US 11,997,069 B2
Intelligent firewall access rules
Bikram Kumar Gupta, Sunnyvale, CA (US); Ananth Raman, San Jose, CA (US); Manuel Nedbal, Santa Clara, CA (US); and Elanthiraiyan A. Anbalagan, Sunnyvale, CA (US)
Assigned to McAfee, LLC, San Jose, CA (US)
Filed by McAfee, LLC, San Jose, CA (US)
Filed on Jan. 25, 2021, as Appl. No. 17/157,662.
Application 17/157,662 is a continuation of application No. 16/524,968, filed on Jul. 29, 2019, granted, now 10,904,216.
Application 16/524,968 is a continuation of application No. 15/038,388, granted, now 10,367,787, issued on Jul. 30, 2019, previously published as PCT/US2013/077233, filed on Dec. 20, 2013.
Prior Publication US 2021/0152521 A1, May 20, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 16/28 (2019.01); H04L 43/12 (2022.01); H04L 67/1095 (2022.01)
CPC H04L 63/0263 (2013.01) [G06F 16/282 (2019.01); H04L 43/12 (2013.01); H04L 63/10 (2013.01); H04L 63/1408 (2013.01); H04L 67/1095 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer readable storage device or storage disk comprising computer readable instructions to cause at least one processor circuit to at least:
populate a first dynamic object of a firewall rule with first information to identify a first updateable set of devices that satisfy a first one of a plurality of conditions associated with the firewall rule, the first information based on first data obtained from an appliance that is to monitor communication traffic in at least a portion of a network;
populate a second dynamic object of the firewall rule with second information to identify a second updateable set of devices that satisfy a second one of the plurality of conditions associated with the firewall rule, the second information based on second data obtained from a data source different from the appliance; and
apply, based on evaluation of the first dynamic object and the second dynamic object, the firewall rule to first network traffic associated with a first device in communication with the network, the firewall rule to cause the first network traffic to be at least one of blocked, permitted, rate limited, quarantined or captured.