It is a 2 dimensions box that contains the relations that are mapped from rules in the order described in the rule set. A rectangular is used to represent any relation of rule and action within each box. If action is not specified in the rectangular, it can be any actions (accept or deny). This model simulates packet that fall from the top to the bottom like raining. For example, when the relation in the box is not wet, means it is shadowed, as shown in Figure 3 (a) Shadowed (a) Shadow anomaly (b) Correlation anomaly (c) Correlation anomaly (can swap correlated rule) 6 x y 11 (d) Generalization anomaly (e) Generalization anomaly (can swap rule x,y) (f) Redundancy anomaly 5 6 (g) Redundancy anomaly (can not remove redundant rule) Figure 3. Raining 2D-Box Model

5 5. Anomaly Removing and Combinations We should remove anomalies from the firewall policy after we discovered them. It may shorten the size of rule set and make firewall policy easier to be understood by administrator. From the discussion in section 4, it is clear that we can remove rules that are shadowed (Theorem 1), and rules that are redundant which their conditions matched in Theorem 5 and 6. Reordering the rules in the rule set may help administrator understand the rule set easier. It also can increase the performance of the firewall because the rules that are matched to many packets are on the tops in the rule set. s that match in Theorem 2, 3 and 4 can be swapped without any changes in the firewall policy. The Theorems 2, 3 and 4 can help administrator swap the rules the gain the benefit above. Not only removing the rules from the rule set but also combining rules together to one rule can reduce the rule set s size. For example, in Figure 1, -1 and -2 can be combined in one rule where the new rule has dst_port defined as before / /24 80 accept / /24 80 accept / /24 80 accept / /24 80 accept after / /24 80 accept Figure 4. Combination Another example is shown in Figure 4. Four rules can be combined into one rule by changing the subnet mask from 26 to 24. This is similar to super-net concept. The detail of algorithm to combine the rules can be found in [8]. 6. Conclusion and Future Work In this paper, we analyze firewall rule set using Relational Algebra technique which could help us defining the anomalies that occurred in the rule set. We also explain how to remove anomalies and combining the rules to make the rule set size smaller. Many related works are either complex or can not be used to discover all the anomalies presented in this paper. It also can be used on firewall rule set on many commercial and open-source firewall products such as Checkpoint Firewall-1 and IPTABLES. In our future work, we will present discovery algorithms and implement the policy advisor using those algorithms. Our implementation will be based on Java applet. It can help administrator removing missing rules and combining the rules together to reduce the rule set s size. We will also implement policy editor to allow administrator to insert, and modify rules with alerts. This will make writing or modifying firewall easier to understand and make error-free firewall policy. References [1] Ehab Al-Shaer and Hazem Hamed, "Firewall Policy Advisor for anomaly Detection and Editing", IEEE/IFIP Integrated Management IM'2003, March [2] P. Eronen and J. Zitting. An Expert System for Analyzing Firewall s. Proceedings of 6thNordic Workshop on Secure IT-Systems (NordSec 2001), November [3] S. Hazelhusrt. Algorithms for Analyzing Firewall and Router Access Lists. Technical Report TR-WitsCS-1999, Department of Computer Science, University of the Witwatersrand, South Africa, July1999. [4] Check Point Visual Policy Editor Data Sheet. datasheet.pdf [5] Iptables Tutorial [6] Abraham Silberschatz, Henry F. Korth, Sudharsan S., Database System Concepts, 3rd Edition, Tata McGraw-Hill, 199. [] Managing Check Point FireWall-1, Using the Windows GUI Version [8] Chotipat Pornavalai and Thawatchai Chomsiri, Firewall Policy Analyzing by Relational Algebra Draft Technical Report, Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Thailand, January 2004.

Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model

Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model 94 IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 Detecting Policy Anomalies in Firewalls by Relational Algebra and Raining 2D-Box Model Naveen Mukkapati,

More information

FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING

FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING FIREWALL POLICY ADVISOR FOR ANOMALY DISCOVERY AND RULE EDITING Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information

More information

Discovery of Policy Anomalies in Distributed Firewalls

Discovery of Policy Anomalies in Distributed Firewalls Discovery of Policy Anomalies in Distributed Firewalls Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems

More information

Design and Implementation of Firewall Policy Advisor Tools

Design and Implementation of Firewall Policy Advisor Tools Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems

More information

Conflict Classification and Analysis of Distributed Firewall Policies

Conflict Classification and Analysis of Distributed Firewall Policies Conflict Classification and Analysis of Distributed Firewall Policies 1 Ehab Al-Shaer and Hazem Hamed School of Computer Science DePaul University, Chicago, USA Email: {ehab, hhamed}@cs.depaul.edu Raouf

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

Modeling and Management of Firewall Policies

Modeling and Management of Firewall Policies 1 Modeling and Management of Firewall Policies Ehab S. Al-Shaer and Hazem H. Hamed Abstract Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize

More information

Consistency verification of stateful firewalls is not harder than the stateless case

Consistency verification of stateful firewalls is not harder than the stateless case Consistency verification of stateful firewalls is not harder than the stateless case Levente Buttyán Gábor Pék Ta Vinh Thong buttyan@crysys.hu pek@crysys.hu thong@crysys.hu Laboratory of Cryptography and

More information

Comparing and debugging firewall rule tables

Comparing and debugging firewall rule tables Comparing and debugging firewall rule tables L. Lu, R. Safavi-Naini, J. Horton and W. Susilo Abstract: Firewalls are one of the essential components of secure networks. However, configuring firewall rule

More information

Optimization of Firewall Filtering Rules by a Thorough Rewriting

Optimization of Firewall Filtering Rules by a Thorough Rewriting LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department

More information

Detection and Resolution of Anomalies in Firewall Policy Rules

Detection and Resolution of Anomalies in Firewall Policy Rules Detection and Resolution of Anomalies in Firewall Policy Rules Muhammad Abedin, Syeda Nessa, Latifur Khan, and Bhavani Thuraisingham Department Of Computer Science The University of Texas at Dallas {maa056000,

More information

Consistency verification of stateful firewalls is not harder than the stateless case

Consistency verification of stateful firewalls is not harder than the stateless case RESEARCH Consistency verification of stateful firewalls is not harder than the stateless case LEVENTE BUTTYÁN, GÁBOR PÉK, TA VINH THONG Laboratory of Cryptography and Systems Security Budapest University

More information

Methods for Firewall Policy Detection and Prevention

Methods for Firewall Policy Detection and Prevention Methods for Firewall Policy Detection and Prevention Hemkumar D Asst Professor Dept. of Computer science and Engineering Sharda University, Greater Noida NCR Mohit Chugh B.tech (Information Technology)

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

Complete Redundancy Detection in Firewalls

Complete Redundancy Detection in Firewalls Complete Redundancy Detection in Firewalls Alex X. Liu and Mohamed G. Gouda Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, USA {alex, gouda}@cs.utexas.edu

More information

II. BASICS OF PACKET FILTERING

II. BASICS OF PACKET FILTERING Use of Formal models for the Firewall Policy Optimization ShatanandPatil* and B. B. Meshram** *(Department of Computer Technology, Veermata Jijabai Technical Institute, Mumbai 19) *(Department of Computer

More information

Automated Firewall Analytics

Automated Firewall Analytics Automated Firewall Analytics Ehab Al-Shaer Automated Firewall Analytics Design, Configuration and Optimization 123 Ehab Al-Shaer University of North Carolina Charlotte Charlotte, NC, USA ISBN 978-3-319-10370-9

More information

Firewall Policy Anomaly Management with Optimizing Rule Order

Firewall Policy Anomaly Management with Optimizing Rule Order Firewall Policy Anomaly Management with Optimizing Rule Order 1.Ms. Swati S. Kachare, 2 Dr. P.K. Deshmukh 1,Computer Department - Rajarshi Shahu College of Engg. Pune 2.Computer Department - Rajarshi Shahu

More information

Management of Exceptions on Access Control Policies

Management of Exceptions on Access Control Policies Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr

More information

DISTRIBUTED FIREWALLS AND IDS INTEROPERABILITY CHECKING BASED ON A FORMAL APPROACH

DISTRIBUTED FIREWALLS AND IDS INTEROPERABILITY CHECKING BASED ON A FORMAL APPROACH DISTRIBUTED FIREWALLS AND IDS INTEROPERABILITY CHECKING BASED ON A FORMAL APPROACH Kamel Karoui 1, Fakher Ben Ftima 2 and Henda Ben Ghezala 3 1 RIADI, ENSI, University of Manouba, Manouba, Tunisia kamel.karoui@insat.rnu.tn

More information

Misconfiguration Analysis of Network Access Control Policies

Misconfiguration Analysis of Network Access Control Policies Misconfiguration Analysis of Network Access Control Policies by Tung Tran A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics

More information

Confident Firewall Policy Configuration Management using Description Logic

Confident Firewall Policy Configuration Management using Description Logic Confident Firewall Policy Configuration Management using Description Logic William M. Fitzgerald 1,2 Simon N. Foley 2 Mícheál Ó Foghlú1 1 Telecommunications Software & Systems Group Waterford Institute

More information

Formal Checking of Multiple Firewalls

Formal Checking of Multiple Firewalls Formal Checking of Multiple Firewalls Nihel Ben Youssef Ben Souayeh 1 and Adel Bouhoula 2 1 higher School of Communication of Tunis (Sup'Com) University of Carthage, Tunisia nihel.byoussef@supcom.rnu.tn

More information

Firewall Analysis with Policy- Based Host Classification

Firewall Analysis with Policy- Based Host Classification Firewall Analysis with Policy- Based Host Classification Robert Marmorstein and Phil Kearns The College of William and Mary ABSTRACT For administrators of large systems, testing and debugging a firewall

More information

The SQL Injection Attacking Prevention Applying the Design Techniques

The SQL Injection Attacking Prevention Applying the Design Techniques The SQL Injection Attacking Prevention Applying the Design Techniques of IPTABLES Faculty of Informatics, Mahasarakham University, Thailand, preecha.n@msu.ac.th Abstract This study presents the SQL Injection

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

Analysis of Firewall Policy Rules Using Data Mining Techniques

Analysis of Firewall Policy Rules Using Data Mining Techniques Analysis of Firewall Policy Rules Using Data Mining Techniques Korosh Golnabi, Richard K. Min, Latifur Khan Department of Computer Science The University of Texas at Dallas Richardson, USA (koroshg, rkm010300,

More information

debugging a firewall policy mapping

debugging a firewall policy mapping R O B E R T M A R M O R S T E I N A N D P H I L K E A R N S debugging a firewall policy with policy mapping Robert Marmorstein will graduate from the College of William and Mary this summer with a Ph.D.

More information

FIREWALL CLEANUP WHITE PAPER

FIREWALL CLEANUP WHITE PAPER FIREWALL CLEANUP WHITE PAPER Firewall Cleanup Recommendations Considerations for Improved Firewall Efficiency, Better Security, and Reduced Policy Complexity Table of Contents Executive Summary... 3 The

More information

IT2305 Database Systems I (Compulsory)

IT2305 Database Systems I (Compulsory) Database Systems I (Compulsory) INTRODUCTION This is one of the 4 modules designed for Semester 2 of Bachelor of Information Technology Degree program. CREDITS: 04 LEARNING OUTCOMES On completion of this

More information

Section #6: Addressing

Section #6: Addressing Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port

More information

Modeling and Analysis of Firewalls by (Tissue-like) P Systems

Modeling and Analysis of Firewalls by (Tissue-like) P Systems Modeling and Analysis of Firewalls by (Tissue-like) P Systems Alberto Leporati, Claudio Ferretti Dipartimento di Informatica, Sistemistica e Comunicazione Università degli Studi di Milano Bicocca Viale

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

FIREMAN: A Toolkit for FIREwall Modeling and ANalysis

FIREMAN: A Toolkit for FIREwall Modeling and ANalysis FIREMAN: A Toolkit for FIREwall Modeling and ANalysis Lihua Yuan lyuan@ece.ucdavis.edu Hao Chen hchen@cs.ucdavis.edu Jianning Mai jnmai@ece.ucdavis.edu Chen-Nee Chuah chuah@ece.ucdavis.edu Zhendong Su

More information

PolicyVis: Firewall Security Policy Visualization and Inspection

PolicyVis: Firewall Security Policy Visualization and Inspection PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.

More information

COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES

COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:

More information

Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting

Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting Bit Vector Algorithms Enabling High-Speed and Memory- Efficient Firewall Blacklisting Lane Thames Randal Abler David Keeling Georgia Institute of Technology Georgia Institute of Technology Georgia Institute

More information

Firewall Optimization with Traffic Awareness Using Binary Decision Diagram

Firewall Optimization with Traffic Awareness Using Binary Decision Diagram International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 9-14 International Research Publication House http://www.irphouse.com Firewall Optimization with Traffic

More information

The methodology. Interne. 1 Introduction

The methodology. Interne. 1 Introduction 1 Introduction The methodology In an ideal world, firewall infrastructures are designed by people with experience, people who have the experience to intuitively know what they are doing. Ideally, these

More information

Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs

Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Towards Optimal Firewall Rule Ordering Utilizing Directed Acyclical Graphs Ashish Tapdiya and Errin W. Fulp Department of Computer Science Wake Forest University Winston Salem, NC, USA nsg.cs.wfu.edu Email:

More information

Adaptive Statistical Optimization Techniques for Firewall Packet Filtering

Adaptive Statistical Optimization Techniques for Firewall Packet Filtering 1 Adaptive Statistical Optimization Techniques for Firewall Packet Filtering Adel El-Atawy, Hazem Hamed, Ehab Al-Shaer School of Computer Science, DePaul University, Chicago, USA Abstract Packet filtering

More information

SDN Programming Languages. Programming SDNs!

SDN Programming Languages. Programming SDNs! SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to

More information

Firewall and Its Policies Management

Firewall and Its Policies Management Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

PolicyVis: Firewall Security Policy Visualization and Inspection

PolicyVis: Firewall Security Policy Visualization and Inspection PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.

More information

Inferring Higher Level Policies from Firewall Rules

Inferring Higher Level Policies from Firewall Rules Inferring Higher Level Policies from Firewall Rules Alok Tongaonkar, Niranjan Inamdar, and R. Sekar Stony Brook University ABSTRACT Packet filtering firewall is one of the most important mechanisms used

More information

How To Write A Privacy Preserving Firewall Optimization Protocol

How To Write A Privacy Preserving Firewall Optimization Protocol Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.1, No.2 (2011), pp. 93-100 http://dx.doi.org/10.14257/ajmscahs.2011.12.06 Secure Multi-Party Computation in

More information

To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set

To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set Sachin Singh Department of Computer Science & Engineering, TMU, Moradabad, Uttar Pradesh, India Article Info Article

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain Kamarasa V D S Santhosh M.Tech Student, Department of ComputerScience & Engineering, School of Technology, Gitam University,

More information

ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org

ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280. www.semargroup.org ISSN 2348 2370 Vol.06,Issue.04, June-2014, Pages:276-280 www.semargroup.org Firewall Policy Anomaly Detection and Resolution R.V.DARADE 1, PROF.P.B.KUMBHARKAR 2 1 Dept of Computer Engineering, SCOE, Sudumbare,

More information

Generic Firewall Rule Compiler And Modeller. CO42019 Honours Project

Generic Firewall Rule Compiler And Modeller. CO42019 Honours Project Generic Firewall Rule Compiler And Modeller CO42019 Honours Project UNDERGRADUATE PROJECT DISSERTATION Christopher Geeringh Supervisor: Professor William J. Buchanan Submitted in partial fulfilment of

More information

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization

An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science

More information

What communication protocols are used to discover Tesira servers on a network?

What communication protocols are used to discover Tesira servers on a network? Understanding device discovery methods in Tesira OBJECTIVES In this application note, basic networking concepts will be summarized to better understand how Tesira servers are discovered over networks.

More information

Reconciling multiple IPsec and firewall policies

Reconciling multiple IPsec and firewall policies Reconciling multiple IPsec and firewall policies Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zieliński Submission to SPW 2007 Abstract Manually configuring large firewall policies can be a hard and

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

IT2304: Database Systems 1 (DBS 1)

IT2304: Database Systems 1 (DBS 1) : Database Systems 1 (DBS 1) (Compulsory) 1. OUTLINE OF SYLLABUS Topic Minimum number of hours Introduction to DBMS 07 Relational Data Model 03 Data manipulation using Relational Algebra 06 Data manipulation

More information

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. APPENDIX B IP Subnetting IP Addressing Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is

More information

Modeling and Analysis of Firewalls by (Tissue-like) P Systems

Modeling and Analysis of Firewalls by (Tissue-like) P Systems ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 13, Number 2, 2010, 169 180 Modeling and Analysis of Firewalls by (Tissue-like) P Systems Alberto LEPORATI, Claudio FERRETTI Dipartimento di

More information

Policy Distribution Methods for Function Parallel Firewalls

Policy Distribution Methods for Function Parallel Firewalls Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,

More information

Firewall Examples. Using a firewall to control traffic in networks

Firewall Examples. Using a firewall to control traffic in networks Using a firewall to control traffic in networks 1 1 Example Network 1 2 1.0/24 1.2.0/24.4 1.0.0/16 Rc 5.6 4.0/24 2 Consider this example internet which has: 6 subnets (blue ovals), each with unique network

More information

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University,

Firewall Queries. Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu 2 Department of Computer Science, Texas State University, Firewall Queries Alex X. Liu 1, Mohamed G. Gouda 1, Huibo H. Ma 2, Anne HH. Ngu 2 1 Department of Computer Sciences, The University of Texas at Austin, Austin, Texas 78712-0233, U.S.A. {alex, gouda}@cs.utexas.edu

More information

Using Ranch Networks for Internal LAN Security

Using Ranch Networks for Internal LAN Security Using Ranch Networks for Internal LAN Security The Need for Internal LAN Security Many companies have secured the perimeter of their network with Firewall and VPN devices. However many studies have shown

More information

DBMS / Business Intelligence, SQL Server

DBMS / Business Intelligence, SQL Server DBMS / Business Intelligence, SQL Server Orsys, with 30 years of experience, is providing high quality, independant State of the Art seminars and hands-on courses corresponding to the needs of IT professionals.

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 5: Designing IP Addressing in the Network II Assistant Teacher Samraa Adnan Al-Asadi 1 Subnetting the Subnet When contiguous 1s are added to the default mask, making

More information

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram

PT Activity 8.1.2: Network Discovery and Documentation Topology Diagram Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet

More information

Digital Forensics. Module 7 CS 996

Digital Forensics. Module 7 CS 996 Digital Forensics Module 7 CS 996 Outline of Module #7 Review of labs (Kulesh) Review of module #6: sniffer tools Network Forensics Overview of tools Motivations Log Logic Appliance overview 3/22/04 Module

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Analysis of Policy Anomalies on Distributed Network Security Setups

Analysis of Policy Anomalies on Distributed Network Security Setups Analysis of Policy Anomalies on Distributed Network Security Setups J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France {Frederic.Cuppens,Nora.Cuppens}@enst-bretagne.fr

More information

Using Argumentation Logic for Firewall Policy Specification and Analysis

Using Argumentation Logic for Firewall Policy Specification and Analysis Using Argumentation Logic for Firewall Policy Specification and Analysis Arosha K. Bandara 1, Antonis Kakas 2, Emil C. Lupu 1, and Alessandra Russo 1 1 Department of Computing, Imperial College London,

More information

Firewall Policy Change-Impact Analysis

Firewall Policy Change-Impact Analysis 15 Firewall Policy Change-Impact Analysis ALEX X LIU, Michigan State University Firewalls are the cornerstones of the security infrastructure for most enterprises They have been widely deployed for protecting

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

CheckPoint FireWall-1 Version 3.0 Highlights Contents

CheckPoint FireWall-1 Version 3.0 Highlights Contents CheckPoint FireWall-1 Version 3.0 Highlights Contents Abstract...2 Active Network Management...3 Accounting... 3 Live Connections Report... 3 Load balancing... 3 Exporting log records to Informix database...

More information

Optimising Firewall Performance in Dynamic Networks

Optimising Firewall Performance in Dynamic Networks Optimising Firewall Performance in Dynamic Networks Ratish Mohan Master s Thesis Spring 2015 Optimising Firewall Performance in Dynamic Networks Ratish Mohan 18th May 2015 ii Abstract More and more devices

More information

Reducing the Size of Rule Set in a Firewall

Reducing the Size of Rule Set in a Firewall Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks

Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks Specifications of A High-level Conflict-Free Firewall Policy Language for Multi-domain Networks Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher School of Computer Science, Telecommunications

More information

BlueJ Teamwork Tutorial

BlueJ Teamwork Tutorial BlueJ Teamwork Tutorial Version 2.0 for BlueJ Version 2.5.0 (and 2.2.x) Bruce Quig, Davin McCall School of Engineering & IT, Deakin University Contents 1 OVERVIEW... 3 2 SETTING UP A REPOSITORY... 3 3

More information

What is Firewall Builder

What is Firewall Builder Firewall Builder The Problem In a heterogeneous environment, the administrator needs to be proficient with many different tools and CLI Administrator should understand how various firewalls differ in their

More information

Lab 4.5.4 Diagramming External Traffic Flows

Lab 4.5.4 Diagramming External Traffic Flows Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1

More information

Web Intelligence User Guide

Web Intelligence User Guide Web Intelligence User Guide Office of Financial Management - Enterprise Reporting Services 4/11/2011 Table of Contents Chapter 1 - Overview... 1 Purpose... 1 Chapter 2 Logon Procedure... 3 Web Intelligence

More information

Using Argumentation Logic for Firewall Configuration Management

Using Argumentation Logic for Firewall Configuration Management Using Argumentation Logic for Firewall Configuration Management Arosha K. Bandara Centre for Research in Computing Dept. of Computing, The Open University, Milton Keynes MK7 6AA, UK, Email: a.k.bandara@open.ac.uk

More information

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized Internet users

More information

Structured Firewall Design

Structured Firewall Design Structured Firewall Design Mohamed G. Gouda and Alex X. Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-0233, U.S.A. {gouda, alex}@cs.utexas.edu Abstract. A firewall

More information

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,

More information

Subnetting/Supernetting and Classless Addressing

Subnetting/Supernetting and Classless Addressing Chapter 5 Subnetting/Supernetting and Classless Addressing SUBNETTING SUPERNETTING CLASSLESS ADDRSSING The McGraw-Hill Companies, Inc., 2000 1 5.1 SUBNETTING The McGraw-Hill Companies, Inc., 2000 2 A network

More information

Network Firewall Policy Tries

Network Firewall Policy Tries Network Firewall Policy Tries Errin W. Fulp and Stephen J. Tarsa Department of Computer Science Wake Forest University Winston-Salem, NC, USA 27109 nsg.cs.wfu.edu fulp@wfu.edu Abstract Network firewalls

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

How To Write A Composition Engine In A Microsoft Ip System

How To Write A Composition Engine In A Microsoft Ip System Service composition in IMS using Java EE SIP servlet containers Torsten Dinsing, Göran AP Eriksson, Ioannis Fikouras, Kristoffer Gronowski, Roman Levenshteyn, Per Pettersson and Patrik Wiss The IP Multimedia

More information

CERN Cloud Infrastructure. Cloud Networking

CERN Cloud Infrastructure. Cloud Networking CERN Cloud Infrastructure Cloud Networking Contents Physical datacenter topology Cloud Networking - Use cases - Current implementation (Nova network) - Migration to Neutron 7/16/2015 2 Physical network

More information

EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES

EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES S. Pozo, R. M. Gasca, F. de la Rosa T. Department of Computer Languages and Systems,Computer Engineering College, University

More information

IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH

IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH IMPROVING DATA INTEGRATION FOR DATA WAREHOUSE: A DATA MINING APPROACH Kalinka Mihaylova Kaloyanova St. Kliment Ohridski University of Sofia, Faculty of Mathematics and Informatics Sofia 1164, Bulgaria

More information