A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Network configuration in a box: towards end-to-end verification of network reachability and security
2009
2009 17th IEEE International Conference on Network Protocols
Recent studies show that configurations of network access control is one of the most complex and error prone network management tasks. For this reason, network misconfiguration becomes the main source for network unreachablility and vulnerability problems. In this paper, we present a novel approach that models the global end-to-end behavior of access control configurations of the entire network including routers, IPSec, firewalls, and NAT for unicast and multicast packets. Our model represents
doi:10.1109/icnp.2009.5339690
dblp:conf/icnp/Al-ShaerMEE09
fatcat:caummbbekrfpdasdlvfw7p4bdq