18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1-10 Introduction<br />

Additional <strong>Sidewinder</strong> <strong>G2</strong> operating characteristics<br />

Figure 1-5. Logical<br />

network protocol stacks<br />

provide network<br />

separation<br />

One <strong>of</strong> the unique aspects <strong>of</strong> the SecureOS is the use <strong>of</strong> multiple<br />

logical network stacks to strengthen the enforcement <strong>of</strong> the inter-burb<br />

aspects <strong>of</strong> the system security policy. A network stack consists <strong>of</strong><br />

different layers <strong>of</strong> s<strong>of</strong>tware responsible for different aspects <strong>of</strong> the<br />

communications. For example, one layer checks a message’s routing<br />

information to ensure that it is transmitted to the correct network.<br />

Normal computing systems, and firewalls that operate on an<br />

unsecured OS, have only one network stack.<br />

The SecureOS includes modifications that provide stronger separation<br />

<strong>of</strong> communication between different burbs. There are checks at all<br />

layers <strong>of</strong> the s<strong>of</strong>tware to ensure that the network stack data from one<br />

burb is not mixed with, or impacted by, data associated with another<br />

burb. This logical separation <strong>of</strong> the network stacks by the security<br />

burb is augmented by the Type Enforcement security policy, which is<br />

integral to SecureOS. It controls all operational aspects <strong>of</strong> the system,<br />

including enforcement <strong>of</strong> the separation data processing by the<br />

security burb. This ensures that information passes from one burb to<br />

another only if the network security policy says the specific<br />

information flow is allowed.<br />

Figure 1-5 shows this logical network separation and the processing<br />

elements involved in the transfer <strong>of</strong> data between the network stacks<br />

associated with each burb. Before a process can interact with a<br />

network stack, the Type Enforcement security policy must indicate<br />

that the process is allowed to interact with that burb’s network stack.<br />

trusted<br />

network<br />

<strong>Sidewinder</strong> <strong>G2</strong><br />

logical network<br />

protocol stacks<br />

Internet

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!