Security device implementing network flow prediction

ABSTRACT

A security device for processing network flows is described, including: one or more packet processors configured to receive incoming data packets associated with network flows where a packet processor is assigned as an owner of network flows and each packet processor processes data packets associated with flows for which it is the assigned owner; and a packet processing manager configured to assign ownership of network flows to the packet processors where the packet processing manager includes a global flow table containing global flow table entries mapping network flows to packet processor ownership assignments and a predict flow table containing predict flow entries mapping predicted network flows to packet processor ownership assignments. A predict flow entry includes a predict key and associated packet processor ownership assignment. The predict key includes multiple data fields identifying a predicted network flow where one or more of the data fields have a wildcard value.

CROSS REFERENCE TO OTHER APPLICATIONS

This application is a continuation of co-pending U.S. patent applicationSer. No. 13/840,691, entitled SECURITY DEVICE IMPLEMENTING NETWORK FLOWPREDICTION, filed Mar. 15, 2013, which is incorporated herein byreference for all purposes, which claims priority to U.S. ProvisionalPatent Application No. 61/758,647, entitled SECURITY DEVICE IMPLEMENTINGNETWORK FLOW PREDICTION, filed Jan. 30, 2013, which is incorporatedherein by reference for all purposes.

BACKGROUND OF THE INVENTION

Devices such as firewalls are sometimes used to prevent users fromaccessing resources to which they are not authorized. As an example,members of the public may be entitled to access content served by a webserver, but not authorized to access other services available on theserver such as administrative tools. In another example, employees of acompany may be entitled to access certain websites or certain classes ofwebsites while other websites or other classes of websites may beprohibited for all employees. Firewalls and other security devicestypically enforce policies against network transmissions based on a setof rules.

Traditional security devices are implemented as a monolithic deviceprovided with multiple processors for handling the incoming datastreams. Such security devices often implement a centralized controlscheme where one processor is designated as the management processor.Incoming data packets are often broadcast to all processors in thesecurity device and the processors cooperate with each other, throughsoftware messaging, to determine which processor should take ownershipof handling incoming data packets belonging to one or more flows.However, the centralized control scheme is not scalable to handle anincreased number of data packets.

Furthermore, in a security device implemented as a distributed system,management of flow assignment needs to take into consideration differenttypes of data traffic, including data traffic that may belong to relateddata connections, to ensure effective security policy enforcement acrossthe many independent computing resources that handle the data traffic.

Finally, to implement complex security policies, a firewall needs tokeep track of many independent and random events and correlate theevents for policy enforcement. Firewalls or other security devicestypically maintain event statistics using counters which are updatedrapidly to effectively examine network traffic as the traffic is beingcommunicated. Maintaining event statistics becomes challenging when thesecurity device is implemented as a distributed system where events haveto be detected and tracked across many independent computing resources.One method to maintain event statistics in a distributed computingenvironment is to rely on software to send messages between all thecomputing resources and try to keep synchronized copies of the eventdata. Such a software solution has undesirable performance and does notscale well.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the invention are disclosed in the followingdetailed description and the accompanying drawings.

FIG. 1 illustrates an embodiment of an environment in which securitypolicies are enforced.

FIG. 2 is a schematic diagram of a security device in embodiments of thepresent invention.

FIG. 3 is a schematic diagram of a packet processing card in embodimentsof the present invention.

FIG. 4 illustrates a flow identifier according to one embodiment of thepresent invention.

FIG. 5 is a schematic diagram of a packet processing manager inembodiments of the present invention.

FIG. 6 is a flow chart illustrating a flow ownership assignment methodaccording to one embodiment of the present invention.

FIG. 7, which includes FIG. 7A, is a flow chart illustrating a flowownership assignment method according to an alternate embodiment of thepresent invention.

FIG. 8 is a flow chart illustrating a session teardown method accordingto one embodiment of the present invention.

FIG. 9 illustrates a predict flow table in embodiments of the presentinvention.

FIG. 10 is a flow chart illustrating a predict flow method according toone embodiment of the present invention.

FIG. 11 illustrates a configuration of the global event counters 300 inembodiments of the present invention.

FIG. 12 illustrates an example event counter message that may be sent bya packet processor to the packet processing manager.

FIG. 13 is a schematic diagram of a packet processing card in analternate embodiment of the present invention.

DETAILED DESCRIPTION

The invention can be implemented in numerous ways, including as aprocess; an apparatus; a system; a composition of matter; a computerprogram product embodied on a computer readable storage medium; and/or aprocessor, such as a processor configured to execute instructions storedon and/or provided by a memory coupled to the processor. In thisspecification, these implementations, or any other form that theinvention may take, may be referred to as techniques. In general, theorder of the steps of disclosed processes may be altered within thescope of the invention. Unless stated otherwise, a component such as aprocessor or a memory described as being configured to perform a taskmay be implemented as a general component that is temporarily configuredto perform the task at a given time or a specific component that ismanufactured to perform the task. As used herein, the term ‘processor’refers to one or more devices, circuits, and/or processing coresconfigured to process data, such as computer program instructions.

A detailed description of one or more embodiments of the invention isprovided below along with accompanying figures that illustrate theprinciples of the invention. The invention is described in connectionwith such embodiments, but the invention is not limited to anyembodiment. The scope of the invention is limited only by the claims andthe invention encompasses numerous alternatives, modifications andequivalents. Numerous specific details are set forth in the followingdescription in order to provide a thorough understanding of theinvention. These details are provided for the purpose of example and theinvention may be practiced according to the claims without some or allof these specific details. For the purpose of clarity, technicalmaterial that is known in the technical fields related to the inventionhas not been described in detail so that the invention is notunnecessarily obscured.

FIG. 1 illustrates an embodiment of an environment in which securitypolicies are enforced. In the example shown, clients 104 and 106 are alaptop computer and desktop computer, respectively, present in anenterprise network 108. Security device 102 (also referred to herein as“device 102”) is configured to enforce policies regarding communicationsbetween clients, such as clients 104 and 106, and nodes outside ofenterprise network 108 (e.g., reachable via external network 110). Oneexample of a policy is a rule prohibiting any access to site 112 (apornographic website) by any client inside network 108. Another exampleof a policy is a rule prohibiting access to social networking site 114by clients between the hours of 9 am and 6 pm. Yet another example of apolicy is a rule allowing access to streaming video website 116, subjectto a bandwidth or another consumption constraint. Other types ofpolicies can also be enforced, such as ones governing traffic shaping,quality of service, or routing with respect to URL information. In someembodiments, security device 102 is also configured to enforce policieswith respect to traffic that stays within enterprise network 108.

In some embodiments, the security device 102 includes a securityappliance, a security gateway, a security server, a firewall, and/orsome other security device, which, for example, can be implemented usingcomputing hardware, software, or various combinations thereof. Thefunctionality provided by security device 102 can be implemented in avariety of ways. Specifically, security device 102 can be a dedicateddevice or set of devices. The functionality provided by device 102 canalso be integrated into or executed as software on a general purposecomputer, a computer server, a gateway, and/or a network/routing device.Further, whenever device 102 is described as performing a task, a singlecomponent, a subset of components, or all components of device 102 maycooperate to perform the task. Similarly, whenever a component of device102 is described as performing a task, a subcomponent may perform thetask and/or the component may perform the task in conjunction with othercomponents. In various embodiments, portions of device 102 are providedby one or more third parties. Depending on factors such as the amount ofcomputing resources available to device 102, various logical componentsand/or features of device 102 may be omitted and the techniquesdescribed herein adapted accordingly. Similarly, additional logicalcomponents/features can be added to system 102 as applicable.

FIG. 2 is a schematic diagram of a security device in embodiments of thepresent invention. In the example shown, the functionality of securitydevice 102 is implemented in a firewall. Referring to FIG. 2, securitydevice 102 is implemented as a distributed system including multipleindependent computing resources. More specifically, security device 102includes multiple packet processing cards 160 connected to a switchingfabric 180. In the example shown, packet processing card 0 to card 2 areshown. Each packet processing card 160 is configured in a similar mannerand includes data ports 162 for connecting to communication lines ordata lines in a network, a flow engine (FE) 164 for identifying networkflows associated with the received data packets, a local flow table(LFT) 166, in communication with the flow engine, for storing flowownership assignment information, and one or more packet processors 168for processing data packets. In the example shown, each packetprocessing card 160 includes two packet processors PPO and PP1. Eachpacket processor in a packet processing card processes data packets thatare assigned to it. In some embodiments, the packet processor 168 may beimplemented as a high performance multi-core CPU.

In some embodiments, security device 102 may also include one or moreprocessing resource cards 170 providing additional processing resources.In the example shown, security device 102 includes a single processingresource card 0 having multiple packet processors 172 formed thereon.More specifically, processing resource card 170 includes packetprocessors PPO to PP5. Each packet processor in a processing resourcecard processes data packets that are assigned to it. Packet processors172 may be implemented using the same processor device as packetprocessors 168. Processing resource cards 170 is optional and may beomitted in embodiments of the present invention.

In some embodiments, packet processing cards 160 and processing resourcecards 170 are implemented as line cards in communication with abackplane. A line card or digital line card is a modular electroniccircuit on a printed circuit board that interfaces with a communicationsbackplane. Switching fabric 180 may be an integrated circuit formed on aline card, such as a management processing card (not shown), incommunication with the backplane. Security device 102 may include othercomponents not shown in FIG. 2 to implement other functionalities of thesecurity device, such as maintaining event statistics and policyenforcement.

In security device 102, packet processing cards 160 and processingresource card 170 communicate with each other through the switchingfabric 180. More specifically, security device 102 may receive incomingdata packets on an input port of a packet processing card (e.g. Card 0)and forward outgoing data packets on an output port, after processingthe data packets for security enforcement, through the same packetprocessing card (Card 0) or through a different packet processing card(e.g., Card 1). The flow engine 164 in each packet processing card 160processes the received data packets to identify the flow associated withthe received data packets so as to apply the appropriate securitypolicy.

In the present description, a network flow or “a flow” refers to aTCP/IP flow which includes a sequence of data packets communicatinginformation between a source and a destination in one direction. A flowidentifier (or “Flow ID”) for a data packet is determined from at leastthe information in the header of the data packet. The flow identifier isa unique value used to identify a flow in the security device 102. Insome embodiments, the flow identifier is determined from the 5-tupleinformation of the data packet, including the source IP address,destination IP address, the source port number, the destination portnumber, and the protocol in use. In another embodiment, the flowidentifier is determined from the 6-tuple information of the data packetwhich, in addition to the 5-tuple information, includes the interfacebeing used. Furthermore, in the present description, two-way connectionsbetween a pair of network devices (e.g., client-server) are referred toas a session where a session is composed of two flows representing datatraffic in both directions—that is, the forward direction (client toserver) and the reverse direction (server to client).

Flow Ownership Assignment

As thus configured, security device 102 realizes a distributedprocessing system architecture where flow handling and packet processingare distributed to independent processing resources across the system.That is, processing of incoming data packets are distributed todifferent packet processors on the one or more packet processing cardsand one or more processing resource cards. In a distributed processingsystem, data packets belonging to the same flow or to the same sessionmay arrive at different packet processing cards. A packet processingcard, receiving an incoming data packet, needs to know which packetprocessor 168, among the many packet processors on the same or differentpacket processing cards in security device 102, has been assignedownership of the flow associated with the incoming data packet so as toforward the data packet to the owner packet processor for processing.Furthermore, in order to monitor and control data traffic effectively,information for both the forward and reverse flows of the same sessionshould be related to each other so that a signal packet processor caninspect data packets belonging to the same session to determine whetherthe data packets should be forwarded, policed, or any other action takenas defined by the security policy. Accordingly, a single packetprocessor should be assigned ownership of flows belonging to the samesession.

In embodiments of the present invention, security device 102incorporates a packet processing manager 150 to reliably and efficientlymanage flow and session ownership assignment and to provide globaltracking of flow ownership in the security device. The packet processingmanager centralizes flow ownership assignment in the security device andoperates to distribute ownership of flows across the packet processorsin the security device. More specifically, the packet processing managerimplements a flow ownership assignment method to assign ownership offlows to packet processors in the security device so that data packetsthat belong to the same flow are processed by the same packet processorand flows belonging to the same session are also processed by the samepacket processor. Furthermore, the packet processing manager maintainsglobal flow ownership assignment information so that each packetprocessing card in the security device can determine the owner packetprocessor for each received data packet and can forward received datapackets to the owner packet processor for processing.

Referring again to FIG. 2, security device 102 includes packetprocessing manager (PPM) 150 in communication with the switching fabric180 to implement global flow ownership assignment and to maintain globalflow ownership assignment information for all packet processing cardsand processing resource cards in the security device. Packet processingmanager 150 communicates with all of the packet processing cards 160 andthe processing resource cards 170 in security device 102 throughswitching fabric 180. Packet processing manager 150 includes a hardwarecomponent PPM-HW module 152 incorporating, among other things, a globalflow table 154, and a software component PPM-SW module 156 implementingownership assignment policies. In one embodiment, Packet processingmanager 150 is implemented as part of a management processing card (notshown) in the security device.

In embodiments of the present invention, packet processing manager 150operates as the centralized resource for determining the owner packetprocessor for a session. In one embodiment, when a packet processingcard 160 receives a data packet that is the first data packet of a newsession, the data packet will be forwarded to the packet processingmanager 150 to determine the packet processing card and the packetprocessor that should be the “owner” of the new session, responsible forprocessing data packets associated with the new session for policyenforcement. The packet processing manager 150 will assign the ownerpacket processor 168 and the owner packet processing card 160 and recordthe ownership assignment in the global flow table 154. The packetprocessing manager 150 will then forward the data packet to the assignedowner packet processor for further processing. On the other hand, when apacket processing card 160 receives a data packet that belongs to aknown flow with an assigned owner packet processor, the packetprocessing manager 150 will forward the data packet to the owner packetprocessor while also informing the packet processing card that receivedthe data packet the ownership assignment so that subsequent data packetsbelonging to the same flow can be forwarded autonomously from thereceiving packet processing card to the owner packet processing card,without intervention of the packet processing manager.

FIG. 3 is a schematic diagram of a packet processing card in embodimentsof the present invention. Referring to FIG. 3, a packet processing card160 includes data ports 162 for connecting to data lines in a network.The packet processing card 160 receives incoming data packets(Packet_In) and transmits outgoing data packets (Packet_Out) on the dataports. The packet processing card 160 further includes a traffic manager169 to communicate with the switching fabric 180. The packet processingcard 160 includes a flow engine (FE) 164 in communication with a localflow table (LFT) 166. Flow engine 164 performs packet parsing and flowidentification for received data packets and performs flow lookup in thelocal flow table 166. Local flow table 166 stores flow entriesidentifying the packet processor ownership assignment for one or moreflows associated with incoming data packets to the security device. Thepacket processing card 160 further includes one or more packetprocessors 168 for processing data packets assigned to the packetprocessors. In the example shown, each packet processing card 160includes two packet processors PP0 and PP1 . Finally, the packetprocessing card 160 includes a control processor 163 for controlling theoperation of the packet processing card.

In embodiments of the present invention, packet processing card 160 mayfurther include a flow-data flow table (not shown) storing flow recordscontaining flow data for processing data packets associated with a flow.More specifically, a flow-data flow table may include entries storingflow records where each flow record consists of a flow identifier andits associated flow data, often referred to as a “flow attribute.” Flowattributes may contain one or more rules or policy information which canbe used by packet processors of the security device 102 to furtherprocess the received data packets to perform network security functions.In some embodiments, such a flow-data flow table is distinguishable fromthe local flow table 166 which is configured primarily to storeownership assignment information and they may be implemented as separatedata tables. In other embodiments, the local flow table 166 is formed aspart of the flow-data flow table. The exact configuration of the localflow table is not critical to the practice of the present invention aslong as the local flow table 166 contains packet processor ownershipassignment information for identified flows.

In embodiments of the present invention, the owner packet processorassignment for a flow is encoded in the flow identifier (or “Flow ID”)using identification of the packet processing card and identification ofthe packet processor on the card. Returning to FIG. 2, in securitydevice 102, each packet processing card is identified by a slot number(slot#), such as slot#0 for packet processing card 0, slot#1 for packetprocessing card 1, and slot#2 for packet processing card 2. On eachpacket processing card, the packet processor is identified by aprocessor number, such as PP0 for packet processor 0 and PP1 for packetprocessor 1. The slot number and the packet processor number are used touniquely identify one of multiple packet processors in security device102.

FIG. 4 illustrates a flow identifier according to one embodiment of thepresent invention. Referring to FIG. 4, a flow identifier (FID) 185 is aglobally unique value that is used to identify a flow being transmittedthrough the security device. The flow identifier 185 encodes informationrequired to identify the owner packet processor. More specifically, theflow identifier 185 includes a data field for the slot number (slot#)and a data field for the packet processor number (PP#) and a field forstoring a flow key associated with a flow. The flow identifier 185 mayfurther include a data field (F/R) to identify the flow directionality(forward or reverse). In particular, the flow key uniquely identifieseach flow being processed or handled in security device 102. Inembodiments of the present invention, the flow key is generated from atleast the information in the header of the data packet. In someembodiments, the flow key is generated from the 5-tuple or 6-tupleinformation of the received data packets to uniquely associate receiveddata packets that belong to the same flow. As thus configured, the flowidentifier 185 identifies a flow (by the flow key) and the owner packetprocessor assigned to process that flow (by the slot number slot# andthe packet processor number PP#).

FIG. 5 is a schematic diagram of a packet processing manager inembodiments of the present invention. Referring to FIG. 5, a packetprocessing manager 150 includes a packet processing manager hardware(PPM-HW) module 152 in communication with a packet processing managersoftware (PPM-SW) module 156. In the present embodiment, the softwaremodule 156 refers to a processor with instructions being executedthereon. The packet processing manager's primary responsibility is toassign and distribute flow or session ownership throughout the securitydevice. In operation, all sessions that can be mapped as flows are sentto the packet processing manager for packet processor assignment.Subsequent packets that arrive in the security device for that flow canuse the packet processing manager to learn which packet processor tosend the packet for processing.

Within the packet processing manager 150, the packet processing managerhardware module 152 operates to maintain the global flow table 154containing ownership assignment information mapping flows beingprocessed in the security device to packet processors on the packetprocessing cards. The primary function of the packet processing managersoftware module 156 is to implement the owner assignment policy used toselect an owner packet processor (PP) for a new session. Based on theowner assignment policy, the software module 156 may select an ownerpacket processor based on load balancing, or may select an ownerrandomly, or may select the packet processor in the ingress card, orother factors. A salient feature of the packet processing managerhardware module 152 is that the hardware module offloads a majority ofthe flow management message processing from the software module so thatowner packet processor assignment can achieve a high speed of operation.

The packet processing manager hardware module 152 includes a networkinterface 192 for communicating with the PPM-SW module 156. Inparticular, the network interface 192 connects to a processor on whichthe packet processing manager software module 156 is run. The PPM-HWmodule 152 further includes a traffic manager interface (TMI) 194connecting the hardware module to the switching fabric 180. The corefunction of the PPM-HW module 152 is to maintain the global flow table(GFT) 154. To that end, the PPM-HW module 152 includes a flow lookupengine 196 for accessing the global flow table 154. Lastly, the PPM-HWmodule 152 includes a message processor 190 for processing incomingmessages from and generating outgoing messages for the PPM-SW module 156and the packet processing cards/processing resource cards through theswitching fabric. The message processor 190 generates requests to theflow lookup engine 196 and receives responses from the flow lookupengine.

In embodiments of the present invention, the packet processing managerhardware module 152 further includes a predict flow table 200 tofacilitate predict flow handling. Predict flow handling is used inpacket processing manager 150 to facilitate matching of connectionsessions that are related so that the same owner packet processor isassigned to handle flows associated with related sessions. The operationof the predict flow table will be described in more detail below. Inembodiments of the present invention, the packet processing managerhardware module 152 further includes a set of global event counters 300for keeping track of event statistics across all packet processors inthe device. The global event counters 300 is in communication with acounter memory 310. The packet processing manager 150 implements anevent counter aggregation method for maintaining global counter sums forevents across all packet processing cards in the distributed system. Theevent counter aggregation method will be described in more detail below.The predict flow table, the global event counters and the counter memoryare optional elements of the packet processing manager hardware moduleand may be omitted in other embodiments of the present invention.

The global flow table 154 in the PPM-HW module 152 maintains a mappingof all active flows in the security device. More specifically, theglobal flow table 154 stores a mapping of the flow identifier assignedto each flow which specifies the owner packet processor for that flow.An example of a flow identifier is shown in FIG. 4 and described above.In this example, the flow is identified by a flow key and the ownerpacket processor is identified by the slot number of the packetprocessing card on which it is located and the packet processor numberof the packet processors on that card. In some embodiments, the globalflow table 154 further stores an aware mask that keeps track of all thepacket processing cards in the security device that are aware of themapping. The awareness mask is used subsequently to delete the flow fromthe local flow table of the packet processing cards when the session istorn down.

In one embodiment, the global flow table is implemented as a hash tablewith fixed size buckets. In embodiments of the present invention, theglobal flow table includes GFT entries where each entry includes flowkey information, the flow identifier (Flow ID) and associated GFTattributes. The flow key information includes the 5-tuple information ofthe data packet, including the source IP address, destination IPaddress, the source port number, the destination port number, and theprotocol in use. In some cases, the flow key information may furtherinclude the packet type, the zone identifier, or the interface beingused. A flow key is generated by applying a hash function to the flowkey information. A flow identifier is formed using the flow key, being ahash value of the flow key information, and the ownership assignmentinformation for the flow, being the identification of the packetprocessing card and identification of the packet processor on the card.In some embodiments, GFT attributes include one or more of the followingfields: a “bound” field indicating whether the entry has been bound, a“timestamp” field recording when a flow entry has been updated, an eventcounter identifier, and an “aware mask” field. The aware mask keepstrack of all the packet processing cards in the security device thathave been made aware of this flow. In some embodiments, the GFTattributes include a predict field storing a predict flag value used toindicate whether the entry has matched a predict table entry when theentry is created. The use of the predict field in a predict flow methodof the present invention will be described in more detail below. Thepredict field is optional and may be omitted when predict flowprocessing is not used.

In operation, each GFT entry can be in one of the following states:invalid, tentative, and bound. A GFT entry that is invalid means thatthe entry can be used for a new entry allocation. A GFT entry istentative when the entry is created upon receipt of a data packetbelonging to a new flow, or a previously unknown flow. A GFT entry thatis tentative includes a tentative flow identifier. The tentative flowidentifier is passed to the PPM-SW module to select the appropriateowner packet processor. Any subsequent data packets having the same flowkey will match the tentative entry so that the same tentative flowidentifier is used. The tentative GFT entry may transition to a boundGFT entry when the owner packet processor accepts the ownershipassignment and sends a message to the packet processing manager. When aGFT entry is bound, the forward and reverse flows for the session may beadded to the GFT to ensure that flows belonging to the same session areassigned to the same owner packet processor. The bound data field of theGFT attributes is updated to indicate that a GFT entry has been bound.

A feature of the flow ownership assignment method of the presentinvention is that while the packet processing manager fills the globalflow table with GFT entries for each new session received in thesecurity device, the local flow table in each packet processing card ispopulated by data traffic and no additional steps are required to updateowner assignment entries in the local flow table. The local flow tablein each packet processing card stores part of the entries of the globalflow table and only those entries required based on the data trafficreceived. In this manner, the local flow table in each packet processingcard does not need to replicate all the entries in the global flowtable.

FIG. 6 is a flow chart illustrating a flow ownership assignment methodaccording to one embodiment of the present invention. In embodiments ofthe present invention, the flow ownership assignment method 400 may beimplemented in security device 102 of FIG. 2 including multiple packetprocessing cards and a packet processing manager. Referring to FIG. 6,at 402, one of the packet processing cards (PPCn) receives an incomingdata packet. The packet processing card PPCn performs a flow lookup inits local flow table (404). When the data packet belongs to a newsession, no matching flow will be found in the local flow table. When aflow is not found in the local flow table, the packet is forwarded tothe packet processing manager and the packet processing manager performsa flow lookup in the global flow table (406). When the flow is not foundin the global flow table, the packet processing manager assigns an ownerpacket processor and adds a flow entry in the global flow table (408).The packet processing manager then sends an “Owner” message to theassigned owner packet processor (410). If the assigned owner packetprocessor is able to accept the ownership assignment, then the ownerpacket processor sends a “Session Bind” message back to the packetprocessing manager (412). Upon receipt of the session bind message, thepacket processing manager binds the flow entry in the global flow table(414). In one embodiment, the owner packet processor provides forwardand reverse flow information to the packet processing manager. In thatcase, the packet processing manager creates the reverse flow entry inthe global flow table and binds both the forward and reverse flowentries in the global flow table. Finally, the owner packet processorprocesses the data packet and forwards the data packet after applicablepolicy enforcement (416).

FIG. 7 is a flow chart illustrating a flow ownership assignment methodaccording to an alternate embodiment of the present invention. Inembodiments of the present invention, the flow ownership assignmentmethod 500 may be implemented in security device 102 of FIG. 2 includingmultiple packet processing cards and a packet processing manager.Referring to FIG. 7, at 502, one of the packet processing cards (PPCn)receives an incoming data packet. The packet processing card PPCnperforms a flow lookup in its local flow table (504). When the datapacket belongs to a new session, no matching flow will be found in thelocal flow table. When a flow is not found in the local flow table, thepacket processor card PPCn that receives the data packet sends a “FlowUnknown” message with the data packet to the packet processing manager(506).

The packet processing manager performs a flow lookup in the global flowtable (508). When the flow is not found in the global flow table, thepacket processing manager assigns an owner packet processor to the newflow (510). In one embodiment, the assignment of an owner packetprocessor is performed by the software module of the packet processingmanager. The software module applies policies to determine that acertain packet processor on a certain packet processing card should bethe owner of the session for the new flow. For example, a packetprocessor PPm on a packet processing card PPCm is assigned to be theowner of the flow. When the software module returns the ownershipassignment, the hardware module of the packet processing manager encodesthe flow identifier of the flow with the owner packet processoridentification information, such as the slot number and the packetprocessor number. The hardware module of the packet processing managerthen adds a flow entry in the global flow table. The GFT flow entry thusadded is put in a tentative state. With a tentative GFT flow entry thuscreated, if a second data packet of the same flow arrives before theownership assignment becomes binding, the second data packet will beindexed to the same tentative GFT flow entry and be assigned to the sameowner.

The packet processing manager then sends an “Owner” message with thedata packet to the assigned owner packet processor (512). The ownerpacket processor processes the owner message and determines the reverseflow (514). The assigned owner packet processor also determines if it isable to accept ownership of the flow (516). The assigned owner packetprocessor may consider factors such as loading or memory space todetermine if it can accept ownership of the flow. If not, the assignedowner packet processor sends an acknowledgement message to the packetprocessing manager to refuse the ownership assignment and method 500returns to 510 where the packet processing manager determines assignmentfor another packet processor. When the assigned owner packet processoraccepts the ownership assignment, the owner packet processor determinesthe reverse flow and creates local session states. The owner packetprocessor then sends a “Session Bind” message with the data packet andalso the forward and reverse flow information to the packet processingmanager (518).

Upon receipt of the Session Bind message, the packet processing managerlooks up the flow for the data packet and loads the flow information,including updating the forward and reverse flow entries, in the globalflow table (520). The packet processing manager then binds the flowentries in the global flow table. Then the packet processing managersends a “Session Bind Acknowledgement” message with the data packet tothe owner packet processor (522). Finally, the owner packet processorprocesses the data packet and forwards the data packet after applicablepolicy enforcement (524).

In embodiments of the present invention, when the owner packet processorsends the Session Bind message to the packet processing manager, theowner packet processor appends its loading condition to the message. Inthis manner, the packet processing manager collects informationconcerning loading at each of the packet processors and the PPM-SWmodule may utilize the loading information in selecting an owner for aflow.

As described above, when a new flow ownership assignment is made, onlythe global flow table is updated with the flow assignment information.Other packet processing cards in the security device, including theowner packet processing card, do not yet have the flow entry in theirlocal flow tables. The local flow tables will be populated as datapackets arrive at the security device. In this manner, updating of thelocal flow tables does not require dedicated process but rather thelocal flow tables are updated on-demand based on data traffic. Themethod for populating the local flow tables and subsequent processing isshown in FIG. 7A.

For example, returning to 502, another data packet belonging to the sameflow arrives at a packet processing card, such as PPCn, which can be thesame or a different packet processing card as the one previouslyreceiving the first data packet of a new flow. For instance, the seconddata packet may be the acknowledgement data packet to the first datapacket and arrives at the owner packet processor. Because the local flowtable at the packet processing card of the owner packet processor hasnot yet been populated, the flow is not found in the local flow table(504). The packet processing card then sends a Flow Unknown message withthe data packet to the packet processing manager (506). The packetprocessing manager looks in the global flow table and finds the flowassociated with the data packet (508). The method 500 then continues to“A” (FIG. 7A) where the packet processing manager updates the aware maskfor the flow entry and sends a “Flow Add” message to the packetprocessing card PPCn that send the data packet (530). The packetprocessing card PPCn receives the Flow Add message from the packetprocessing manager and adds a flow entry in its local flow table (532).In this manner, the local flow table of packet processing card PPCn isupdated with the flow ownership assignment information. Meanwhile, thepacket processing manager forwards the data packet to the owner packetprocessor for that flow (534). The owner packet processor processes thedata packet and forwards the data packet after applicable policyenforcement (536).

Now, when another data packet belonging to the same flow arrives at thesame packet processing card PPCn (502 in FIG. 7), the packet processingcard PPCn finds the flow in the local flow table (504) and method 500continues to “B” (FIG. 7A). The packet processing card PPCn knows theowner packet processor for the data packet based on the flow informationstored in the local flow table. The packet processing card PPCn thenforwards the data packet directly to the owner packet processor (540).The data packet does not need to go to the packet processing manageragain. The owner packet processor processes the data packet and forwardsthe data packet after applicable policy enforcement (542).

The method from 530 to 536 repeats for each packet processing cardreceiving a data packet belonging to a flow identified in the globalflow table but not yet identified in its local flow table. Each datapacket causes the local flow table to be updated with the flow entry sothat subsequent data packets for the same flow arriving at the samepacket processing card will be identified in the local flow table ofthat packet processing card, without the need to go to the packetprocessing manager.

Accordingly, the flow ownership assignment method 500 (FIG. 7 and FIG.7A) operates to assign ownership of flows to packet processors acrossthe security device. In some embodiments, the packet processing managermay assign flow ownership to a packet processor on a processing resourcecard. The packet processors on the processing resource card processesthe data packets and forwards the data packets to a packet processingcard for egress out of the security device.

When a connection sessions ends, the security device needs to flush outstates associated with the terminated connection session. FIG. 8 is aflow chart illustrating a session teardown method according to oneembodiment of the present invention. In embodiments of the presentinvention, the session teardown method 600 may be implemented insecurity device 102 of FIG. 2 including multiple packet processing cardsand a packet processing manager. Referring to FIG. 8, at 602, the ownerpacket processor determines a connection session has ended and that anyadditional timeouts have expired. Thus, the session can now be torndown. The owner packet processor sends a “Session Teardown” message tothe packet processing manager. Upon receipt of the session teardownmessage, the packet processing manager looks up the forward and reverseflow entries in the global flow table and retrieves the aware maskassociated with the flows (604). The packet processing manager sends“Flow Delete” messages to the packet processing cards identified by theaware mask as having the flow added to the local flow table (606). Eachpacket processing card PPCn receiving the Flow Delete message looks upthe flow entries and generates closing statistics. Then the packetprocessing card deletes the flow entries from the local flow table(608). Each packet processing card PPCn then sends flow statistics ithas collected to the owner packet processor (610). The owner packetprocessor tallies the flow statistics from the packet processing cardsand retires the flow identifier (612).

In the present embodiment, the flow ownership assignment method isimplemented in a security device including multiple packet processingcards, each with one or more packet processors, and a packet processingmanager provided on a separate line card. In other embodiments, the flowownership assignment method is implemented in a security deviceincluding a single packet processing card with multiple processors. Oneof the processors can be assigned as the packet processing manager forownership assignment. In that case, each processor may maintainownership assignment information in a local memory.

Flow Prediction Method

In a data network, certain data traffic types involve multiple sessionswhere a “parent” session may exchange the state needed to setupsubsequent “child” sessions. The FTP (file transfer protocol) is oneexample where a control session exchanges the information needed to openup the subsequent data connections. Voice-over-IP is another examplewhere a connection includes a control session and a data session. Toimplement effective security policies and to access threats competently,the parent session and the child sessions should be handled by the sameowner packet processor. In this manner, the owner packet processor cancorrelate state between the parent and child sessions for effectivesecurity policy enforcement.

In embodiments of the present invention, the packet processing managerperforms stateful decoding of the parent session to predict the childsessions. In embodiments of the present invention, the packet processingmanager includes a predict flow table 200 (FIG. 5) configured to storepredict flow entries. When a child session is predicted, it is often notpossible to predict the session with enough detail for a complete fullentry to be made in the global flow table. For example, the packetprocessing manager may be able to identify the destination port from theIP address but the source port may not be known yet. Accordingly, apredict flow entry is created in the predict flow table 200 with thevalue of one or more data fields being unknown. In embodiments of theinvention, wildcards are used in data fields of the flow identifier toindicate the value is unknown. In one embodiment, the wildcard datafields have a value of zero to indicate that the exact value of the datafield is unknown.

FIG. 9 illustrates a predict flow table in embodiments of the presentinvention. Referring to FIG. 9, a predict flow table 200 contains amapping of predict keys to parent flow identifiers. Four example entries204, 206, 208 and 210 are shown in FIG. 9. The predict key may includethe source address, the destination address, the source port, and thedestination port. The parent flow identifier contains the flow key forthe parent flow and also the slot number and packet processor number ofthe owner packet processor of that parent flow. A wildcard may be usedin one or more of the data fields in the predict key to allow a childsession to be matched to the predict flow. For example, in entry 206,the source port field is wildcard, while in entry 210, the sourceaddress is wildcard. In one embodiment, the predict key includes the5-tuple information of a flow and one or more fields of the 5-tupleinformation can have a wildcard value.

FIG. 10 is a flow chart illustrating a predict flow method according toone embodiment of the present invention. In embodiments of the presentinvention, the predict flow method 700 may be implemented in securitydevice 102 of FIG. 2 including multiple packet processing cards and apacket processing manager. Referring to FIG. 10, a packet processingcard PPCn receives data packets for a connection session that indicatesa parent session with a child session to be determined (702). The packetprocessing card PPCn sends a “Predict Add” message with the data packetto the packet processing manager (704). Upon receipt of the Predict Addmessage, the packet processing manager adds a predict flow entry in thepredict flow table using the parent flow identifier and wildcards in thefields of the predict key (706).

Subsequently, when a data packet is received belonging to a childsession, the data packet will be forwarded to the packet processingmanager with a Flow Unknown message as the flow is not yet establishedin the global flow table or any of the local flow tables. The packetprocessing manager, upon receipt of the Flow Unknown message, looks upthe flows in the global flow table (708). When the data packet does notmatch any flow entry in the global flow table, the packet processingmanager looks up the flow in the predict flow table (710). In someembodiments, the table lookup for the global flow table and the predictflow table can be performed simultaneously. When a predict match is notfound in the predict flow table (712), the predict processing isterminated (714) and the packet processing manager returns to normalprocessing for assigning an owner packet processor for the data packet.

However, when a predict match is found in the predict flow table (712),the packet processing manager adds a tentative flow entry in the globalflow table using the parent flow identifier (716). In embodiments of thepresent invention, the global flow table further includes a predict flagindicating the entry has matched a predict table entry. For a tentativeflow entry that results from a predict match, the predict flag in theentry is set. In the global flow table, the owner packet processor forthe parent session will be automatically assigned as the owner packetprocessor for the child session. No owner assignment process needs to beperformed. The packet processing manager sends an Owner Message for thenew flow (child session) with the data packet to the owner packetprocessor (718). The Owner Message is sent with the predict flag set toindicate this is a predict match.

The owner packet processor verifies the new flow as belonging to thepredicted parent-child session (720). When the new flow is verified, theowner packet processor sends a Session Bind message to the packetprocessing manager (722). The packet processing manager adds the forwardand reverse flows in the global flow table and binds the flow entries ofthe now resolved session. The owner packet processor then processes thedata packet and applies security policy (724). In this manner, sessionsthat have a parent-child relationship are assigned to the same ownerpacket processor so that they can be policed accordingly.

In embodiments of the present invention, the predict flow table 200 isimplemented using a content-addressable memory (CAM). In particular, inone embodiment, the predict flow table 200 is implemented as a ternaryCAM or TCAM which allows for a matching state of “Don't Care” orwildcard for one or more bits in the stored dataword. In otherembodiments, the predict flow table and the global flow table are formedas separate logical components of the same memory device.

Furthermore, in embodiments of the present invention, the predict flowentry is deleted once a child session is matched. In most cases, thepredict flow entries have a short life-span as the child session isusually created within a very short time frame from the parent session.

Event Aggregation in a Distributed System

In a security device implemented as a distributed system, the securitydevice needs to keep track of events across all packet processors in thesystem in order to implement coordinated security policies. Inembodiments of the present invention, a security device uses a hardwareoffload engine to manage messages between the independent anddistributed processing resources so as to maintain event statisticseffectively in a distributed system. In embodiments of the presentinvention, the security device implements a multicast push notificationscheme to monitor event counts that have exceeded a given threshold. Thehardware offload engine and the multicast push notification schemereduce software overhead for event statistics management.

Returning to FIG. 5, to facilitate coordination of event statisticsacross the distributed system, the packet processing manager isimplemented with a set of global event counters 300 in communicationwith a counter memory 310. The global event counters 300 provide a largenumber of counters that can be configured by software with each counterbeing identified by a global counter identifier. Once configured, anypacket processor in the security device can send a message to the packetprocessing manager to increment, decrement, or simply query the countervalue of one or more events. In addition, the event counters can beconfigured with thresholds and when a counter value sum exceeds itscorresponding threshold, the packet processing manager will causemessages to be sent to a group of packet processing cards that areproviding the counter values for the event.

In one embodiment, the packet processing manager includes the messageprocessor 190 to implement message based communication with the packetprocessor cards over the switching fabric. The message processor 190 iscapable of both unicast and multicast message exchange. As will beexplained in more detail below, the message processor 190 handlesmulticast push notification to the packet processing cards in responseto the status of the event counters.

FIG. 11 illustrates a configuration of the global event counters 300 inembodiments of the present invention. Referring to FIG. 11, the set ofglobal event counters maintained by the packet processing managerincludes accumulative counters 850, also referred to as accumulators.Accumulators 850 are used to sum events across all the packet processorsin the security device and present a global indication that a counterthreshold has been met. Each accumulator for an event is identified by acounter identifier (counter ID) and is associated with a globalthreshold value and a global counter sum. In some embodiments, theglobal threshold value includes a high threshold value and a lowthreshold value. Accumulators 850 are a table capable of storing a largenumber of event counters for the events being processed by the securitydevice.

In a distributed system, accumulating errors can occur when summingevent counts across the packet processors, such as when an event countermessage is lost or a packet processor restarts. To avoid accumulatingerror, the packet processing manager maintains the counter memory 310 ofFIG. 5 for storing local values of each event counter for each packetprocessor reporting count values. The local values of an event counterstored in the counter memory 310 are referred to as instances of theevent counter or an Accumulator Instance Counter (AIC). FIG. 11illustrates three examples of Accumulator Instance Counters 870 a-c. AIC870 a stores local counter values for an event 1, AIC 870 b stores localcounter values for an event 2, and AIC 870 c stores local counter valuesfor an event 3. The sum of the local counter values is the counter sumstored in the global event counters corresponding to each event.

As thus configured, each packet processor sends, via an event countermessage, its current value for an event counter instead of an incrementvalue. The packet processing manager processes the current counter valuesent by a packet processor and stores the updated current value for thatpacket processor for that event in the respective AIC. Thus, any errorthat may lead to a count error, such as a lost message or a packetprocessor restarting, is only transient and the counter sum will correctitself when the packet processor sends the next updated current countervalue with the correct counter value.

The set of global event counters maintained by the packet processingmanager further includes rate counters 860. Rate counters 860 track thenumber of times an event occurs in a set time frame. Each rate counterfor an event is identified by a counter identifier (counter ID) and isassociated with a global threshold value, a global maximum value and aglobal fill rate. Rate counters 860 are formed as a table capable ofstoring a large number of event counters for the events being processedby the security device. In embodiments of the present invention, therate counters 860 are implemented as token buckets. Accordingly, therate counter for each event counter specifies the maximum number oftokens that will fit in the bucket and the fill rate in tokens persecond.

In operation, an event query is sent by a packet processor whichattempts to acquire one or more tokens. If the query is successful, thenthe packet processor can assume that the event is occurring at aconforming state. If the fill rate has exceeded the threshold, the eventquery will receive a non-acknowledgement response, indicating that theevent is non-conforming.

FIG. 12 illustrates an example event counter message that may be sent bya packet processor to the packet processing manager. Referring to FIG.12, an event counter message 900 includes the event counter identifier(counter ID) to identify the event counter the message intends for. Themessage 900 further includes a group identifier to indicate the group ofpacket processors currently reporting count value for that event. Themessage further includes a count value which is the total local countervalue for that event.

A packet processor may send the event counter message 900 to the packetprocessing manager to perform the following tasks: (1) to allocate anevent counter (accumulator or event rate counter) and return a counteridentifier; (2) to update specified event counter via set, increment, ordecrement operations; and (3) to release an event counter by providingthe count identifier.

In one embodiment, to avoid accumulating errors when aggregating eventcount values from multiple sources, each packet processor reports itstotal local counter value and uses the Set commend. The packetprocessing manager updates the global counter sum by first subtractingthe previous local counter value stored in the respective AIC and thenadding the current local counter value provided in the message. In thismanner, any error in the total local counter value will only betransient and will be corrected at the next counter value update.

In embodiments of the present invention, each event counter message canbe configured to handle multiple event counters so that a single messagecan be sent to ensure all events are conforming before the packetprocessor creates sessions.

In embodiments of the present invention, each packet processing card inthe security device stores local counter values for the event countersit is maintaining so that the packet processors on the card do not haveto send count value updates continuously. FIG. 13 is a schematic diagramof a packet processing card in an alternate embodiment of the presentinvention. The packet processing card in FIG. 13 is constructed in asimilar manner as the packet processing card 160 in FIG. 3 and likeelements are given like reference numbers and will not be furtherdescribed. Referring to FIG. 13, a packet processing card 800 includes astatistics engine (stats engine) 810 for maintaining event statisticsfor flows handled by the packet processing card. The stats engine 810 isin communication with a local counter memory 820. The local countermemory 820 stores local values of event counters associated with theflows the packet processing card is processing.

In embodiments of the present invention, the local counter memory storesthe local counter values for each event counter and also a localthreshold value. When the local counter value for an event reaches thelocal threshold value, the stats engine 810 sends an event countermessage to the packet processing manager to update the global count sum.In this manner, the stats engine 810 only needs to update the globalcounter sum periodically and latency in the security device due to eventcounter messages is minimized. In one embodiment the local thresholdvalue is selected so that even when the local threshold value for anevent is exceeded on all the packet processing cards processing the sameevent, the global counter sum for that event is still below that of thepolicy enforcement limit.

Multicast Push Notification

In embodiments of the present invention, the packet processing managerimplements a multicast push notification scheme to notify packetprocessors when an event counter has exceeded a global threshold. Asdescribed above, an event counter in the global event counters, such asaccumulators 850 or rate counters 860, is associated with a globalthreshold value. When the global threshold value is exceeded by theglobal counter sum, the packet processing manager sends a multicastnotification message to the interested packet processors indicating theevent counter identifier and that the event count has entered anon-conforming state. In embodiments of the present invention, theinterested packet processors are those identified by the groupidentifier in the event count message as belonging to the group ofpacket processors that are keeping track of statistics of that eventcounter.

Each packet processor, upon receipt of the multicast notificationmessage, transitions the local state for that event count to thenon-conforming state. When an event counter is in a conforming mode, thecounter value update messages for the group of packet processors aresent asynchronously where each packet processor reports a count valuewhen the count value reaches the local threshold. Also, the packetprocessor may create a new connection session independently withoutconsulting with the packet processing manager or other managementprocessor.

However, when the event counter is in a non-conforming state, the packetprocessors have to query the packet processing manager for the globalcounter sum. Each packet processor has to wait for a response to itsquery before proceeding with decisions based on event states.Furthermore, the packet processors report the local counter values tothe packet processing manager more frequently.

As the packet processors make queries of the global count sum, theglobal count sum for that event counter may drop below the threshold andre-enter a conforming state. When this occurs, the packet processingmanager sends a multicast message to the interested packet processorsinforming them that the event counter is now in a conforming state andthe packet processors can return to an asynchronous mode of operation.

In one embodiment, the global threshold value comprises a high thresholdvalue and a low threshold value. When the global counter sum exceeds thehigh threshold value, the event counter enters the non-conforming state.Once the global counter sum exceeds the high threshold value, the globalcounter sum has to drop before the low threshold value before the eventcounter can return to the conforming state. The hysteresis provided bythe high threshold value and the low threshold value ensures that anevent counter does not chatter between the conforming and non-conformingstates.

Although the foregoing embodiments have been described in some detailfor purposes of clarity of understanding, the invention is not limitedto the details provided. There are many alternative ways of implementingthe invention. The disclosed embodiments are illustrative and notrestrictive.

1. (canceled)
 2. A security device for processing a plurality of networkflows, comprising: one or more packet processors configured to receiveincoming data packets associated with one or more network flows, atleast one of the packet processors being assigned as an owner of one ormore network flows, and each packet processor processing data packetsassociated with flows for which it is the assigned owner and eachnetwork flow being assigned to only one owner packet processor, eachowner packet processor processing data packets associated with a networkflow to enforce a security policy; and a packet processing managerconfigured to assign ownership of network flows to the one or morepacket processors, the packet processing manager comprising a globalflow table containing global flow table entries mapping network flows toowner packet processors and a predict flow table containing predict flowentries mapping predicted network flows to the owner packet processorsassigned to parent flows for connection sessions that indicate childflows to be determined, wherein in response to a first data packet beingreceived by one of the one or more packet processors and beingassociated with a first parent flow for a connection session thatindicates a first child flow to be determined, the packet processingmanager adds a first predict flow entry in the predict flow table, thefirst predict flow entry mapping a predicted network flow to the packetprocessor assigned as the owner of the first parent flow, and inresponse to a second data packet being received by one of the one ormore packet processors and the network flow for the second data packetbeing found in the predict flow table as matching the first predict flowentry, the packet processing manager adds an entry in the global flowtable to map the network flow of the second data packet to the ownerpacket processor of the first parent flow; and in response to receivinga message from the owner packet processor indicating acceptance of theownership assignment, the packet processing manager stores a bindingentry in the global flow table mapping the network flow of the seconddata packet to the owner packet processor of the first parent flow. 3.The security device of claim 2, wherein each predict flow entrycomprises a predict key mapping to a parent flow identifier, the predictkey identifying in part a predicted network flow being a child flowcorresponding to a parent flow in a connection session and the parentflow identifier identifying the parent flow corresponding to the childflow and the owner packet processor assigned to the parent flow, thechild flow being derived from information relating to the parent flow,the predict key comprising a plurality of data fields identifying thepredicted network flow where the value of one or more of the data fieldsis unknown.
 4. The security device of claim 3, wherein the predict keycomprises the 5-tuple information of a predicted network flow where oneor more of the 5-tuple information has an unknown value.
 5. The securitydevice of claim 3, wherein the first predict flow entry maps the firstpredict key identifying the first child flow to a parent flow identifierassociated with the first parent flow, the parent flow identifier beingindicative of the packet processor ownership assignment associated withthe first parent flow.
 6. The security device of claim 2, wherein theparent flow and the child flow comprise a file transfer protocol sessionor a voice-over-IP session.
 7. The security device of claim 2, whereinthe parent flow comprises a control session and the child flow comprisesa data session associated with the control session.
 8. The securitydevice of claim 2, wherein a packet processor forwards a received datapacket to the packet processing manager in response to no entry for anetwork flow being found in a local memory, the packet processingmanager looks up the network flow in the global flow table and thepredict flow table.
 9. The security device of claim 2, wherein thepredict flow table comprises a ternary content-addressable memory(TCAM).
 10. The security device of claim 2, further comprising: one ormore packet processing cards, each having one or more packet processorsformed thereon, each packet processing card having a data port forreceiving and transmitting data packets and a local flow table; and aswitching fabric in communication with the one or more packet processingcards and the packet processing manager, wherein the one or more packetprocessing cards learn of ownership assignments of network flows fromthe packet processing manager as data packets are being received, thelocal flow table stores entries mapping network flows to owner packetprocessors where ownership assignments are learned from the packetprocessing manager.
 11. A method for processing a plurality of networkflows in a security device comprising a plurality of packet processingcards communicating through a switching fabric, each packet processingcard including one or more packet processors, the method comprising:receiving, at the one or more packet processors, incoming data packetsassociated with one or more network flows, at least one of the packetprocessors being assigned as an owner of one or more network flows, andeach packet processor processing data packets associated with flows forwhich it is the assigned owner and each network flow being assigned toonly one owner packet processor, each owner packet processor processingdata packets associated with a network flow to enforce a securitypolicy; receiving a first data packet at a packet processing card, thefirst data packet being associated with a first network flow indicativeof a parent flow of a connection session that indicates a child flow tobe determined; assigning a first packet processor of the one or morepacket processors as an owner of the first network flow; sending amessage to a packet processing manager to add a predict flow entry;adding a first predict flow entry in a predict flow table mapping apredicted network flow to the first packet processor as the owner packetprocessor of the first network flow being the parent flow associatedwith the first data packet; receiving a second data packet at a packetprocessing card; forwarding the second data packet to the packetprocessing manager; looking up a network flow for the second data packetin the predict flow table; in response to the network flow for thesecond data packet being found in the predict flow table and matchingthe first predict flow entry, adding an entry in a global flow table ofthe packet processing manager mapping the network flow of the seconddata packet to an owner packet processor, the entry being addedidentifying the first packet processor as the owner packet processor ofthe second data packet; sending a message from the packet processingmanager to the owner packet processor informing the assigned packetprocessor of the ownership assignment of the second data packet;receiving a message at the packet processing manager from the ownerpacket processor indicating acceptance of the ownership assignment;storing a binding entry in the global flow table mapping the networkflow of the second data packet to the owner packet processor; andprocessing the second data packet at the owner packet processor.
 12. Themethod of claim 11, wherein adding the first predict flow entry in apredict flow table comprises: adding the first predict flow entry in apredict flow table using a predict key having a plurality of data fieldsto identify the predicted network flow being a child flow correspondingto the parent flow where the value of one or more of the data fields haswildcard values, the child flow being derived from information relatingto the parent flow.
 13. The method of claim 11, wherein looking up thenetwork flow for the second data packet in the predict flow tablecomprises: looking up the network flow for the second data packet in thepredict flow table and the global flow table.
 14. The method of claim11, wherein looking up the network flow for the second data packet inthe predict flow table comprises: looking up the network flow for thesecond data packet in the predict flow table and the global flow tablesimultaneously.
 15. The method of claim 11, wherein receiving the firstdata packet at the packet processing card comprises: receiving a datapacket at a packet processing card, the data packet being associatedwith a parent session with a child session to be determined, the predictflow entry being made for the child session to be determined.
 16. Themethod of claim 15, wherein the parent flow and the child flow comprisea file transfer protocol session or a voice-over-IP session.
 17. Themethod of claim 15, wherein the parent flow comprises a control sessionand the child flow comprise a data session associated with the controlsession.
 18. The method of claim 11, wherein the predict key comprisesthe 5-tuple information of a predicted network flow where one or more ofthe 5-tuple information has an unknown value.
 19. The method of claim11, further comprising: receiving a third data packet at a packetprocessing card; in response to a network flow associated with the thirddata packet being found in the global flow table, sending a message fromthe packet processing manager to the packet processing card receivingthe third data packet informing the receiving packet processing card theownership assignment for the network flow; adding an entry in a localflow table of the packet processing card receiving the third datapacket, the entry mapping the network flow to the owner packetprocessor; forwarding the data packet from the packet processing managerto the owner packet processor; and processing the data packet at theowner packet processor.