US 11,757,888 B2
Systems and methods for fine grained forward testing for a ZTNA environment
Rajiv Sreedhar, Sunnyvale (CA); Manuel Nedbal, Santa Clara, CA (US); Manoj Ahluwalia, San Jose, CA (US); Damodar K. Hegde, Santa Clara, CA (US); Jitendra B. Gaitonde, Cupertino, CA (US); Suresh Rajanna, San Jose, CA (US); Mark Lubeck, San Jose, CA (US); and Gary Nool, Princeton, NJ (US)
Assigned to Fortinet, Inc., Sunnyvale, CA (US)
Filed by Fortinet, Inc., Sunnyvale, CA (US)
Filed on Jun. 15, 2021, as Appl. No. 17/348,152.
Prior Publication US 2022/0400114 A1, Dec. 15, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01); H04L 43/50 (2022.01)
CPC H04L 63/101 (2013.01) [H04L 43/50 (2013.01); H04L 63/0263 (2013.01); H04L 63/20 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for performing forward testing on an access control list in a network environment, the method comprising:
accessing, by a processing resource, a first access control list including at least a first workload rule that allows a first type of network communication and a default rule, wherein the first type of network communication corresponds to a first application;
modifying, by the processing resource, the first access control list to yield a second access control list, wherein the second access control list additionally includes at least a secure rule and a second workload rule other than the first workload rule, wherein the secure rule blocks at least the first type of network communication, wherein the second workload rule allows a second type of network communication, and wherein the second type of network communication, different from the first type of network communication, corresponds to the second application; and
forward testing, by the processing resource, the second access control list, wherein the forward testing includes applying a set of network control rules included in the second access control list in a sequence until one of the rules in the set of network control rules is satisfied, and wherein the sequence as applied to the network control rules is based on an order list that includes:
applying first the first workload rule before the secure rule;
applying the secure rule before applying the second workload rule;
applying the second workload rule before applying the default rule; and then
applying the default rule.