throbber
UCRL-JC-119743
`PREPRINT
`
`Firewall Products Today
`
`S.P. Cooper
`
`This paper was prepared for submittal to the
`DOE Computer Security Group Training Conference
`Milwaukee, WI
`May 2-5, 1995
`
`February 1995
`
`Lawrence
`Liverm ore
`Laboratory
`National
`
`This is a preprint of a paper intended for publication in a journal or proceedings. Since
`changes may be made before publication, this preprint is made available with the
`understanding that it will not be cited or reproduced without the permission of the
`author.
`
`Google Ex. 1314, pg. 1
`
`

`

`DISCLAIMER
`
`This document was prepared as an account of work sponsored by an agency of
`the United States Government. Neither the United States Government nor the
`University of California nor any of their employees, makes any warranty, express
`or implied, or assumes any legal liability or responsibility for the accuracy,
`completeness, or usefulness of any information, apparatus, product, or process
`disclosed, or represents that its use would not infringe privately owned rights.
`Reference herein to any specific commercial product, process, or service by trade
`name, trademark, manufacturer, or otherwise, does not necessarily constitute or
`imply its endorsement, recommendation, or favoring by the United States
`Government or the University of California. The views and opinions of authors
`expressed herein do not necessarily state or reflect those of the United States
`Government or the University of California, and shall not be used for advertising
`or product endorsement purposes.
`
`Google Ex. 1314, pg. 2
`
`

`

`Firewall Products Today
`
`Stephen P. Cooper
`Computer Security Technology Center
`Lawrence Livermore National Laboratory1
`Email: spcooper@llnl.gov
`
`Abstract
`
`With an increased interest in connecting to the Internet, there is a
`corresponding interest in protecting an organization's network from others
`on the Internet. Internet firewalls help protect an organization's network,
`and the increased demand for firewalls have brought about a number of
`freeware and commercial products. But how does someone determine the
`best product or service for their organization?
`
`This paper discusses things that need to be considered in deciding to build
`or purchase a firewall system. It discusses many of the products, features,
`and services that are commercially available2 and what components they
`include such as software, hardware, consulting, or a combination thereof.
`This paper is not an attempt to evaluate the products. The aim is to provide
`an awareness of what is currently available and their capabilities. An
`appendix gives contact information for all of the vendors whose product
`information was used in developing this paper.
`
`Introduction
`
`As more computers and larger networks get attached to the Internet, it gets
`more difficult to protect an organization's information and resources from
`others on the Internet. An increasingly popular method of connecting to
`the Internet is through firewalls. A well constructed firewall can be quite
`effective in protecting an organization's information and resources, while
`still providing access to many of the services available on the Internet.
`
`A firewall is a combination of hardware and software components that
`provide a single point-of-control between a "trusted" network, such as an
`organizational network, and an "untrusted" network such as the Internet
`(see Figure 1). The firewall provides a certain level of control as to what
`occurs between the two networks. There are several ways to make your
`own firewalls, and there are a number of people and companies providing
`firewall consulting. Additionally, there have been a number of commercial
`firewall products being announced or released.
`
`1 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National
`laboratory under contract No. W-7405-Eng-48.
`
`2 Reference to any specific commercial product, process, or service by trade name, trademark, manufacturer, or
`otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by U.S.
`Department of Energy or the University of California.
`
`Firewall Products Today
`
`Page 1
`
`Cooper
`
`Google Ex. 1314, pg. 3
`
`

`

`Firewalls are not only for connecting to the Internet. They can be used
`between almost any two networks with different security policies. The
`firewall serves as a gateway between the networks and helps protect the
`networks from each other. For example, a network with sensitive research
`and development information or personnel information can be protected
`from the rest of an organization while still providing electronic mail
`exchange throughout the organization.
`
`Untrusted
` Network
`
`Firewall
`
` Trusted
`Network
`
`Figure 1: A firewall helps controls the network traffic
`between networks with different security policies/needs.
`
`For a firewall to function, it must be able to make decisions on all of the
`data that passes through it. It passes the data that the policy says may pass
`and blocks the data that shouldn't. The actual implementation is much
`more difficult, because network applications are frequently designed for
`functionality, not security.
`
`Firewall Overview
`
`Security Policy
`
`A firewall is a tool for enforcing security policy. Cheswick and Bellovin
`[CHES94] state that "a security policy determines the limits of acceptable
`behavior, and what the response to violations should be." The firewall
`helps enforce the limits established by the security policy as it relates to
`network activity that passes through the firewall.
`
`Of course, a firewall can only be effective on the network traffic that
`passes through it. If there are other paths into your network, such as via
`modem pools, they must also fall into the bounds set by the security
`policy.
`
`A firewall is an effective means for protecting a network. However,
`current firewall technology can only reduce, not eliminate, the threat to
`your information and resources. Firewalls, like the systems they protect,
`are built from complex combinations of software and hardware. They also
`require some level of system configuration and administration. Bugs in the
`software or mistakes in administration can open security holes through the
`firewall and leave a network vulnerable to attack. Additionally, users,
`intentionally or unintentionally, may open up security holes. For example,
`
`Firewall Products Today
`
`Page 2
`
`Cooper
`
`Google Ex. 1314, pg. 4
`
`

`

`a user may hook up a modem on the inside of the firewall, thus creating
`the possibility of bypassing the firewall.
`
`Whenever we discuss firewalls, we want to stress that user education and
`host-based security are important elements in enforcing security policy. As
`demonstrated in Figure 2, the firewall serves as the first line of defense.
`With the additions of good host security and user education, we can vastly
`reduce the threat to our information and resources.
`
`Firewall
`
`Host
`
`User
`
`Threat
`
`Information
` and
`Resources
`
`Figure 2: The firewall works together with host security and
`user education to reduce the threat to information and resources.
`
`We have been looking at firewalls for the protection of inside information
`and resources. Firewalls are also useful for controlling the access to
`external services and networks. For example, some organizations limit
`who may send mail or transfer files outside of an organization.
`
`Firewall Components
`
`A firewall system consists of a number of hardware and software
`components. What components are included may vary depending on who
`is building or supplying the firewall. A router is used to connect two
`networks together. Its primary purpose is to limit the traffic crossing a
`network boundary to that whose destination is across the boundary.
`Screening routers, also known as packet filtering routers, have more
`control over the traffic that passes through them. By defining a screening
`table or access control list (ACL), packets can be dropped based on the
`protocol type, source or destination address or port, direction of
`connection, etc.
`
`For some sites and policies, a screening router is sufficient for firewall
`protection. However, there are limitations that quickly make the screening
`router insufficient for certain sites. One of the limitations is the difficulty
`of getting the screening tables correct on some routers. A mistake here can
`leave your network wide open.
`
`The application gateway, also called a Bastion Host, offers a higher level
`of control. The application gateway is a host machine that runs programs
`that forward and filter connections for services such as TELNET and FTP.
`The application gateway usually serves as the host that is logically
`exposed to the less trusted network. The firewall is set up so that
`application protocols cannot get to an inside host unless they pass through
`the appropriate application proxy on the gateway. Furthermore, the
`protocol cannot get through unless the proxy exists to pass it through. The
`
`Firewall Products Today
`
`Page 3
`
`Cooper
`
`Google Ex. 1314, pg. 5
`
`

`

`proxy may perform secure authentication during a connection
`establishment or perform extra logging. The purpose of secure
`authentication is to avoid sending reusable passwords over the network
`where they can be snooped. There are several forms of secure
`authentication systems available. Some require each user to have a special
`card which may cost as much as $50.00 each or more. There is free
`software, such as S/Key from Bellcore, which uses a challenge/response
`mechanism. A firewall may support one or more secure authentication
`systems.
`
`Firewall Configurations
`
`The firewall components are combined into a number of possible
`configurations (see Figure 3). As mentioned earlier, the screening router is
`suitable for some small sites but is often missing features such as logging
`and secure authentication.
`
`Application
`Gateway
`
`Router
`
`Application
`Gateway
`
`Dual-homed Gateway
`
`Screened Host Gateway
`
`Router
`
`Application
`Gateway(s)
`
`Router
`
`Screened Subnet Gateway
`
`Figure 3: Firewall systems come in
`several configurations
`
`The dual-homed gateway is an application gateway with two network
`interfaces and IP forwarding disabled. All traffic must pass through some
`kind of proxy or filter implemented in software on the gateway. This
`system is relatively simple to build and requires a minimum of hardware.
`Because of that, it is a popular configuration for commercial vendors of
`firewall software or systems.
`
`The screened host gateway combines a packet filtering router with an
`application gateway. The application gateway may be on the inside or on
`the outside of the router. If on the inside, the router only permits traffic to
`that host from the outside. If on the outside, the router only permits certain
`traffic from that host. The router may pass through traffic for applications
`that are considered trustworthy. The problem with this configuration is
`that it shares some of the disadvantages of using a screening router as the
`firewall, such as the difficulty in managing it and properly setting up its
`tables. The Checkpoint Firewall-1 offers an option that integrates the
`management of Cisco routers into the firewall management.
`
`Firewall Products Today
`
`Page 4
`
`Cooper
`
`Google Ex. 1314, pg. 6
`
`

`

`The screened subnet gateway uses a second screening router to create a
`small isolated network between the trusted network and the untrusted one.
`The routers direct traffic such that the application gateway(s) on the
`screened subnet are the only ones accessible from either side of the
`network. This offers the ability to have multiple application gateways on
`the screened subnet. On large networks, this could be useful for dividing
`the proxy work such as using FTP on one, mail on another, etc. It also
`offers the capability to hide network addresses on one side of the firewall
`from the other side. This makes probing more difficult. On the down side,
`it further adds to the difficulty of administration.
`
`Other configurations are possible. Also, application gateway and screening
`router features offered by the respective vendors are moving closer. Some
`dual-homed gateway firewalls include packet filtering features. Some
`router vendors are adding better logging and secure authentication features
`to their screening routers.
`
`The Firewall Lifecycle
`
`The firewall lifecycle includes preparation, specification and procurement,
`installation, maintenance, and, if you are properly paranoid, a lot of
`second-guessing and re-evaluation.
`
`Preparation
`
`When do you prepare for a firewall installation? You start when you plan
`to connect two networks with different security policies and needs. Or, if
`you already have two such networks connected together, you realize that
`there may be threats to the information and resources on one of the
`networks from the other. In other words, the roots of your information
`security requirements are in your business plan and based on a realistic
`risk assessment.
`
`Training is another important part of preparation. Even if you go with
`commercial information security products and services, information
`security is an integral part of your business and not something you can
`completely turn over to a third party. You need to have some knowlege of
`the issues so that you can effectively work with the vendor and monitor
`the vendor's performance. There are books and seminars available on
`firewalls and information security, as well as information available via the
`World Wide Web. Many vendors also offer training.
`
`The primary output of this phase is the security policy. It is important to
`remember that the security policy should determine the firewall
`requirements. The firewall is to help support the policy, not impose one.
`
`Specification and Procurement
`
`In this phase the security policy is mapped to the firewall requirements
`and configuration and a selection is made for the hardware and software to
`satisfy the requirements. Specification and procurement are put together
`because it is a tightly coupled cyclical process where you may need to
`update the specification for what is available. For example, some people
`
`Firewall Products Today
`
`Page 5
`
`Cooper
`
`Google Ex. 1314, pg. 7
`
`

`

`want their firewall to be a Windows NT box, but there are no currently
`available firewalls in that configuration.
`
`When specifying your firewall, you may want to consider what resources
`you have available. This includes personnel as well as hardware. You may
`have existing equipment that you want to use for your application gateway
`or screening routers. Your personnel may be familiar with a particular
`vendor's version of the UNIX operating system, upon which most
`application gateways are built.
`
`This is the phase where you want to decide whether to purchase
`commercial products or services or build you own. We will discuss those
`options later.
`
`Installation
`
`This will vary depending on your network and firewall configurations. The
`important things are that you want to test it as much as possible, to verify
`that blocked services are blocked and allowed services get through. If you
`are replacing a previously unsecured or less secure network connection,
`you may want to check the previously "exposed" hosts with a security tool
`such as the Security Profile Inspector (SPI).
`
`Maintenance
`
`The amount of maintenance a firewall requires depends on its
`configuration. The components, such as routers and application gateways,
`may require periodic system patches and updates. Most important are
`security patches that are put out by the system vendors. These are often
`referenced in CIAC bulletins. The bulletins should be monitored regularly
`for items that may pertain to your firewall.
`
`Another factor effecting firewall maintenance is the amount of auditing or
`logging requested. These logs have to be checked and purged. Some
`firewalls offer the option of sending the logs to another machine to be
`checked. The Internet Site Patrol includes a service where your logs are
`encrypted and sent offsite to their location for analysis and 24-hour
`incident response.
`
`Other maintenance items are the number and types of protocols you allow,
`the complexity and frequency of changes in your network, and the
`complexity of your configuration for dealing with the changes.
`
`Re-evaluation
`
`As we have already shown under maintenance, a firewall is not something
`you install and forget. New and sophisticated threats are always surfacing.
`CIAC Advisory F-08 (January 23, 1994) discussed an Internet address
`spoofing attack that was capable of penetrating some firewalls. CIAC
`Advisory F-11 (February 14, 1994) discussed a vulnerability with the
`NCSA WWW server software (httpd). You need to be aware of these new
`threats and be sure you are protected. If you are using a commercial
`product or service, is the vendor keeping up with the threats and
`modifying your firewall in response? As your business changes and
`evolves, is your security policy and therefore your firewall staying in line
`with the changes?
`
`Firewall Products Today
`
`Page 6
`
`Cooper
`
`Google Ex. 1314, pg. 8
`
`

`

`A good way to stay current in firewall information is to subscribe to and
`monitor the firewall mailing list. This contains a lot of discussion and pros
`and cons of different protocols, configurations, and products. However,
`the list is fairly busy and likely to get more so.
`
`Firewall Products
`
`Building Your Own
`
`There is free software available to help build a firewall. However, it is not
`trivial and it takes a certain amount of expertise in several areas, including
`computer network security, UNIX system administration, and
`programming.
`
`TIS Firewall Toolkit
`
`A popular, free software toolkit for building firewall systems is the
`Firewall Toolkit from Trusted Information Systems, Inc. (TIS). This kit
`provides the tools for building a firewall, most specifically an application
`gateway. It includes proxies for TELNET, FTP, and http. It also provides
`tools for incorporating strong user authentication and for securing SMTP-
`based mail. Frederick Avolio of TIS, in a posting to the Firewall Toolkit
`users' mailing list, sums the expertise needed as follows:
`
`The FWTK is meant for individuals who:
`- know C
`- know TCP/IP
`- know UNIX as a system manager
`- have built C software packages on UNIX systems
`
`One of the advantages of the Firewall Toolkit is that it comes in source
`form and has been ported to a number of different UNIX operating
`systems and versions.
`
`Socks
`
`Socks is a package used to build circuit relays. It replaces standard system
`calls so that their TCP/IP connections pass through the gateway machine.
`A disadvantage to this is that the network applications on the host
`machines have to be linked to the socks library in order to utilize the
`gateway.
`
`Screend
`
`This is a package that allows you to build a packet filter out of a UNIX
`system. It requires that you have the kernel source code.
`
`KarlBridge
`
`This is a package that allows you to build a filtering router out of a PC
`with two network interfaces such as two Ethernet cards.
`
`Firewall Products Today
`
`Page 7
`
`Cooper
`
`Google Ex. 1314, pg. 9
`
`

`

`Related Software
`
`There is other free software available for firewall use. These include
`proxies such as xforward for X11 and a http proxy from CERN. A popular
`free secure authentication package is S/Key from Bellcore. These can often
`be used as add-ons or replacements for Firewall Toolkit components.
`
`Commercial Services
`
`Internet providers
`
`One possible source for firewall functionality could be the Internet
`provider that supplies your connection to the Internet. They may be able to
`provide some filtering capabilities customized to your needs. In fact, as
`competition heats up among the Internet providers, and threats continue to
`be publicized, security may be a value-added service offered by many
`Internet providers.
`
`Consultants
`
`There are many security and network consultants and consulting
`organizations that will build a firewall for you. Some may use or
`recommend a commercial product while others may construct one for you
`from the previously mentioned free software. Many of the consultants may
`also help you analyze your overall security needs and help you define
`policy.
`
`Commercial Products
`
`With the rising popularity of the Internet, there have been a number of
`new commercial firewall products being produced or announced. Many of
`them attempt to make it easier to configure and maintain a firewall. One
`general goal is to approach a turn-key system. This goal is still far off due
`to a number of reasons. The first reason is that organizations have different
`security policies and needs. Their network configurations are different and
`contain a different mix of systems and protocols. This makes it very
`difficult to build a one size fits all firewall system. Here we'll look at some
`of the features provided by different firewall systems.
`
`Protocols
`
`Most firewall systems work with IP because it is the primary protocol used
`on the Internet. The filtering router capabilities handle IP, TCP, and UDP
`by source and destination addresses and source and destination ports. The
`application gateway capabilities do higher level application filtering for
`TELNET, FTP, and others. Some routers have filtering capabilities for
`other, usually Ethernet-based protocols. The KarlBridge, for example, has
`filtering capabilities for DECnet packets (address, Area, Object number,
`and Object name), AppleTalk Phase 1 & 2 NBP packets (file server name,
`printer name, and/or Zone name), and Novell SAP packets (Network
`number, Server name, and Service).
`
`Firewall Products Today
`
`Page 8
`
`Cooper
`
`Google Ex. 1314, pg. 10
`
`

`

`Hardware and Operating Systems
`
`All of the firewall vendors supply firewall software. They vary as to
`whether or not they include the hardware and/or operating system.
`Firewall-1 is a software product for Sun platforms. JANUS includes
`software and a hardened UNIX operating system targeted for a 486/33
`(minimum) platform with two network interfaces. The hardware is not
`included.
`
`Some firewall systems are commercializations of the TIS Firewall Toolkit.
`TIS, itself, has produced Gauntlet, a commercial version of its toolkit.
`Gauntlet includes a security modified version of BSDI UNIX and the
`hardware. BSDI UNIX is a popular operating system for commercial
`firewalls because it is a robust, well supported system and the sources are
`relatively inexpensive. The sources are modified by the vendor to make
`the system more secure.
`
`One thing to remember when considering firewall systems is that, as a
`choke point between networks, a firewall may also be a single point-of-
`failure if a hardware or software component fails. The cost, availability,
`and speed of repair may be an important consideration.
`
`Management
`
`Other features include better management interfaces. Firewall-1 provides
`an X-Windows based user interface for its management functions. It also
`provides the capabilities to generate router command lists for downloading
`to some makes of packet filtering routers. The use of an X-Windows user
`interface has raised concerns among some security professionals due to the
`increased complexity and security problems with the X-Windows system.
`
`User Authentication
`
`Firewalls that provide some inbound access, such as an employee
`telecommuting via TELNET from home, incorporate some type of secure
`authentication in their system. This prevents the use of reusable passwords
`across an unsecured network. There are several different authentication
`systems available. Firewall products may support one or more of the
`systems, so this is a consideration when selecting a firewall product.
`
`Encryption
`
`Some organizations need to communicate securely and privately over an
`untrusted network such as the Internet. There are some router products
`available where a secure, encrypted channel is established with a similar
`router. LanGuardian examines outgoing packets and encrypts them if they
`are destined to certain addresses where another LanGuardian decrypts the
`message. Packets destined to public places are not encrypted. Network
`Systems' Data Privacy Facility takes this further, by encrypting packets
`based on source and destination address and port, security label, protocol
`type, and packet length. With it, multiple sleeves may be established
`between sites with more control over the packet flow.
`
`Firewall Products Today
`
`Page 9
`
`Cooper
`
`Google Ex. 1314, pg. 11
`
`

`

`Firewall Validation
`
`A critical part of building or purchasing a firewall is verifying that it
`works and is secure. There are two parts to this. First the hardware,
`software, and operating system components have to be capable of being
`secure if properly configured. Secondly, once installed and configured, the
`firewall has to be secure and support the security policy.
`
`How can a firewall vendor provide assurance that the components they are
`providing are secure? The philosophy behind TIS's Firewall Toolkit is that
`the source is available and is small enough for inspection. They have
`continued this philosophy with their commercial firewall system, Gauntlet.
`Secure Computing (SCC) has taken a different approach for its announced,
`but not yet released Sidewinder product. They have broadcast a challenge
`on the Internet where there are prizes for those who can break into their
`firewall.
`
`An installed firewall is much more difficult to validate. That is because the
`interaction of components adds much more complexity. A proxy may be
`very secure, but it is useless if a router is configured to bypass the
`application gateway for the application protocol. In the case of testing by
`the vendor, that test configuration and environment probably differs from
`the one at the customer's site. One possibility for installed firewall testing
`is through white hat vulnerability services. This is where you arrange for a
`trusted party to attempt to break into your network and provide you with
`their results. There are some security consultants who can provide this
`service. White hat testing is also available from the Computer Security
`Technology Center through CIAC or the Secure Systems Services project.
`
`Services
`
`Firewall vendors often provide related services, either as part of their
`product or as additional consulting. This includes help in evaluating
`security needs and in developing security policy. It also includes training
`in information security and in the use and maintenance of their products.
`
`As mentioned earlier, the Internet Site Patrol offers a unique firewall
`monitoring service. With this service, the firewall encrypts and sends
`logging information to their site for 24-hour analysis and incident
`response.
`
`Some firewall products are actually services in which the vendor builds a
`firewall system for you. Digital Equipment Corporation's SEAL
`(Screening External Access Link) is such a service.
`
`Conclusion
`
`There are many things to think about when building or purchasing a
`firewall system. The rate of growth of the Internet and the security service
`and product industry mainly serves to add to the confusion. There are
`many good products out there. You just have to pick the product or service
`that best fits your requirements and budget.
`
`Firewall Products Today
`
`Page 10
`
`Cooper
`
`Google Ex. 1314, pg. 12
`
`

`

`References and Resources
`
`Here are some resources used for this paper and useful for getting started
`on firewalls. The firewall mailing list is a good source for up-to-date
`information and discussion on firewall related security issues. There is
`also some discussion and critique of commercial products. Some of the
`commercial vendors maintain their own mailing lists.
`
`The Computer Security Technology Center and the Computer Incident
`Advisory Capability will continue to monitor the technology and products
`for information security. In addition, the Secure Systems Services project
`can provide consultation for information security needs. For more
`information, see the CIAC home page at http://ciac.llnl.gov.
`
`[CHES94] Cheswick, William R. and Steven M. Bellovin. Firewalls and
`Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.
`Firewalls and Internet Security has become the de facto reference book for
`firewalls and contains much useful information and an extensive
`bibliography.
`
`[WACK94] Wack, John P. and Lisa J. Carnahan. Keeping Your Site
`Comfortably Secure: An Introduction to Internet Firewalls. National
`Institute of Standards and Technology, Draft 1994.
`
`Firewalls Mailing List. E-mail subscription requests to firewalls-
`request@greatcircle.com with "subscribe firewalls" as the message body.
`
`Catherine Fulmer maintains a WWW page of commercial vendors at
`http://www.digimark.net/bdboyle/fulmer/firewall.vendor.html.
`
`Firewall Products Today
`
`Page 11
`
`Cooper
`
`Google Ex. 1314, pg. 13
`
`

`

`Appendix A: Firewall Products and Vendors
`
`Information regarding the following products was used to develop this
`paper. Due to the fact that some products are available through multiple
`vendors, the list is organized alphabetically by product name. Due to the
`rapid expansion in the firewall industry, the information presented here is
`sure to be obsolete as soon as it is written.
`
`Black Hole
`Company: Milkyway Networks Corporation
`WWW: http://www.milkyway.com/
`Contact: Send electronic mail to info@milkyway.com or call (Canada)
`613-566-4574.
`Comments:
`
`Cyberguard
`Company: Harris Computer Systems
`WWW:
`Contact: Send electronic mail to nhnews@csd.harris.com or call 305-974-
`1700 Ext. 5144 for Sales or Ext. 5124 for Marketing.
`Comments: Custom software, hardware, and operating system. The
`operating system and hardware are "NCSC B1-level evaluated and ITSEC
`FB1 E3 secure."
`
`Data Privacy Facility
`Company: Network Systems Corp.
`WWW: http://www.network.com
`Contact: Phone 612-424-1488.
`Comments: Packet-based encrypting router.
`
`Eagle Network Security Management System
`Company: Raptor Systems
`WWW: http://www.delmarva.com/raptor/raptor.html
`Contact: Call 617-487-7700.
`Comments: Software package that runs on an IBM, Hewlett-Packard, or
`Sun Microsystem workstation.
`
`Firewall-1
`Company: Checkpoint Software
`WWW: http://WWW.CheckPoint.com
`Contact: Send electronic mail to sales @CheckPoint.com. Also available
`through multiple distributers.
`Comments: Software that runs on Sun workstations. Provides packet
`filtering as well as application gateway capabilities.
`
`Firewall Products Today
`
`Page 12
`
`Cooper
`
`Google Ex. 1314, pg. 14
`
`

`

`Gauntlet
`Company: Trusted Information Systems, Inc. (TIS)
`WWW: http://www.tis.com/
`Contact: Send electronic mail to etsec@tis.com, call 301-854-6889, or fax
`301-854-5363.
`Comments: TIS provides the free Internet Firewall Toolkit. Gaunlet is
`based on the toolkit and is built on a UNIX operating system modified to
`increase security.
`
`InterLockSM Security Services
`Company: Advanced Network & Services, Inc.
`WWW:
`Contact: Send electronic mail to info@ans.net or call 800-456-8267
`Comments: Annual service including hardware, software, initial
`configuration, and maintenance. Runs on an IBM RS/6000 320 running
`modified AIX 3.1.5
`
`IRX Router
`Company: Livingston Enterprises
`WWW:
`Contact: Phone 800-458-9966 or e-mail info@livingston.com
`Comments: Packet filtering router with logging and some application
`gateway features.
`
`JANUS™ (JANOS, BorderWare) Firewall Server
`Company: Border Network Technologies
`WWW: http:///www.border.com
`Contact: Multiple resellers available. Contact Border Network
`Technologies (Canada) at 416-368-7157, or sales@border.com.
`Comments: Software and operating system with GUI administration
`interface. Operating system is a hardened UNIX system for Intel 486/33
`(minimum) platform with two network interfaces. Harware not included.
`
`KarlBridge
`Company: Karlnet Inc. (US) or Sherwood Data Systems Ltd. (UK).
`WWW: http://www.gbnet.net/kbridge/
`Contact: In U.S. phone KarlNet Inc. at 614-263-KARL or e-mail
`sales@KarlNet.com. In U.K. phone Sherwood Data Systems Ltd. at 44-
`(0)1494-464264 or e-mail sales@gbnet.com.
`Comments: Software that runs on a 286/386/486 clone to build a multi-
`protocol filtering router. Also available with hardware. Shareware demo
`versions are available via anonymous FTP.
`
`NetGate
`Company: SmallWorks of Travis Co.
`WWW:
`Contact: Phone/fax to 512-338-0619 or e-mail info@smallworks.com
`Comments: Software for Sun SPARC systems running SunOS 4.1.X.
`Provides packet filtering, logging, and forwarding. Available in both
`binary and source distributions.
`
`Firewall Products Today
`
`Page 13
`
`Cooper
`
`Google Ex. 1314, pg. 15
`
`

`

`NetSP
`
`Company: IBM
`WWW:
`Contact: Phone 919-254-7416 or 919-254-6898, fax 919-254-4239, or e-
`mail sbaumann @ vnet.ibm.com
`Comments: Firewall software for IBM Risc System/6000 computers with
`AIX 3.2.5.
`
`PORTUS
`Company: Livermore Software Labs
`WWW:
`Contact: Phone 800-240-5754 or e-mail portusinfo@gw.lsli.com
`Co

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket