Visual Analysis of Complex Firewall Configurations
|
|
|
- Esmond Murphy
- 10 years ago
- Views:
Transcription
1 Visual Analysis of Complex Firewall Configurations Florian Mansmann University of Konstanz Timo Göbel University of Konstanz William Cheswick ABSTRACT Firewalls have become essential components in the security concept of almost any modern computer network. Due to their relevance and central location in the network, their programming logic often survives several generations of administrators and hardware. Understanding the logic behind a firewall configuration is thus an important but challenging task for a network administrator. In general, there is a tendency to add new rules while old rules are only rarely changed or removed due to unexpected consequences in the network. In this paper we present a visualization tool to support the network administrator in this complex task of understanding firewall rule sets and object group definitions. The tool consists of a hierarchical sunburst visualization, which logically groups rules or object groups according to their common characteristics, a color-linked configuration editor and classical tree view components for rules and object groups. All these components are interactively linked to enable both exploratory and hypotheses testing tasks aimed at understanding the complex functionality of a firewall configuration. To verify our design, we present two case studies on the analysis of rule usage and on nested object groups and collected feedback from five firewall administrators. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: General Security and protection; C.3.8 [Computer Graphics]: Application; H.5.2 [Information Interfaces and Presentation]: User Interfaces General Terms Design, Human Factors, Security Keywords Firewall Visualization, Rule Set Visualization, Managing Firewalls Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. VizSec 12 October , Seattle, WA, USA Copyright 2012 ACM /12/10...$ INTRODUCTION Firewalls have become an integral part of the network security infrastructure of almost every managed network. Their goal is to either protect the internal network infrastructure from attacks, theft of data and manipulation or to log security related events at scale. Ever since the inception of firewalls [4], their complexity has dramatically increased not only in functionality, but also in the ways that people use and configure these firewalls. Due to the novel exploits and the increase of threats in the internet, administrators need to constantly adapt the protection of their network. While most of these changes involve patches of software on individual hosts, some other changes are more effective to be done through a traffic filtering rule on a central firewall. Because of changing personnel and responsibilities as common in many enterprises and institutions, the body of rules of a firewall often grows to an unmanageable size and complexity. Since there are many interdependencies in the network configuration, it is especially hard to change old rules. If I a rule gets deleted, what will break? What part of the business will suddenly have a problem? As a consequence, old rules are often kept in place. We believe that there is a pressing need to visually support network administrators in their complex task to manage historically grown firewall rule sets. In our preliminary experiments on representing the interlinked information of a firewall rule set we used graph visualizations, but soon realized that ambiguities of linked elements (e.g., TCP appearing in a almost every 2nd rule) were created so that one could not follow a single path of a rule. However, we were convinced that the structural information implicitly contained in the rule set should be made explicit in the visualization and we thus reverted to hierarchical visualization techniques. While Treemaps nicely visualize leave nodes of a hierarchy, they were not appropriate for our case since the more important information is contained in the structure of the hierarchy. Therefore, we decided to use a hierarchical visualization technique called Sunburst [18] to present firewall rulesets. Besides adapting this technique to group firewall rules based on their common properties, the strength of our tool is the linkage of the textual firewall rules with their visual counterpart as well as the interaction to explore rulesets in detail and to easily test hypothesis about the rule set. Furthermore, through an adaption of the visual mapping our tool can be used to assess performance aspects of a firewall in a fine-granular way. Note that while we built our tool on top of a real-world dataset, for security reasons
2 all data in this study was anonymized. The rest of this paper is structured as follows: Section 2 covers related work, Section 3 introduces our firewall visualization tool, which is then demonstrated in a case study in Section 4. Section 5 presents the critical design choices that we made when creating the firewall visualization tool and discusses user feedback. Finally, Section 6 concludes this paper and outlines future work. 2. RELATED WORK The structure and traffic of large computer networks is one of the most challenging things to visualize not only due to the size and interlinkage of the networks, but also due to the fact that data needs to be captured at different vantage points within the network to obtain a comprehensive picture of the network s underlying dynamics. Some of the early approaches at scale were the internet graphs by Cheswick et al. [3] and the Visualizing Network Data study [1] by Becker, Eick and Wilks. While the first approach focused on the topological aspects of the internet using a scalable node-link representation, the second approach aimed at presenting a high-level overview of the actual traffic loads within large networks using maps and matrix representations. PortVis [15] was one of the first approaches to show the activity of the more than 65,000 application ports in a pixel visualization. After locating interesting ports, the tool offered a time series visualization to investigate port activity over time. TNV [8] put its focus on temporal aspects of host communication patterns. Its basic visual metaphor was a matrix representation of time versus hosts in which traffic was indicated through the cell color and linkage information of selected hosts was drawn on top. Furthermore, an alternative visualization showed the relation between source and destination ports. Later, the Radial Traffic Analyzer [10] aimed at simultaneously investigating more dimensions of the protocol information (e.g. source/target IP, source/target port, time, etc.) in a hierarchical Sunburst [18] visualization. The Hierarchical Network Maps [14] then considered the IP address space in a hierarchical fashion by taking into account the autonomous systems, countries and continents to which individual IP prefixes belonged and displayed traffic information in a color-encoded TreeMap visualization. Finally, the Knowledge Representation in [21] introduced an interactive pattern specification component and processing in the network traffic analysis domain. For a more extensive coverage of the general topic of network security visualization, we refer the reader to a recently published survey [17]. Visualization of association rules or frequent patterns is a field closely related to our study. In this domain, we want to highlight two basic approaches. First, Wong et al. [20] argued against the representation of both antecedent and consequent of a rule as axes of a matrix and settled for a 3D matrix visualization, which links rules to a selected set of items (i.e. topics) using color to distinguish between antecedent and consequent. The summary columns then show support and confidence of the respective rules. This approach was applied to a collection of 3,000 text documents. For the design of the firewall rule visualization tool described in this paper, we were inspired by FP-Viz [11], which also builds upon the concept of the Sunburst visualization. The basic idea is to derive a hierarchy of common rule components. These components are then drawn as ring segments from the inside to the outside. Collecting the segments from the outside to the center of the Sunburst then corresponds to the components of one rule. Rules also play an important role in the field of network security. So-called intrusion detection systems often use a set of rules to classify network traffic and then output detailed hit statistics. SnortView [12] is a visualization system to analyze the output of the popular intrusion detection system Snort. This visualization system mostly uses matrix representations of source IP address vs. time or source vs. destination ip address. Statistical figures are represented in the background whereas glyph representations in the matrix cells give more details about the events. VisAlert [7] is another approach to visualize such event information. Its design principle is to visualize the network structure in the center and events on several concentric rings that represent time. The angle determines the kind of alert. The linkage between events and network entities is only shown for one selected timeframe. Yet another approach in this field is SprialView [2], which presents network events on a time spiral. Regular events form patterns in the visualization and are thus easy to identify. To the best of our knowledge, there are currently only three research papers that deal with the visualization of firewall data. Visual Firewall [13] uses line charts, parallel coordinates and matrix views with a combination of color-coding, glyphs, linking and animation to represent the activity of a firewall. In the essence, this work focuses on visualizing network traffic whereas our work concentrates on visualizing the components of firewall rules. In contrast to this PolicyVis [19] presents a visualization tool to interactively validate the rules of a firewall system. Its basic visual component is a configurable matrix visualization, which allows to set a choice of two dimensions from source/destination IP, source/destination port as the axes of a matrix and a third dimension for labeling. Semi-transparent bands in red and green then depict accept and deny rules. Created Voids [16] is yet another approach, which can be used to assess the relationship between different rules by transforming the value ranges of a rule into a geometric object. Respectively two dimensions of the rules create a plane in 3D and the value ranges define a rectangle of this plane. Linking several of these planes with each other creates a geometric object. Rendering several rules as geometric objects then allows to assess the interrelation between these rules. Parallel coordinates are used as an alternative representation of this information space. In contrast to this work, our approach offers a better overview of the ruleset since it displays rules in a non-overlapping manner without occlusion. While network traffic visualization has been extensively studied, there is only little work on the topic of visualizing firewall rule sets. Since appropriate tools for gaining an overview of a firewall rule set are still missing, we show that our mapping of the rule set into a hierarchical data space will help network administrators to better manage the intrinsic complexity of firewall configurations in the following sections. 3. VISUAL FIREWALL EDITOR This section includes a description of the firewall rule set data that we use, a general description of our system and a detailed explanation of our visualization of the rule and object groups.
3 Figure 1: Visual Firewall Editor showing the Sunburst visualization (left), the editor (top right) and two interactive tree views for access lists (middle right) and object groups (bottom right) respectively. 3.1 Firewall Rule Set Firewall rules are usually specified in a structured textual form. To maintain an overview, individual rules are grouped in access control lists (sometimes simply called access lists ) and their structural elements such as protocols, source/target hosts or ports can be grouped in object groups. Therefore, one single rule can express more general concepts. As an example all traffic to the three webservers of the company on the ICMP and UDP protocols should be dropped can be expressed in one rule rather than in six separate rules. Object groups define groupings of similar objects, which can then be used within access control lists to define policies for the access control lists. By using object groups there is, in most cases, no need to use individual IP addresses, protocols and ports for the access control lists. The object groups allow so-called multiple access control entries (ACEs) to grant or deny, for example, an entire object group of users access to an object group of servers. The rule set consisting of access control lists and object groups are usually stored in a firewall configuration file, which is then loaded and compiled by the actual firewall to efficiently process network traffic according to the given rules. Firewall configuration files can become complex and contain a large number of interdependent entries. Therefore, it can be very difficult to configure and manage the access control lists. Access control lists which use object groups tend to be smaller and more readable, which makes the configuration and management easier [5]. 3.2 System The Visual Firewall Editor is programmed in Java and based on the interactive visualization toolkit Prefuse [9]. In particular, our tool uses an adaption of the DocuBurst [6] code for the Sunburst visualization. Figure 1 shows the Visual Firewall Editor with the visualization of access lists of a firewall configuration file. In principle, our tool is composed of three interface components: 1. The Sunburst visualization depicts a hierarchical view on the firewall rules of the loaded configuration file. 2. The editor shows the textual representation of this firewall configuration file. 3. The interactive tree views show the created access list and object group hierarchies and enable navigation in them. While the Sunburst visualization will be discussed in detail in the next subsection, we will focus here on the other two interface components and their interactivity. The editor on the top right of Figure 1 can be used to display a complete firewall configuration file in textual form containing both object groups and access control lists. In addition to these functional elements, configuration files commonly contain comments written by the authors of the rules serving the purpose of documenting the semantic function of the rules in the historic context of the network infrastructure, which are not visible in the visualizations. To enable easier interpretation of the functional elements of the rules and object groups, we created a consistent coloring scheme for
4 (a) Search inside the visualization showing the highlighted keyword domain in a set of 160 rules. with 554 port-, network-, protocol or (b) Completely expanded tree showing the 168 object groups group-objects. Figure 2: Interaction with the Visualization code highlighting, which is later also employed in the visualization. The editor s text area is fully editable. All operations and changes can be saved via the main menu to a new or to the already existing file. The editor also has several interaction options. By pressing the right mouse button on a selected word, a menu pops up with the options copy, paste, cut, undo and highlight. Since structural information is available from the context only the element corresponding to the text marking in the textual rule description of the editor is highlighted in the Sunburst visualization. The resulting highlighting in the visualization is similar to the result of the search feature as shown in Figure 2(a). However, in contrast to the contextual highlighting, the search feature highlights all possible occurrences of the keyword in the visualization. Further search options for the editor are accessible through the main menu; matched keywords in the text are then highlighted in red. Since rules need to adhere to a strict syntax to be processable by the firewall, we created a quick edit component to support the network administrator in this task. After accessing it through the extended views menu, several drop-down boxes with predefined keywords guide the user though the creation of a new rule in the editable text box below. Upon submission, this new rule is added to the current cursor position in the firewall configuration file shown in the editor. Underneath the editor, two interactive tree view components allow the structural exploration of the access control lists and object groups. This view is useful to group rules and objects based on their structural elements. Figure 1, for example, shows the next grouping level of all deny rules of the access control list acl1 on the right side. 3.3 Rule and Object Group Visualization The employed Sunburst [18] is a hierarchical visualization technique, which puts a root node as a circle in the middle of the visualization and then recursively maps the elements of each hierarchy level onto ring segments. In order to use this visualization for our dataset, we need to model the firewall rules and object groups in a hierarchical way. In our concrete case, the first level after the root node for the rules visualization consists of the names of the different access lists as shown in Figure 1. The second level contains the access privileges ( permit or deny ), the 3rd one the protocol (i.e., tcp, ip, udp, etc.), followed by the source and destination dimensions, which are usually set to values such as any or concrete object groups. Note that the remaining dimensions vary in values since these fields are optional for rules, which causes the spikes on the outside of the visualization. Usually these dimensions contain object groups that define grouping of ports or comparisons (e.g. gt 1023 for destination port greater than 1023). A hierarchy is formed from our data by grouping identical rule elements in a recursive manner according to the above described dimensional order. As a result, acl1 in Figure 1 is split up into blocks of permit and deny rules in which each contains among others a block of TCP and IP protocol rules. This subdivision is repeated until the end of each rule is used. We designed our Visual Firewall Editor in a way that it supports two basic tasks. The first task is the exploration of firewall rules and object groups, whereas the second task is to test certain hypotheses about a rule set. We will now describe the interaction features of our visualization component according to these opposing usage strategies. Note that a common analysis process often involves both strategies and the respective interaction methods can thus also be used for the opposing analysis task.
5 The depth level slider depicted on top of the visualization in Figure 1 defines the number of hierarchy levels to be shown in the visualization. When the depth level is set to maximum all nodes of the visualization are displayed and the corresponding trees on the right side are expanded. To make the best use of the display space, the auto zoom feature automatically scales the visualization with the selected depth according to the size of the frame. This ensures that the elements of the visualization are enlarged in the best possible way in order to make their labels readable and to enable cross-element comparisons of their sizes. When turning off the auto zoom, the user can zoom in and out of the displayed vector graphic. This interaction is triggered by holding down the right mouse button and moving the cursor up or down. To improve the visibility of a node and the readability of its label, the width of a segment can be changed interactively using the mouse wheel. This interaction can also be used to decrease the used space of an element when it is irrelevant for the current analysis task and to give more more space for the remaining elements. When the mouse cursor is set above a node in the visualization, a tooltip with is label is shown. By pressing the left mouse button on a node in the visualization, the corresponding line in the text editor containing the firewall configuration file will be focused in the editor window and highlighted using red background color. Furthermore, the corresponding hierarchy element in the access list or object group treeview on the right is opened and highlighted. The second usage scenario of our tool is to test hypotheses about a certain firewall configuration. In this scenario, the network administrator already has a concrete idea about what he wants to find out about the firewall rule set. We created several interaction capabilities in the tool that support this goal-driven search for information: First, every node can also be expanded manually to each depth level through a left mouse button click on the node without expanding the whole tree with all nodes. Figure 3 shows a node that has been expanded manually to the protocols and object groups that will be permitted. As already described above, this interaction also triggers highlighting and focusing in the text editor and the respective treeview. Second, there is also a possibility to search for a specific keyword, which is highlighted in the visualization to obtain a closer view of a known element and its connectivity with other access lists. Figure 2(a) shows the use of the search option with the keyword domain. It can be seen that domain is included in four access lists. The number of matches is Figure 3: Manual node expansion also displayed on the left side of the search field. Third, the user-defined visualization provides the ability for the user to visualize the relationship of arbitrary rule elements in a user-defined priority. For example, the user can visualize the access control list, source objects, protocol and access privileges in descending order. Figure 4(a) shows that nearly all rules for TCP protocol permit access. Another insightful visualization could be a comparison of the permit and deny rules for each access control list as shown in Figure 4(b). All of the access control lists contain permit rules, whereas only 6 out of 8 contain deny blocks. Note that both the above described visualization and interactions can not only be applied to firewall rules, but can be used in exactly the same way on object groups of a firewall configuration. In our tool, this is done by changing the root node from access list to object-group. The result of this change is shown in Figure 2(b). It can be seen that there are two types of object groups with a large number of entries ( network and service ) and two types with only a few entries. If the visualization is expanded to maximum depth level, all elements of the visualization are shown. The fine-granular elements at the outer rings define concrete IP addresses for host objects and port number for service objects. 4. CASE STUDY This section describes two relevant use cases within the analysis of a firewall configuration file. The configuration file consisted of 160 rules, which were grouped into 8 access control lists and 168 object groups. In total, this configuration file consisted of approximately 1150 lines of code. 4.1 Analysis of Rule Usage Another issue of firewall configuration is the matching of traffic for the access control entries. For this reason a hit count value can be added to each access control entry. This value documents how often a certain rule was matched and is thus commonly used for troubleshooting connectivity and security of a firewall configuration. Since it is tedious to compare these hitcount values and to manually aggregate them on access control lists, we configured our Visual Firewall Editor in such a way that it can read and aggregate these statistical usage values. Figure 5(a) shows the resulting visualization of access control lists with hit count values. It can be seen that the access control lists acl1 and acl4 are very large, which means that the the sum of all hit count values for those access lists is very high. Since there is a large variance in the hitcount values, we use logarithmic scaling to determine the width of the rule segments. While absolute comparisons are not possible any more, this avoids the effect that one or a few standard rule cover the whole visualization space. The segment of the access control list acl1 in Figure 5(a) is very large because of high hitcount values whereas the next access control list acl2 almost disappears due to a small number of hitcount values. It can also be seen that the ring segment of the deny rules of acl1 compared to the ring segment of the permit rules have almost the same size. This means that the traffic of the permit and deny rules is nearly the same. In case of the access control list acl4 it can be seen that its permit rules compared to its deny rules have a larger circle segment. The hit count visualization in general gives a good overview what access control lists apply for high traffic and vice versa.
6 (a) Access list, source object, protocol, access privilege (b) Proportions of permit and deny rules with access lists and source objects Figure 4: Hypothesis driven analysis with user-configured visualizations. The rule hierarchy is specified from inside to outside using a subset of the rule fields (i.e. the access privileges) and/or values (e.g. tcp). So the user can individually decide what access control list should be inspected in detail. Furthermore, we provide the option to display unused rules in a firewall configuration, which all have a hitcount value of 0. Figure 5(b) shows that acl3 and acl5 have a very large number of access control entries with a hit count value equal to 0. Access control list acl4 is nearly half the size in contrast to the visualization of used rules in Figure 5(a). In general, the fact that a rule has no hits does not necessarily mean that it is not useful from a security point of view. However, some of these rules can be considered as historic artifacts, which are either not necessary any more (especially permit rules that were not used for several months) or are not executed due to other executed rules that now fill their place. 4.2 Understanding Nested Object Groups In a CISCO firewall configuration, object groups provide the feature of including other object groups in their definition. While this gives more flexibility to the network administrators, it also increases the complexity of a firewall configuration. Our firewall visualization can be used to explore such dependencies within object groups. Figure 6 shows the visualization of all nested object groups of the configuration file with a detailed view on the object group nobg22admin. The object group nobg22admin has several network-objects and as a nested object group the nobg3 group object. In this case all details of the network-objects of the nested object group are displayed for inspection. 5. DISCUSSION The purpose of this section is to discuss on the one hand the implicit and explicit design choices that we made in our tool and on the other side the feedback that we obtained from firewall administration experts. Figure 6: Nested object groups 5.1 Design Choices In the process of designing a visualization tool to support network administrators in their task to understand and maintain a firewall configuration, we considered many options. After initial tries, node link diagrams (also known as graphs) were discarded due to emerging ambiguities when linking several rule elements or object group elements with each other. Furthermore, since the information space was so large, we opted for a compromise between showing aggregations and showing the full level of details, which eventually converged to the choice of using an adaptation of the Sunburst visualization linked with classical treeviews and a text editor. The usage of color for establishing a linkage between the textual elements in the text editor on white background
7 Little utilized rule Highly utilized rule (a) Access control lists with hitcount values (b) All unused rules (hitcount value = 0) Figure 5: Expanded tree for access control lists with and without logarithmically scaling the rule segments width according to rule hits. Note the expansion of acl1 in (a) due to high usage of its rules and the many unused rules in the blue access list acl3 in (b). and the solid elements of the Sunburst visualization required many iterations. Since the distinction of color for categorical values is very limited, we were forced to reuse some colors, which introduced ambiguities. In the end we opted for fixed colors for the most common keywords (e.g. TCP, any, etc.). Especially for the access privileges we used familiar semantics by assigning green to permit and red to deny. Less common keywords and names are assigned repeating colors. Both search and interaction features can then be used to resolve ambiguities. Unfortunately, these color design choices make the system sub-optimal to use for people suffering from color blindness. Another critical design decision was not to use blank elements to compensate for non-existing elements in rules. While this lead to spikes on the outside of the circle, we found it visually more appealing than holes in the inside of the visualization. 5.2 User Feedback Feedback from a group of five firewall administrators in our IT department was very encouraging. Some stated that an overview was possible for the first time. They liked the fact that finding things in a configuration file was supported both through clicking on elements in the visualization and keyword search. Especially the two-way linkage between the visualization and editing through color linkage and interaction was considered a major benefit. One person also stated that changing the firewall configuration file in such an interactive way would make work easier, in particular when searching for the right place to amend a new rule. Furthermore, they wanted to use this tool in order to get rid of historically grown rules, which were not necessary any more. Unfortunately, due to the limited human resources in this research project, we were not able to provide the necessary support for a long-term deployment of our prototype. However, many feature requests by the users such as the support for other firewall configuration formats, comparison capabilities for different versions of a configuration, extensions towards large log files (typically several hundreds MegaBytes), packet testing features, and a translation of user policy settings to access control lists showed us not only the users engagement into our project, but also the need for further developments in this direction. 6. CONCLUSION In this paper we presented a research prototype for the analysis of complex firewall configurations. The main focus of this work was to break down the complexity of many rules in access control lists and complex object groups through a Sunburst visualization. In order to use this visualization we abstracted the firewall configuration data by deriving a hierarchy based on common attribute values of object groups and rules. A strong focus of our study was to define the contextual interaction capabilities between the text editor containing the firewall configuration file, the Sunburst visualization showing an abstracted representation of the data and two treeviews listing the hierarchically grouped data. The presentation of our prototype to a group of five firewall configuration experts revealed not only the value that this tool provides to simplify common steps in their work, but also showed the need for further developments in the domain of firewall visualization. In general, we believe that our visualization is quite scalable in the number of rules and object groups it can display. Only labeling became a major problem in our case, which was resolved through zooming features. Nevertheless, we re-
8 alized that there exist larger configuration files than the one used in this work. Dealing with such files would require additional filtering criteria, an aspect that might be considered in future work. Further aspects to be considered in future work are taking into account the order of rule processing, rule testing, such as a generalized search for IP addresses within prefixes of rules and objects, and a temporal visualization for historic rule usage. 7. ACKNOWLEDGMENTS We thank Andreas Merkel and Marcel Waldvogel from the IT service center of the University of Konstanz for their continuous support during this project. Furthermore, we are very grateful to Stephan Pietzko who shared many insights into this complex topic with us. 8. REFERENCES [1] R. Becker, S. Eick, and A. Wilks. Visualizing network data. Visualization and Computer Graphics, IEEE Transactions on, 1(1):16 28, [2] E. Bertini, P. Hertzog, and D. Lalanne. SpiralView: towards security policies assessment through visual correlation of network resources with evolution of alarms. In Visual Analytics Science and Technology, VAST IEEE Symposium on, pages IEEE, [3] B. Cheswick, H. Burch, and S. Branigan. Mapping and visualizing the internet. In Proc. USENIX Annual Technical Conference, pages Citeseer, [4] W. Cheswick, S. Bellovin, and A. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 1st edition, [5] CISCO. Cisco systems. object groups for acls, September data plane/ configuration/guide/sec object group acl.html. [6] C. Collins. Docuburst: Document content visualization using language structure. In Proceedings of IEEE Symposium on Information Visualization, Poster Session. Baltimore. Citeseer, [7] S. Foresti, J. Agutter, Y. Livnat, S. Moon, and R. Erbacher. Visual correlation of network alerts. IEEE Computer Graphics and Applications, pages 48 59, [8] J. Goodall, W. Lutters, P. Rheingans, and A. Komlodi. Preserving the big picture: Visual network traffic analysis with tnv. In Visualization for Computer Security, 2005.(VizSEC 05). IEEE Workshop on, pages IEEE, [9] J. Heer, S. Card, and J. Landay. Prefuse: a toolkit for interactive information visualization. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages ACM, [10] D. A. Keim, F. Mansmann, J. Schneidewind, and T. Schreck. Monitoring network traffic with radial traffic analyzer. In Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST 06), [11] D. A. Keim, J. Schneidewind, and M. Sips. Fp-viz: Visual frequent pattern mining. In Proceedings of IEEE Symposium on Information Visualization (InfoVis 05), Poster Paper, [12] H. Koike and K. Ohno. SnortView: visualization system of snort logs. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages ACM, [13] C. Lee, J. Trost, N. Gibbs, R. Beyah, and J. Copeland. Visual firewall: real-time network security monitor. In Visualization for Computer Security, 2005.(VizSEC 05). IEEE Workshop on, pages IEEE, [14] F. Mansmann, D. A. Keim, S. C. North, B. Rexroad, and D. Sheleheda. Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats. IEEE Transactions on Visualization and Computer Graphics, 13(6), [15] J. McPherson, K. Ma, P. Krystosk, T. Bartoletti, and M. Christensen. Portvis: a tool for port-based detection of security events. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, pages ACM, [16] S. Morrissey and G. Grinstein. Visualizing firewall configurations using created voids. In 6th International Workshop on Visualization for Cyber Security (VizSec), [17] H. Shiravi, A. Shiravi, and A. Ghorbani. A survey of visualization systems for network security. Visualization and Computer Graphics, IEEE Transactions on, 99(RapidPosts), [18] J. Stasko, R. Catrambone, M. Guzdial, and K. McDonald. An evaluation of space-filling information visualizations for depicting hierarchical structures. International Journal of Human-Computer Studies, 53(5): , [19] T. Tran, E. Al-Shaer, and R. Boutaba. PolicyVis: firewall security policy visualization and inspection. In Proceedings of the 21st conference on Large Installation System Administration Conference, pages USENIX Association, [20] P. Wong, P. Whitney, and J. Thomas. Visualizing association rules for text mining. In InfoVis, page 120. Published by the IEEE Computer Society, [21] L. Xiao, J. Gerth, and P. Hanrahan. Enhancing visual analysis of network traffic using a knowledge representation. In Visual Analytics Science And Technology, 2006 IEEE Symposium On, pages IEEE, 2006.
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
An Adaptable Innovative Visualization For Multiple Levels of Users
World Applied Sciences Journal 15 (5): 722-727, 2011 ISSN 1818-4952 IDOSI Publications, 2011 An Adaptable Innovative Visualization For Multiple Levels of Users Doris Hooi-Ten Wong and Sureswaran Ramadass
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Teryl Taylor, Stephen Brooks and John McHugh Abstract NetBytes Host Viewer is an interactive visualization
CHAPTER. Monitoring and Diagnosing
CHAPTER 20. This chapter provides details about using the Diagnostics & Monitoring system available through ShoreTel Director. It contains the following information: Overview... 661 Architecture... 661
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks Florian Mansmann, Fabian Fischer, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel [email protected] Abstract: While
VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc., http://willsfamily.org/gwills
VISUALIZING HIERARCHICAL DATA Graham Wills SPSS Inc., http://willsfamily.org/gwills SYNONYMS Hierarchical Graph Layout, Visualizing Trees, Tree Drawing, Information Visualization on Hierarchies; Hierarchical
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Visualization Techniques in Data Mining
Tecniche di Apprendimento Automatico per Applicazioni di Data Mining Visualization Techniques in Data Mining Prof. Pier Luca Lanzi Laurea in Ingegneria Informatica Politecnico di Milano Polo di Milano
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Automating Server Firewalls
Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing
PolicyVis: Firewall Security Policy Visualization and Inspection
PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs Tetsuji Takada Satellite Venture Business Lab. University of Electro-Communications [email protected] Hideki Koike Graduate
Monitoring Network Traffic with Radial Traffic Analyzer
Monitoring Network Traffic with Radial Traffic Analyzer Daniel A. Keim Florian Mansmann Jörn Schneidewind Tobias Schreck Databases and Visualization Group University of Konstanz, Germany {keim,mansmann,schneide,schreck}@inf.uni-konstanz.de
WhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
Flexible Web Visualization for Alert-Based Network Security Analytics
Flexible Web Visualization for Alert-Based Network Security Analytics Lihua Hao 1, Christopher G. Healey 1, Steve E. Hutchinson 2 1 North Carolina State University, 2 U.S. Army Research Laboratory [email protected]
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansmann, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
A Novel Visualization Method for Detecting DDoS Network Attacks
A Novel Visualization Method for Detecting DDoS Network Attacks Jiawan Zhang 1, Guoqiang Yang 1, Liangfu Lu 2,*, Mao Lin Huang 3, 1. School of Computer Science and Technology, Tianjin University, Tianjin,P.R.China;
Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics
Paper 3323-2015 Visualizing Relationships and Connections in Complex Data Using Network Diagrams in SAS Visual Analytics ABSTRACT Stephen Overton, Ben Zenick, Zencos Consulting Network diagrams in SAS
AXIGEN Mail Server Reporting Service
AXIGEN Mail Server Reporting Service Usage and Configuration The article describes in full details how to properly configure and use the AXIGEN reporting service, as well as the steps for integrating it
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin
A Prevention & Notification System By Using Firewall Log Data By Pilan Lin 1 Table Of Content ABSTRACT... 3 1 INTRODUCTION... 4 2. Firewall Log data... 6 2.1 How to collect log data... 6 3. Prevention
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Visualization of Host Behavior for Network Security
Visualization of Host Behavior for Network Security Florian Mansman, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Simplified Network Traffic Visualization for Real-Time Security Analysis
Simplified Network Traffic Visualization for Real-Time Security Analysis Matthew Dean and Lucas Vespa Department of Computer Science University of Illinois Springfield Springfield, IL 62703 Abstract Although
S&C IntelliTeam CNMS Communication Network Management System Table of Contents Overview Topology
S&C IntelliTeam CNMS Communication Network Management System Operation Topology Table of Contents Section Page Section Page Overview.... 2 Topology Discovery... 4 Viewing the Network.... 4 Add Entire Network
Hierarchy and Tree Visualization
Hierarchy and Tree Visualization Definition Hierarchies An ordering of groups in which larger groups encompass sets of smaller groups. Data repository in which cases are related to subcases Hierarchical
Configuration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
SuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu [email protected] Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
PolicyVis: Firewall Security Policy Visualization and Inspection
PolicyVis: Firewall Security Policy Visualization and Inspection Tung Tran, Ehab Al-Shaer, and Raouf Boutaba University of Waterloo, Canada ABSTRACT Firewalls have an important role in network security.
Hierarchical Data Visualization. Ai Nakatani IAT 814 February 21, 2007
Hierarchical Data Visualization Ai Nakatani IAT 814 February 21, 2007 Introduction Hierarchical Data Directory structure Genealogy trees Biological taxonomy Business structure Project structure Challenges
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
1 FTire/editor s Main Menu 1
FTire/editor FTire Data File Editor and Analyzer Documentation and User s Guide Contents 1 FTire/editor s Main Menu 1 2 FTire/editor s Data Entry Menus 2 2.1 The Tire Size and Specification Data Menu........................
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
Space-filling Techniques in Visualizing Output from Computer Based Economic Models
Space-filling Techniques in Visualizing Output from Computer Based Economic Models Richard Webber a, Ric D. Herbert b and Wei Jiang bc a National ICT Australia Limited, Locked Bag 9013, Alexandria, NSW
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization
An Approach for improving Network Performance using Cross-Domain Cooperative Secrecy-Maintaining Firewall Optimization Yogita Nikhare 1 andprof. Anil Bende 2 1 M.TechScholar, Department of Computer Science
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Advanced Microsoft Excel 2010
Advanced Microsoft Excel 2010 Table of Contents THE PASTE SPECIAL FUNCTION... 2 Paste Special Options... 2 Using the Paste Special Function... 3 ORGANIZING DATA... 4 Multiple-Level Sorting... 4 Subtotaling
Hierarchical Data Visualization
Hierarchical Data Visualization 1 Hierarchical Data Hierarchical data emphasize the subordinate or membership relations between data items. Organizational Chart Classifications / Taxonomies (Species and
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
Graphical Web based Tool for Generating Query from Star Schema
Graphical Web based Tool for Generating Query from Star Schema Mohammed Anbar a, Ku Ruhana Ku-Mahamud b a College of Arts and Sciences Universiti Utara Malaysia, 0600 Sintok, Kedah, Malaysia Tel: 604-2449604
Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats
Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats by Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, and Daniel
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
IQ MORE / IQ MORE Professional
IQ MORE / IQ MORE Professional Version 5 Manual APIS Informationstechnologien GmbH The information contained in this document may be changed without advance notice and represents no obligation on the part
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
an introduction to VISUALIZING DATA by joel laumans
an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA iii AN INTRODUCTION TO VISUALIZING DATA by Joel Laumans Table of Contents 1 Introduction 1 Definition Purpose 2 Data
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations Simon R. Chudley and Ulrich Ultes-Nitsche Department of Electronics and Computer Science, University of
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
Do you know? "7 Practices" for a Reliable Requirements Management. by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd.
Do you know? "7 Practices" for a Reliable Requirements Management by Software Process Engineering Inc. translated by Sparx Systems Japan Co., Ltd. In this white paper, we focus on the "Requirements Management,"
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
Optimization of Firewall Filtering Rules by a Thorough Rewriting
LANOMS 2005-4th Latin American Network Operations and Management Symposium 77 Optimization of Firewall Filtering Rules by a Thorough Rewriting Yi Zhang 1 Yong Zhang 2 and Weinong Wang 3 1, 2, 3 Department
Topic Maps Visualization
Topic Maps Visualization Bénédicte Le Grand, Laboratoire d'informatique de Paris 6 Introduction Topic maps provide a bridge between the domains of knowledge representation and information management. Topics
Information Server Documentation SIMATIC. Information Server V8.0 Update 1 Information Server Documentation. Introduction 1. Web application basics 2
Introduction 1 Web application basics 2 SIMATIC Information Server V8.0 Update 1 System Manual Office add-ins basics 3 Time specifications 4 Report templates 5 Working with the Web application 6 Working
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
NakeDB: Database Schema Visualization
NAKEDB: DATABASE SCHEMA VISUALIZATION, APRIL 2008 1 NakeDB: Database Schema Visualization Luis Miguel Cortés-Peña, Yi Han, Neil Pradhan, Romain Rigaux Abstract Current database schema visualization tools
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
orrelog SNMP Trap Monitor Software Users Manual
orrelog SNMP Trap Monitor Software Users Manual http://www.correlog.com mailto:[email protected] CorreLog, SNMP Trap Monitor Software Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No
TIBCO Spotfire Business Author Essentials Quick Reference Guide. Table of contents:
Table of contents: Access Data for Analysis Data file types Format assumptions Data from Excel Information links Add multiple data tables Create & Interpret Visualizations Table Pie Chart Cross Table Treemap
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
CHAPTER 1 WhatsUp Flow Monitor Overview. CHAPTER 2 Configuring WhatsUp Flow Monitor. CHAPTER 3 Navigating WhatsUp Flow Monitor
Contents CHAPTER 1 WhatsUp Flow Monitor Overview What is Flow Monitor?... 1 How does Flow Monitor work?... 2 Supported versions... 2 System requirements... 2 CHAPTER 2 Configuring WhatsUp Flow Monitor
Avaya P330 Load Balancing Manager User Guide
Avaya P330 Load Balancing Manager User Guide March 2002 Avaya P330 Load Balancing Manager User Guide Copyright 2002 Avaya Inc. ALL RIGHTS RESERVED The products, specifications, and other technical information
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
TOP-DOWN DATA ANALYSIS WITH TREEMAPS
TOP-DOWN DATA ANALYSIS WITH TREEMAPS Martijn Tennekes, Edwin de Jonge Statistics Netherlands (CBS), P.0.Box 4481, 6401 CZ Heerlen, The Netherlands [email protected], [email protected] Keywords: Abstract:
The following topics describe how to manage policies on the Management Center:
The following topics describe how to manage policies on the Management Center: Policy Deployment, page 1 Policy Comparison, page 8 Policy Reports, page 10 Out-of-Date Policies, page 11 Policy Warnings,
1. Firewall Configuration
1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets
SonicWALL GMS Custom Reports
SonicWALL GMS Custom Reports Document Scope This document describes how to configure and use the SonicWALL GMS 6.0 Custom Reports feature. This document contains the following sections: Feature Overview
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
vrealize Operations Manager User Guide
vrealize Operations Manager User Guide vrealize Operations Manager 6.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Ultimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected]
Tutorial for proteome data analysis using the Perseus software platform
Tutorial for proteome data analysis using the Perseus software platform Laboratory of Mass Spectrometry, LNBio, CNPEM Tutorial version 1.0, January 2014. Note: This tutorial was written based on the information
Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator
Using Visual Analytics to Enhance Data Exploration and Knowledge Discovery in Financial Systemic Risk Analysis: The Multivariate Density Estimator Victoria L. Lemieux 1,2, Benjamin W.K. Shieh 2, David
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102
Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System
Before you can use the Duke Ambient environment to start working on your projects or
Using Ambient by Duke Curious 2004 preparing the environment Before you can use the Duke Ambient environment to start working on your projects or labs, you need to make sure that all configuration settings
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
