Network configuration in a box: towards end-to-end verification of network reachability and security

Ehab Al-Shaer, Will Marrero, Adel El-Atawy, Khalid ElBadawi
2009 2009 17th IEEE International Conference on Network Protocols  
Recent studies show that configurations of network access control is one of the most complex and error prone network management tasks. For this reason, network misconfiguration becomes the main source for network unreachablility and vulnerability problems. In this paper, we present a novel approach that models the global end-to-end behavior of access control configurations of the entire network including routers, IPSec, firewalls, and NAT for unicast and multicast packets. Our model represents
more » ... he network as a state machine where the packet header and location determines the state. The transitions in this model are determined by packet header information, packet location, and policy semantics for the devices being modeled. We encode the semantics of access control policies with Boolean functions using binary decision diagrams (BDDs). We then use computation tree logic (CTL) and symbolic model checking to investigate all future and past states of this packet in the network and verify network reachability and security requirements. Thus, our contributions in this work is the global encoding for network configurations that allows for general reachability and security property-based verification using CTL model checking. We have implemented our approach in a tool called ConfigChecker. While evaluating ConfigChecker, we modeled and verified network configurations with thousands of devices and millions of configuration rules, thus demonstrating the scalability of this approach. 978-1-4244-4634-6/09/$25.00 ©2009 IEEE Levels
doi:10.1109/icnp.2009.5339690 dblp:conf/icnp/Al-ShaerMEE09 fatcat:caummbbekrfpdasdlvfw7p4bdq