Rule swapping in a packet network

ABSTRACT

In some variations, first and second rule sets may be received by a network protection device. The first and second rule sets may be preprocessed. The network protection device may be configured to process packets in accordance with the first rule set. Packets may be received by the network protection device. A first portion of the packets may be processed in accordance with the first rule set. The network protection device may be reconfigured to process packets in accordance with the second rule set. A second portion of the packets may be processed in accordance with the second rule set.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation of and claims priority to co-pendingU.S. patent application Ser. No. 16/892,424, filed on Jun. 4, 2020 andentitled “RULE SWAPPING IN A PACKET NETWORK,” which is a continuation ofU.S. patent application Ser. No. 16/744,341, filed on Jan. 16, 2020, nowU.S. Pat. No. 10,681,009, and entitled “RULE SWAPPING IN A PACKETNETWORK,” which is a continuation of U.S. patent application Ser. No.16/357,855, filed Mar. 19, 2019, now U.S. Pat. No. 10,541,972, andentitled “RULE SWAPPING IN A PACKET NETWORK,” which is a continuation ofU.S. patent application Ser. No. 15/610,995, now U.S. Pat. No.10,284,522, filed Jun. 1, 2017, and entitled “RULE SWAPPING IN A PACKETNETWORK,” which is a continuation of U.S. patent application Ser. No.14/921,718, filed on Oct. 23, 2015, now U.S. Pat. No. 9,674,148 andentitled “RULE SWAPPING IN A PACKET NETWORK,” which is a continuation ofU.S. patent application Ser. No. 13/739,178, filed on Jan. 11, 2013, nowU.S. Pat. No. 9,203,806, and entitled “RULE SWAPPING IN A PACKETNETWORK.” The entire contents of which are incorporated by referenceherein in their entireties and made part hereof.

This application is related to U.S. patent application Ser. No.16/518,190, filed on Jul. 22, 2019, now U.S. Pat. No. 10,511,572, andentitled “RULE SWAPPING IN A PACKET NETWORK,” the entire contents ofwhich are incorporated by reference herein in its entirety and made parthereof.

BACKGROUND

Network protection devices (e.g., firewalls) implement rules withrespect to packet-switched network traffic entering or leaving thenetworks they protect. Such devices compare the rules with the traffic.If a match is found, then the devices apply the actions associated withthe rules to the traffic, e.g., the traffic may be allowed to cross thenetwork boundary, or the traffic may be prevented from crossing theboundary. Such rules are often grouped into rule sets, which may formone or more network policies. As networks increase in complexity, thenumber of rules in a rule set may correspondingly increase. Similarly,the number of rules in a rule set may increase due to a desire on thepart of an administrator to manage network traffic with a high level ofgranularity.

Network protection devices may require time to switch between rule sets.As rule sets increase in complexity, the time required for switchingbetween them presents obstacles for effective implementation. Forexample, a network protection device may be unable to process networktraffic while switching between rule sets due to the utilization ofresources for implementing the new rule set. Additionally, whileimplementing a new rule set, a network protection device may continueprocessing packets in accordance with an outdated rule set. In certaincircumstances (e.g., in the event of a network attack), such processingmay exacerbate rather than mitigate the impetus for the rule set switch(e.g., the effect of the network attack).

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosure. It is neither intendedto identify key or critical elements of the disclosure nor to delineatethe scope of the disclosure. The following summary merely presents someconcepts in a simplified form as a prelude to the description below.

In some variations, first and second rule sets may be received by anetwork protection device.

The first and second rule sets may be preprocessed. For example, thefirst and second rule sets may be optimized to improve performance. Thenetwork protection device may be configured to process packets inaccordance with the first rule set. Packets may be received by thenetwork protection device. A first portion of the packets may beprocessed in accordance with the first rule set. The network protectiondevice may be reconfigured to process packets in accordance with thesecond rule set. A second portion of the packets may be processed inaccordance with the second rule set.

In some embodiments, the network protection device may include multipleprocessors. The processors, or a portion thereof, may be utilized forprocessing the first portion of the packets in accordance with the firstrule set. Reconfiguring the network protection device to process packetsin accordance with the second rule set may include synchronizing theprocessors. Synchronizing the processors may include signaling theprocessors to process packets in accordance with the second rule set.Responsive to signaling the processors to process packets in accordancewith the second rule set, the processors may cease processing packetsand may cache any unprocessed packets. The processors may bereconfigured to process packets in accordance with the second rule set.Once reconfigured, the processors may signal completion of thereconfiguration process. Responsive to signaling completion of thereconfiguration process, the processors may process the cachedunprocessed packets in accordance with the second rule set.

In some embodiments, configuration information for configuring thenetwork protection device to process packets in accordance with thefirst rule set may be stored. The stored configuration information maybe utilized to reconfigure the network protection device to processpackets in accordance with the first rule set, and a third portion ofthe packets may be processed in accordance with the first rule set.

In some embodiments, the first rule set may specify a set of networkaddresses for which packets should be forwarded and the second rule setmay specify a set of network addresses for which packets should beforwarded. The second set of network addresses may include fewer networkaddresses than the first set. Alternatively, the second set of networkaddresses may include more network addresses than the first set.

In some embodiments, the first rule set may specify a set of networkaddresses for which packets should be dropped and the second rule setmay specify a set of network addresses for which packets should bedropped. The second set of network addresses may include fewer networkaddresses than the first set. Alternatively, the second set of networkaddresses may include more network addresses than the first set.

In some embodiments, reconfiguring the network protection device toprocess packets in accordance with the second rule set may be performedin response to the network protection device receiving a messageinvoking the second rule set. Additionally or alternatively,reconfiguring the network protection device to process packets inaccordance with the second rule set may be performed in response to oneor more detected network conditions indicating a network attack.

Other details and features will be described in the sections thatfollow.

BRIEF DESCRIPTION OF THE DRAWINGS

Some features herein are illustrated by way of example, and not by wayof limitation, in the figures of the accompanying drawings, in whichlike reference numerals refer to similar elements.

FIG. 1 illustrates an exemplary network protection device in which oneor more aspects of the disclosure may be implemented.

FIG. 2 illustrates an exemplary method for performing fast ruleswapping.

FIGS. 3A-3F illustrate aspects of an exemplary network protection devicesynchronizing multiple processors performing fast rule swapping.

FIG. 4 illustrates an exemplary method for synchronizing multipleprocessors performing fast rule swapping.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

Various connections between elements are discussed in the followingdescription. These connections are general and, unless specifiedotherwise, may be direct or indirect, wired or wireless, physical orlogical. In this respect, the specification is not intended to belimiting.

FIG. 1 illustrates an exemplary network protection device in which oneor more aspects of the disclosure may be implemented. Referring to FIG.1 , network protection device 100 may be located at boundary 102 betweennetworks 104 and 106. As used herein, a network protection deviceincludes any computing device having a processor, a memory, and acommunication interface. Optionally, a network protection device may beconfigured to perform one or more additional functions as describedherein. For example, network protection device 100 may be a firewall,gateway, router, or switch that interfaces networks 104 and 106. Networkprotection device 100 may include one or more network interfaces. Forexample, network protection device 100 may include network interface 108for communicating with network 104, and network interface 110 forcommunicating with network 106. In some embodiments, network protectiondevice 100 may include a management interface for providing anadministrator with configuration access or provisioning networkprotection device 100 with one or more rule sets. For example, networkprotection device 100 may include management interface 112.

Network protection device 100 may also include one or more processors114, memory 116, and packet filter 118. Network interfaces 108 and 110,management interface 112, processor(s) 114, memory 116, and packetfilter 118 may be interconnected via data bus 120. Packet filter 118 maybe configured to examine information specified by policy 122 withrespect to packets received by network protection device 100 and forwardthe packets to one or more packet transformation functions specified bypolicy 122 based on the examined information. As used herein, a policyincludes any combination of rules, rule sets, messages, instructions,files, data structures, or the like that specifies criteriacorresponding to one or more packets and identifies a packettransformation function to be performed on packets corresponding to thespecified criteria. Optionally, a policy may further specify one or moreadditional parameters as described herein.

Packet filter 118 may examine information specified by policy 122 withrespect to packets received by network protection device 100 (e.g.,packets received from network 104 via network interface 108) and forwardthe packets to one or more of packet transformation functions 124, 126,or 128 specified by policy 122 based on the examined information. Packettransformation functions 124, 126, and 128 may be configured to performone or more functions on packets they receive from packet filter 118.For example, one or more of packet transformation functions 124, 126,and 128 may be configured to forward packets received from packet filter118 into network 106, forward packets received from packet filter 118 toan Internet Protocol Security (IPsec) stack having an IPsec securityassociation corresponding to the packets, or drop packets received frompacket filter 118. Additionally or alternatively, one or more of packettransformation functions 124, 126, and 128 may be configured to forwardone or more packets they receive to one or more other packettransformation functions (e.g., packet transformation function 124, 126,or 128), which may, in turn, perform one or more additional functions onthe packets (e.g., log the packets, forward the packets into network106, drop the packets, or forward the packets to one or more additionalpacket transformation functions for further processing). In someembodiments, one or more of packet transformation functions 124, 126,and 128 may be configured to drop packets by sending the packets to alocal “infinite sink” (e.g., the /dev/null device file in a UNIX/LINUXsystem). U.S. patent application Ser. No. 13/657,010, filed Oct. 22,2012, describes the use of packet transformation functions and isincorporated by reference herein in its entirety.

As indicated above, network protection devices (e.g., network protectiondevice 100) may require time to switch between rule sets, and, as rulesets increase in complexity, the time required for switching betweenthem may present obstacles for effective implementation. For example,memory 116 may include policies 130 and 132. Each of policies 130 and132 may include a rule set. In some embodiments, memory 116 may storepolicies 130 and 132's rule sets in one or more buffers. The buffers maybe statically sized to one or more predetermined sizes or the size ofthe buffers may be dynamically adjusted based on the size of policies130 and 132's rule sets. In order to optimize network protection device100's implementation of policies 130 and 132 the rule set containedwithin policy 130 or policy 132 may be preprocessed prior to itsimplementation by network protection device 100. For example, recentadvances in packet filtering technology have reduced the time requiredto apply large rule sets to network traffic. United States PatentApplication Publication Nos. 2006/0195896 and 2006/0248580 to Fulp etal., and United States Patent Application Publication No. 2011/0055916to Ahn, describe such advanced packet filtering technologies, and areeach incorporated by reference herein in their entireties. In someembodiments, preprocessing policies 130 and 132's rule sets may includemerging two or more rules within the rule sets into one rule, separatingone or more rules within the rule sets into two or more rules, orreordering one or more rules within the rule sets.

While preprocessing a rule set prior to its implementation may optimizeits application to packets, preprocessing a rule set may be a resourceintensive process that may require a substantial period of time. Incertain contexts (e.g., initial setup) the time required forpreprocessing may be of little moment; however, in other contexts (e.g.,when rule sets are being swapped live), the time required forpreprocessing a rule set may adversely affect the performance of networkprotection device 100. For example, network protection device 100 maypreprocess policy 130's rule set and then implement the preprocessedrule set with respect to network traffic flowing between networks 104and 106. Later, it may be desired to reconfigure network protectiondevice 100 to implement policy 132's rule set with respect to networktraffic flowing between networks 104 and 106. Accordingly, policy 132'srule set may be preprocessed and network protection device 100 may bereconfigured to implement the preprocessed rule set with respect tonetwork traffic flowing between networks 104 and 106. Utilizing such anapproach, however, may result in network protection device 100 having todevote resources to preprocessing policy 132's rule set whilesimultaneously implementing policy 130's rule set with respect totraffic flowing between networks 104 and 106. Thus, network protectiondevice 100 may have to wait until preprocessing of policy 132's rule setis completed before switching to policy 132. Moreover, this period maybe extended due to network protection device 100's ongoingimplementation of policy 130's rule set with respect to traffic flowingbetween networks 104 and 106.

In accordance with aspects of the disclosure, network protection device100 may be configured to preprocess multiple rule sets prior to theirimplementation and thereby enable network protection device 100 toperform fast rule swapping between rule sets. FIG. 2 illustrates anexemplary method for performing fast rule swapping. Referring to FIG. 2, the steps may be performed by a network protection device, such asnetwork protection device 100. At step 200, a first rule set may bereceived. For example, network protection device 100 may receive policy130 via management interface 112. At step 202, a second rule set may bereceived. For example, network protection device 100 may receive policy132 via management interface 112. At step 204, the first and second rulesets may be preprocessed. For example, network protection device 100 maypreprocess both policy 130's rule set and policy 132's rule set. At step206, the network protection device may be configured to process packetsin accordance with the first rule set. For example, network protectiondevice 100 may be configured to process packets flowing between networks104 and 106 in accordance with policy 130's preprocessed rule set. Atstep 208, packets may be received. For example, network protectiondevice 100 may receive packets from network 104 via network interface108. At step 210, a first portion of the packets may be processed inaccordance with the first rule set. For example, network protectiondevice 100 may perform one or more packet transformation functionsspecified by policy 130's preprocessed rule set on a first portion ofthe packets received from network 104. At step 212, the networkprotection device may be reconfigured to process packets in accordancewith the second rule set. For example, network protection device 100 maybe reconfigured to process packets flowing between networks 104 and 106in accordance with policy 132's preprocessed rule set. At step 214, asecond portion of the packets may be processed in accordance with thesecond rule set. For example, network protection device 100 may performone or more packet transformation functions specified by policy 132'spreprocessed rule set on a second portion of the packets received fromnetwork 104.

It will be appreciated that by preprocessing both policy 130's rule setand policy 132's rule set prior to processing packets flowing betweennetworks 104 and 106 in accordance with either of policy 130's rule setor policy 132's rule set, network protection device 100 may swap orswitch between policy 130's rule set and policy 132's rule set moreefficiently. For example, because policy 132's rule set is preprocessedprior to network protection device 100 being reconfigured to processpackets in accordance with policy 132's rule set, network protectiondevice 100 is not required to preprocess policy 132's rule set at thetime network protection device 100 is switching between policy 130'srule set and policy 132's rule set. Moreover, network protection device100 may be able to preprocess policy 132's rule set more efficientlybecause it may not be required to simultaneously process packets inaccordance with policy 130's rule set.

In some embodiments, network protection device 100 may be configured tostore configuration information associated with policy 130's rule set orpolicy 132's rule set. Such configuration information may later beutilized to reconfigure network protection device 100 to process packetsin accordance with policy 130's rule set or policy 132's rule set (e.g.,to swap or switch back to processing packets in accordance with a ruleset network protection device 100 has previously processed packets inaccordance with).

Due to the large number of rules a rule set may contain and the highvolume of traffic a network protection device may be required toefficiently process, a network protection device may include multipleprocessors for processing packets in accordance with a rule set. Such amulti-processor network protection device may distribute packets amongstits processors for processing in accordance with a rule set.

FIGS. 3A-3F illustrate aspects of an exemplary network protection devicesynchronizing multiple processors performing fast rule swapping.Referring to FIG. 3A, as indicated above, network protection device 100may include packet filter 118. Packet filter 118 may include one or moreprocessor(s). For example, packet filter 118 may include processors 300,302, and 304. Each of processors 300, 302, and 304 may be associatedwith a memory cache. For example, processor 300 may be associated withcache 306. Similarly, processor 302 may be associated with cache 308 andprocessor 304 may be associated with cache 310. Packet filter 118 mayfurther include one or more administrative processors for controlling orcoordinating its processors. For example, packet filter 118 may includeadministrative processor 312 for controlling or coordinating processors300, 302, and 304. As indicated above, network protection device 100 maybe configured to swap or switch between processing packets in accordancewith one rule set to processing packets in accordance with a differentrule set. In multi-processor embodiments, it may be advantageous tosynchronize the processors involved in processing packets in accordancewith the rule sets. For example, policy 130's rule set may include rules130A, 130B, and 130C-130Z; and policy 132's rule set may include rules132A-132Z. It will be appreciated, that either or both of policies 130and 132's rule sets may include more than the number of rulesillustrated (e.g., either or both of policies 130 and 132's rule setsmay include hundreds of thousands or millions of individual rules).

Each of the individual rules within either of policies 130 or 132's rulesets may specify criteria (e.g., a set of network addresses) and anaction (e.g., accept or deny) to be performed on packets matching thespecified criteria. For example, rule 130A may specify that packetscontaining TCP packets, originating from a source IP address that beginswith 140, having any source port, destined for any IP address, anddestined for any port should have an accept packet transformationfunction performed on them. Similarly, rule 130B may specify thatpackets containing TCP packets, originating from a source IP addressthat begins with 198, having any source port, destined for an IP addressthat begins with 130, and destined for any port should have an acceptpacket transformation function performed on them; rule 130C may specifythat packets containing UDP packets, originating from a source IPaddress that begins with 136, having any source port, destined for anyIP address, and destined for any port should have an accept packettransformation function performed on them; rule 130Z may specify thatpackets containing packets of any protocol, originating from any IPsource address, having any source port, destined for any IP address, anddestined for any port should have a deny packet transformation functionperformed on them; rule 132A may specify that packets containing TCPpackets, originating from a source IP address that begins with 140,having any source port, destined for any IP address than begins with127, and destined for any port should have an accept packettransformation function performed on them; and rule 132Z may specifythat packets containing packets of any protocol, originating from any IPsource address, having any source port, destined for any IP address, anddestined for any port should have a deny packet transformation functionperformed on them.

The individual rules of policies 130 and 132's rule sets may execute ina linear fashion. That is, a packet being processed in accordance withpolicy 130's rule set may first be compared to the criteria specified byrule 130A. If the packet matches the criteria specified by rule 130A,the corresponding action may be performed on the packet and packetfilter 118's processor(s) may move on to the next packet. If the packetdoes not match the criteria specified by rule 130A, then the packet iscompared to the criteria specified by the next rule (e.g., rule 130B),and so on, until the packet matches the criteria specified by a rule andthe corresponding action is performed on the packet. Thus, for amulti-processor network protection device, individual processors may becomparing different individual packets to different rules within a givenrule set when it is determined that the network protection device shouldswap or switch the rule set the packets are being processed inaccordance with.

For example, at a time when it is determined that network protectiondevice 100 should swap or switch from processing packets in accordancewith policy 130's rule set to processing packets in accordance withpolicy 132's rule set, processor 300 may be beginning to process apacket than does not match the criteria of any of policy 130's ruleset's rules other than rule 130Z. Thus, processor 300 may be required tocompare the packet being processed to a large number of additionalrules—potentially millions—before reaching the rule whose criteria thepacket will match (e.g., rule 130Z). In contrast, at the time it isdetermined that network protection device 100 should swap or switch fromprocessing packets in accordance with policy 130's rule set toprocessing packets in accordance with policy 132's rule set, processor302 may be beginning to process a packet that matches the criteriaspecified by rule 130A, and will therefore process the packet relativelyquickly compared to processor 300. Thus, if processors 300 and 302 eachreconfigure to process packets in accordance with policy 132's rule setupon completion of processing their respective packets, processor 302may begin processing packets in accordance with policy 132's rule setwhile processor 300 continues to process packets in accordance withpolicy 130's rule set. Accordingly, it may be advantageous tosynchronize processors 300, 302, and 304's implementation of policy132's rule set.

Referring to FIG. 3B, when it is determined that network protectiondevice 100 should swap or switch from processing packets in accordancewith policy 130's rule set to processing packets in accordance withpolicy 132's rule set, each of processors 300, 302, and 304 may besignaled by administrative processor 312 (e.g., via data bus 120) tostop processing packets. In some embodiments, processors 300, 302, and304 may be signaled via the same channel over which they receive packets(e.g., data bus 120). For example, a control packet, indicting thepolicy swap, may be sent to each of processors 300, 302, and 304. Insome embodiments, such a control packet may comprise a header value(e.g., a negative integer) that would not exist in a real network packet(e.g., a packet received from network 104). Additionally oralternatively, packets sent to processors 300, 302, and 304 may beencapsulated within meta packets and the meta packets may includeinformation indicating whether they are control packets (e.g., packetsindicating that processors 300, 302, and 304 should swap from processingpackets in accordance with policy 130's rule set to processing packetsin accordance with policy 132's rule set) or packets containing realnetwork packets (e.g., packets received from network 104).

In some embodiments, each of processors 300, 302, and 304 may finishprocessing the packet they are currently processing and then ceaseprocessing packets. In other embodiments, each of processors 300, 302,and 304 may cease processing packets and cache the packet they arecurrently processing for future processing in accordance with policy132's rule set. In any of the aforementioned embodiments, once aprocessor has ceased processing packets, it may cache any additionalpackets for future processing in accordance with policy 132's rule set.For example, processor 300 may cache any unprocessed packets in cache306. Similarly, processor 302 may cache any unprocessed packets in cache308 and processor 304 may cache any unprocessed packets in cache 310.

Referring to FIG. 3C, upon ceasing to process packets (e.g., when acurrent packet has been examined against the rules in policy 130's ruleset), each of processors 300, 302, and 304 may signal administrativeprocessor 312 that they have stopped processing packets. Referring toFIG. 3D, once each of processors 300, 302, and 304 have signaled thatthey have stopped processing packets, each of processors 300, 302, and304 may be reconfigured to process packets in accordance with policy132's rule set. Referring to FIG. 3E, once reconfigured to processpackets in accordance with policy 132's rule set, each of processors300, 302, and 304 may signal administrative processor 312 that they havebeen successfully reconfigured. Referring to FIG. 3F, once each ofprocessors 300, 302, and 304 have signaled that they have beensuccessfully reconfigured, each of processors 300, 302, and 304 mayresume processing packets. For example, processors 300, 302, and 304 maybegin by processing any packets respectively stored in caches 306, 308,and 310, and then may process additional packets received from network104 via network interface 108.

By synchronizing the implementation of policy 132's rule set acrossprocessors 300, 302, and 304, packets processed by network protectiondevice 100 at any given time may receive uniform treatment irrespectiveof the particular processor which handles them. Because both policy130's rule set and policy 132's rule set may be preprocessed prior toprocessing any packets in accordance with either of policies 130 or132's rule sets, the time required to reconfigure network protectiondevice 100 to process packets in accordance with policy 132's rule setmay be reduced. Reducing the time required to swap or switch betweenprocessing packets in accordance with policy 130's rule set and policy132's rule set may be particularly advantageous in certain contexts. Forexample, policy 130's rule set may specify a set of network address forwhich packets should be accepted (e.g., a set of network addressescorresponding to devices for which communications should be supportedunder normal network conditions) and that all other packets should bedenied. Policy 132's rule set may specify a smaller set of networkaddresses for which packets should be accepted than that specified bypolicy 130's rule set (e.g., a set of network addresses corresponding todevices for which communications should be supported under demandingnetwork conditions), and may further specify that all other packetsshould be denied. In the event of a network attack (e.g., a DistributedDenial-of-Service (DDoS) attack) or detection of one or more networkconditions indicating a network attack, network protection device 100may switch from processing packets in accordance with policy 130's ruleset to processing packets in accordance with policy 132's rule set(e.g., in an effort to mitigate the effects of the attack). Accordingly,the faster network protection device 100 can switch from processingpackets in accordance with policy 130's rule set to processing packetsin accordance with policy 132's rule set, the greater the likelihoodthat the effects of the attack may be mitigated.

FIG. 4 illustrates an exemplary method for synchronizing multipleprocessors performing fast rule swapping. Referring to FIG. 4 , thesteps may be performed by a network protection device, such as networkprotection device 100. At step 400, the second rule set may be invoked.For example, network protection device 100 may receive a messageinvoking policy 132's rule set or one or more network conditionsindicating a network attack may be detected. At step 402, one or more ofthe network protection device's processors responsible for processingpackets may be signaled to process packets in accordance with the secondrule set. For example, processors 300, 302, and 304 may be signaled toprocess packets in accordance with policy 132's rule set. At step 404,the one or more processors of the network protection device responsiblefor processing packets may cease processing packets. For example, eachof processors 300, 302, and 304 may cease processing packets inaccordance with policy 300's rule set. At step 406, the one or moreprocessors of the network protection device responsible for processingpackets may cache any unprocessed packets. For example, each ofprocessors 300, 302, and 304 may respectively cache any unprocessedpackets in caches 306, 308, and 310. At step 408, the one or moreprocessors of the network protection device responsible for processingpackets may be reconfigured to process packets in accordance with thesecond rule set. For example, each of processors 300, 302, and 304 maybe reconfigured to process packets in accordance with policy 132's ruleset. At step 410, the one or more processors of the network protectiondevice responsible for processing packets may signal completion of thereconfiguration process. For example, each of processors 300, 302, and304 may signal completion of their respective reconfiguration processes.At step 412, the one or more processors of the network protection deviceresponsible for processing packets may process any cached unprocessedpackets in accordance with the second rule set. For example, each ofprocessors 300, 302, and 304 may respectively process any unprocessedpackets previously cached in caches 306, 308, and 310 in accordance withpolicy 132's rule set. At step 414, additional packets may be processedin accordance with the second rule set. For example, each of processors300, 302, and 304 may process additional packets received from network104 in accordance with policy 132's rule set.

The functions and steps described herein may be embodied incomputer-usable data or computer-executable instructions, such as in oneor more program modules, executed by one or more computers or otherdevices to perform one or more functions described herein. Generally,program modules include routines, programs, objects, components, datastructures, etc. that perform particular tasks or implement particularabstract data types when executed by one or more processors in acomputer or other data processing device. The computer-executableinstructions may be stored on a computer-readable medium such as a harddisk, optical disk, removable storage media, solid state memory, RAM,etc. As will be appreciated, the functionality of the program modulesmay be combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Although not required, one of ordinary skill in the art will appreciatethat various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, etc.).

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof.

Numerous other embodiments, modifications, and variations within thescope and spirit of the appended claims will occur to persons ofordinary skill in the art from a review of this disclosure. For example,one of ordinary skill in the art will appreciate that the stepsillustrated in the illustrative figures may be performed in other thanthe recited order, and that one or more steps illustrated may beoptional.

What is claimed is:
 1. A method comprising: receiving, by a packetfiltering device, a first set of packet filtering rules; configuring thepacket filtering device to process packets in accordance with the firstset of packet filtering rules; receiving, by the packet filteringdevice, a plurality of packets after configuring the packet filteringdevice to process packets in accordance with the first set of packetfiltering rules; processing, by the packet filtering device, a firstportion of the plurality of packets in accordance with the first set ofpacket filtering rules; receiving, by the packet filtering device, asecond set of packet filtering rules; based on a signal to processpackets in accordance with the second set of packet filtering rules:ceasing processing, by the packet filtering device, of the plurality ofpackets; temporarily storing, by the packet filtering device, anunprocessed second portion of the plurality of packets; reconfiguringthe packet filtering device to process packets in accordance with thesecond set of packet filtering rules; and after completion of thereconfiguring of the packet filtering device to process packets inaccordance with the second set of packet filtering rules, processing, bythe packet filtering device, the temporarily stored, unprocessed secondportion of the plurality of packets in accordance with the second set ofpacket filtering rules.
 2. The method of claim 1, further comprising:receiving a message invoking the second set of packet filtering rules,wherein the signal to process packets in accordance with the second setof packet filtering rules is based on the packet filtering devicereceiving the message.
 3. The method of claim 1, further comprising:detecting one or more network conditions indicating an attack, whereinthe signal to process packets in accordance with the second set ofpacket filtering rules is based on detecting the one or more networkconditions.
 4. The method of claim 1, further comprising: modifying, bythe packet filtering device, the first set of packet filtering rules,wherein modifying the first set of packet filtering rules comprises atleast one of: merging a first rule and a second rule into a single rule;separating a third rule into a fourth rule and a fifth rule; orreordering one or more rules in the first set of packet filtering rules.5. The method of claim 1, further comprising: modifying, by the packetfiltering device, the second set of packet filtering rules, whereinmodifying the second set of packet filtering rules comprises at leastone of: merging a first rule and a second rule into a single rule;separating a third rule into a plurality of rules; or reordering one ormore rules in the second set of packet filtering rules.
 6. The method ofclaim 1, further comprising: storing, by the packet filtering device,the first set of packet filtering rules and the second set of packetfiltering rules in a memory buffer; and adjusting, by the packetfiltering device, a size of the memory buffer based on at least one of asize of the first set of packet filtering rules and a size of the secondset of packet filtering rules.
 7. The method of claim 1, wherein thesecond set of packet filtering rules is received after processing thefirst portion of the plurality of packets in accordance with the firstset of packet filtering rules.
 8. The method of claim 1, wherein thesecond set of packet filtering rules are received before processing ofthe first portion of the plurality of packets in accordance with thefirst set of packet filtering rules.
 9. The method of claim 1, furthercomprising: receiving, by the packet filtering device, a secondplurality of packets after configuring the packet filtering device toprocess packets in accordance with the second set of packet filteringrules; and processing, by the packet filtering device, a first portionof the second plurality of packets in accordance with the second set ofpacket filtering rules.
 10. A packet filtering device comprising: one ormore processors; and memory comprising instructions that, when executedby the one or more processors, cause the packet filtering device to:receive a first set of packet filtering rules; configure the packetfiltering device to process packets in accordance with the first set ofpacket filtering rules; receive a plurality of packets after configuringthe packet filtering device to process packets in accordance with thefirst set of packet filtering rules; process a first portion of theplurality of packets in accordance with the first set of packetfiltering rules; receive a second set of packet filtering rules; andbased on a signal to process packets in accordance with the second setof packet filtering rules: cease processing of the plurality of packets;temporarily store an unprocessed second portion of the plurality ofpackets; reconfigure the packet filtering device to process packets inaccordance with the second set of packet filtering rules; and aftercompletion of the reconfiguring of the packet filtering device toprocess packets in accordance with the second set of packet filteringrules, process the temporarily stored, unprocessed second portion of theplurality of packets in accordance with the second set of packetfiltering rules.
 11. The packet filtering device of claim 10, whereinthe instructions, when executed by the one or more processors, cause thepacket filtering device to: receive a message invoking the second set ofpacket filtering rules, wherein the signal to process packets inaccordance with the second set of packet filtering rules is based onreceiving the message.
 12. The packet filtering device of claim 10,wherein the instructions, when executed by the one or more processors,cause the packet filtering device to: detect one or more networkconditions indicating an attack, wherein the signal to process packetsin accordance with the second set of packet filtering rules is based ondetecting the one or more network conditions.
 13. The packet filteringdevice of claim 10, wherein the instructions, when executed by the oneor more processors, cause the packet filtering device to: modify thefirst set of packet filtering rules, wherein modifying the first set ofpacket filtering rules comprises at least one of: merging a first ruleand a second rule into a single rule; separating a third rule into aplurality of rules; or reordering one or more rules in the first set ofpacket filtering rules.
 14. The packet filtering device of claim 10,wherein the instructions, when executed by the one or more processors,cause the packet filtering device to: modify the second set of packetfiltering rules, wherein modifying the second set of packet filteringrules comprises at least one of: merging a first rule and a second ruleinto a single rule; separating a third rule into a fourth rule and afifth rule; or reordering one or more rules in the second set of packetfiltering rules.
 15. The packet filtering device of claim 10, whereinthe instructions, when executed by the one or more processors, cause thepacket filtering device to: store the first set of packet filteringrules and the second set of packet filtering rules in a memory buffer;and adjust a size of the memory buffer based on at least one of a sizeof the first set of packet filtering rules and a size of the second setof packet filtering rules.
 16. The packet filtering device of claim 10,wherein the second set of packet filtering rules is received afterprocessing the first portion of the plurality of packets in accordancewith the first set of packet filtering rules.
 17. The packet filteringdevice of claim 10, wherein the second set of packet filtering rules arereceived before processing of the first portion of the plurality ofpackets in accordance with the first set of packet filtering rules. 18.The packet filtering device of claim 10, wherein the instructions, whenexecuted by the one or more processors, cause the packet filteringdevice to: receive a second plurality of packets after configuring thepacket filtering device to process packets in accordance with the secondset of packet filtering rules; and process a first portion of the secondplurality of packets in accordance with the second set of packetfiltering rules.
 19. One or more non-transitory computer-readable mediacomprising instructions that, when executed, cause a packet filteringdevice to: receive a first set of packet filtering rules; configure thepacket filtering device to process packets in accordance with the firstset of packet filtering rules; receive a plurality of packets afterconfiguring the packet filtering device to process packets in accordancewith the first set of packet filtering rules; process a first portion ofthe plurality of packets in accordance with the first set of packetfiltering rules; receive a second set of packet filtering rules; basedon a signal to process packets in accordance with the second set ofpacket filtering rules: cease processing of the plurality of packets;temporarily store an unprocessed second portion of the plurality ofpackets; reconfigure the packet filtering device to process packets inaccordance with the second set of packet filtering rules; and aftercompleting reconfiguration of the packet filtering device to processpackets in accordance with the second set of packet filtering rules,process the temporarily stored, unprocessed second portion of theplurality of packets in accordance with the second set of packetfiltering rules.
 20. The one or more non-transitory computer-readablemedia of claim 19, wherein the instructions, when executed, cause thepacket filtering device to: receive a message invoking the second set ofpacket filtering rules, wherein the signal to process packets inaccordance with the second set of packet filtering rules is based onreceiving the message invoking the second set of packet filtering rules.21. The one or more non-transitory computer-readable media of claim 19,wherein the instructions, when executed, cause the packet filteringdevice to: detect one or more network conditions indicating an attack,wherein the signal to process packets in accordance with the second setof packet filtering rules is based on detecting one or more networkconditions indicating an attack.
 22. The one or more non-transitorycomputer-readable media of claim 19, wherein the instructions, whenexecuted, cause the packet filtering device to: modify the first set ofpacket filtering rules, wherein modifying the first set of packetfiltering rules comprises at least one of: merging a first rule and asecond rule into a single rule; separating a third rule into a fourthrule and a fifth rule; or reordering one or more rules in the first setof packet filtering rules.
 23. The one or more non-transitorycomputer-readable media of claim 19, wherein the instructions, whenexecuted, cause the packet filtering device to: modify the second set ofpacket filtering rules, wherein modifying the second set of packetfiltering rules comprises at least one of: merging a first rule and asecond rule into a single rule; separating a third rule into a pluralityof rules; or reordering one or more rules in the second set of packetfiltering rules.
 24. The one or more non-transitory computer-readablemedia of claim 19, wherein the instructions, when executed, cause thepacket filtering device to: store the first set of packet filteringrules and the second set of packet filtering rules in a memory buffer;and adjust a size of the memory buffer based on at least one of a sizeof the first set of packet filtering rules and a size of the second setof packet filtering rules.
 25. The one or more non-transitorycomputer-readable media of claim 19, wherein the second set of packetfiltering rules is received after processing the first portion of theplurality of packets in accordance with the first set of packetfiltering rules.
 26. The one or more non-transitory computer-readablemedia of claim 19, wherein the second set of packet filtering rules arereceived before processing of the first portion of the plurality ofpackets in accordance with the first set of packet filtering rules. 27.The one or more non-transitory computer-readable media of claim 19,wherein the instructions, when executed, cause the packet filteringdevice to: receive a second plurality of packets after configuring thepacket filtering device to process packets in accordance with the secondset of packet filtering rules; and process a first portion of the secondplurality of packets in accordance with the second set of packetfiltering rules.