WO2005010777A1 - Internet protocol security matching values in an associative memory - Google Patents

Internet protocol security matching values in an associative memory Download PDF

Info

Publication number
WO2005010777A1
WO2005010777A1 PCT/US2004/016475 US2004016475W WO2005010777A1 WO 2005010777 A1 WO2005010777 A1 WO 2005010777A1 US 2004016475 W US2004016475 W US 2004016475W WO 2005010777 A1 WO2005010777 A1 WO 2005010777A1
Authority
WO
WIPO (PCT)
Prior art keywords
associative memory
entries
internet protocol
elements
protocol security
Prior art date
Application number
PCT/US2004/016475
Other languages
French (fr)
Inventor
Thomas Jeffrey Enderwick
Henry Kin-Chuen Kwok
Ashwath Nagaraj
Original Assignee
Cisco Technology, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology, Inc. filed Critical Cisco Technology, Inc.
Priority to EP04753320.3A priority Critical patent/EP1649389B1/en
Priority to AU2004260370A priority patent/AU2004260370A1/en
Priority to CA2521470A priority patent/CA2521470C/en
Publication of WO2005010777A1 publication Critical patent/WO2005010777A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • H04L45/7453Address table lookup; Address filtering using hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • One embodiment of the invention especially relates to communications and computer systems; and more particularly, one embodiment relates to storing and searching a hierarchy of items which may be particularly useful for implementing security policies and security associations, such as, but not limited to Internet Protocol security (IPsec) in routers, packet switching systems, computers, and/or other devices.
  • IPsec Internet Protocol security
  • IP Internet Protocol
  • S. KENT and R. ATKINSON Security Architecture for IP
  • RFC 2401 September 1998, which is hereby incorporated by reference.
  • An IPsec implementation operates in a host or a security gateway environment, affording protection to IP traffic.
  • the protection offered is based on requirements defined by a Security Policy Database (SPD) established and maintained by a user or system administrator, or by an application operating within constraints established by either of the above.
  • SPD Security Policy Database
  • packets are selected for one of three processing modes based on IP and transport layer header information matched against entries in the database. Each packet is either afforded IPsec security services, discarded, or allowed to bypass IPsec, based on the applicable database policies.
  • IPsec provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithm(s) to use for the service(s), and put in place any cryptographic keys required to provide the requested services.
  • IPsec can be used to protect one or more "paths" between a pair of hosts, between a pair of security gateways, or between a security gateway and a host.
  • the set of security services that IPsec can provide includes access control, connectionless integrity, data origin authentication, rejection of replayed packets (a form of partial sequence integrity), confidentiality (encryption), and limited traffic flow confidentiality. Because these services are provided at the IP layer, they can be used by any higher layer protocol, e.g., TCP, UDP, ICMP, BGP, etc.
  • IPsec packet classification is specified as a two layer hierarchy: the relevant security policy (SP) must be found first out of an ordered list of SPs, and then within the context of the located SP, the correct security association (SA) must be found.
  • SP relevant security policy
  • SA security association
  • a security association is a simplex "connection" that affords security services to the traffic carried by it.
  • two security associations (one in each direction) are required.
  • a security association is uniquely identified by a triple consisting of a Security Parameter Index (SPI), an IP Destination Address, and a security protocol identifier.
  • SPI Security Parameter Index
  • IP Destination Address IP Destination Address
  • security protocol identifier a security protocol identifier that specifies IP Services
  • the destination address may be a unicast address, an IP broadcast address, or a multicast group address.
  • the set of security services offered by an SA depends on the security protocol selected, the SA mode, the endpoints of the SA, and on the election of optional services within the protocol. For example, one security protocol provides data origin authentication and connectionless integrity for IP datagrams.
  • IP datagrams transmitted over an individual S A are afforded protection by exactly one security protocol.
  • a security policy may call for a combination of services for a particular traffic flow that is not achievable with a single S A. hi such instances it will be necessary to employ multiple SAs to implement the required security policy.
  • the term "security association bundle” or "SA bundle” is applied to a sequence of SAs through which traffic must be processed to satisfy a security policy. The order of the sequence is defined by the policy. (Note that the SAs that comprise a bundle may terminate at different endpoints.
  • RFC 2401 defines that there are two nominal databases in the IPsec general model, with these two databases being the security policy database (SPD) and the security association database (SAD).
  • SPD security policy database
  • SAD security association database
  • the former specifies the policies that determine the disposition of all IP traffic inbound or outbound from a host, security gateway, or BITS or BITW IPsec implementation.
  • the latter database contains parameters that are associated with each (active) security association.
  • This section also defines the concept of a selector, a set of IP and upper layer protocol field values that is used by the security policy database to map traffic to a policy, i.e., an SA (or SA bundle).
  • Each interface for which IPsec is enabled requires nominally separate inbound vs. outbound databases (SAD and SPD), because of the directionality of many of the fields that are used as selectors.
  • SAD and SPD inbound vs. outbound databases
  • SG security gateway
  • an SG would always have at least two interfaces, but the "internal" one to the corporate net, usually would not have IPsec enabled and so only one pair of S ADs and one pair of SPDs would be needed.
  • a host had multiple interfaces or an SG had multiple external interfaces, it might be necessary to have separate SAD and SPD pairs for each interface.
  • a security association is a management construct used to enforce a security policy in the IPsec environment.
  • SPD Security Policy Database
  • RFC 2401 does specify certain minimum management functionality that must be provided, to allow a user or system administrator to control how IPsec is applied to traffic transmitted or received by a host or transiting a security gateway.
  • the SPD must be consulted during the processing of all traffic (inbound and outbound), including non IPsec traffic. In order to support this, the SPD requires distinct entries for inbound and outbound traffic.
  • the SPD contains an ordered list of policy entries. Each policy entry is keyed by one or more selectors that define the set of IP traffic encompassed by this policy entry.
  • a SPD must discriminate among traffic that is afforded IPsec protection and traffic that is allowed to bypass IPsec. This applies to the IPsec protection to be applied by a sender and to the IPsec protection that must be present at the receiver.
  • IPsec IPsec
  • three processing choices are possible: discard, bypass IPsec, or apply IPsec.
  • the first choice refers to traffic that is not allowed to exit the host, traverse the security gateway, or be delivered to an application at all.
  • the second choice refers to traffic that is allowed to pass without additional IPsec protection.
  • each IPsec implementation there is a nominal security association database, in which each entry defines the parameters associated with one SA.
  • Each SA has an entry in the SAD.
  • entries are pointed to by entries in the SPD. Note that if an SPD entry does not currently point to an S A that is appropriate for the packet, the implementation creates an appropriate S A (or S A Bundle) and links the SPD entry to the SAD entry.
  • S A S A Bundle
  • each entry in the SAD is indexed by a destination IP address, IP sec protocol type, and SPI. The following parameters are associated with each entry in the SAD.
  • FIG. 1 illustrates a prior art implementation based on RFC 2401 for processing an outbound packet. Processing begins with process block 100, and proceeds to process block 102, wherein a database lookup operation is performed in the security policy database based on the packet to identify the corresponding security policy. If no policy is found as determined in process block 104, then the packet is dropped in process block 106, and processing is complete as indicated by process block 108. Otherwise, in process block 110, a second lookup operation is performed based on the packet, this time in the security association database corresponding to the security policy identified in the previous lookup operation.
  • RFC 2401 defines a two step process for performing lookup operations to in order to identify a SA associated with a packet, i.e., by first performing a lookup in a security policy database and then, performing a subsequent second lookup operation based on the identified security policy to identify the corresponding security association). Especially as packet rates and then number of packets to be processed by a packet processor increases, this two stage lookup process can be limiting. Desired is a new way of performing IPsec identification operations.
  • IPsec Internet Protocol security
  • One embodiment stores a hierarchy of items in a search priority order. Multiple element definitions and groups of elements are identified. Representations of the element definitions and elements are stored in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements.
  • the element definitions include Internet Protocol security policies and the elements include Internet Protocol security associations.
  • the searchable data structure includes an associative memory or a plurality of associative memory entries.
  • an element definition or element corresponding to a range of values is split into multiple entries.
  • the hierarchy includes more than two levels, and the element definitions and groups of elements are just two of the more than two levels.
  • Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories.
  • Corresponding context memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more context memories.
  • An associative memory lookup operation is performed on the ordered associative memory entries based on a received packet to identify a particular associative memory entry location.
  • a lookup operation is performed on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies.
  • a particular security association entry based on the received packet is added to the ordered associative memory entries, the particular security association entry corresponding to the particular Internet Protocol security policy, and the particular security association entry being added to the ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of the ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
  • FIG. 1 illustrates a prior art implementation of IPsec
  • FIG. 2A is a block diagram illustrating one embodiment for storing and searching a hierarchy of items
  • FIG. 2 B is a block diagram illustrating one embodiment for storing and searching a hierarchy of items
  • FIG. 3 A is a block diagram illustrating a prioritized searchable data structure used in one embodiment
  • FIG. 3B is a block diagram illustrating a prioritized searchable data structure used in one embodiment
  • FIG. 1 illustrates a prior art implementation of IPsec
  • FIG. 2A is a block diagram illustrating one embodiment for storing and searching a hierarchy of items
  • FIG. 2 B is a block diagram illustrating one embodiment for storing and searching a hierarchy of items
  • FIG. 3 A is a block diagram illustrating a prioritized searchable data structure used in one embodiment
  • FIG. 3B is a block diagram illustrating a prioritized searchable data structure used in one embodiment
  • FIG. 1 illustrates a prior art implementation of IPsec
  • FIG. 2A is a block diagram
  • FIG. 3C is a block diagram illustrating a prioritized searchable data structure used in one embodiment
  • FIG. 4 is a block diagram illustrating one embodiment for storing and searching a hierarchy of items of particular use with IPsec
  • FIG. 5A illustrates associative memory entries used in one embodiment
  • FIG. 5B illustrates a process used in one embodiment for generating multiple associative memory entries for a corresponding range of values
  • FIG. 6A illustrates a process used in one embodiment for processing an inbound packet
  • FIG. 6B illustrates a process used in one embodiment for processing an outbound packet
  • FIG. 7 illustrates a process used in one embodiment for adding an entry to an ordered list of associative memory entries
  • some embodiments described may include, but are not limited to, inter alia, systems, networks, integrated circuit chips, embedded processors, ASICs, methods, and computer-readable medium containing instructions.
  • One or multiple systems, devices, components, etc. may comprise one or more embodiments. That may include some elements or limitations of a claim maybe performed by the same or different systems, devices, components, etc.
  • the embodiments described hereinafter embody various aspects and configurations within the scope and spirit of the invention, with the figures illustrating exemplary and non-limiting configurations.
  • packet refers to packets of all types or any other units of information or data, including, but not limited to, fixed length cells and variable length packets, each of which may or may not be divisible into smaller packets or cells.
  • packet as used herein also refers to both the packet itself or a packet indication, such as, but not limited to all or part of a packet or packet header, a data structure value, pointer or index, or any other part or identification of a packet. Moreover, these packets may contain one or more types of information, including, but not limited to, voice, data, video, and audio information.
  • item is used generically herein to refer to a packet or any other unit or piece of information or data, a device, component, element, or any other entity.
  • processing a packet typically refers to performing some steps or actions based on the packet contents (e.g., packet header or other fields), and such steps or action may or may not include modifying, storing, dropping, and/or forwarding the packet and/or associated data.
  • system is used generically herein to describe any number of components, elements, sub-systems, devices, packet switch elements, packet switches, routers, networks, computer and/or communication devices or mechanisms, or combinations of components thereof.
  • computer is used generically herein to describe any number of computers, including, but not limited to personal computers, embedded processing elements and systems, control logic, ASICs, chips, workstations, mainframes, etc.
  • processing element is used generically herein to describe any type of processing mechanism or device, such as a processor, ASIC, field programmable gate array, computer, etc.
  • device is used generically herein to describe any type of mechanism, including a computer or system or component thereof.
  • task and “process” are used generically herein to describe any type of running program, including, but not limited to a computer process, task, thread, executing application, operating system, user process, device driver, native code, machine or other language, etc., and can be interactive and/or non-interactive, executing locally and/or remotely, executing in foreground and/or background, executing in the user and/or operating system address spaces, a routine of a library and/or standalone application, and is not limited to any particular memory partitioning technique.
  • network and “communications mechanism” are used generically herein to describe one or more networks, communications mediums or communications systems, including, but not limited to the Internet, private or public telephone, cellular, wireless, satellite, cable, local area, metropolitan area and/or wide area networks, a cable, electrical connection, bus, etc., and internal communications mechanisms such as message passing, interprocess communications, shared memory, etc.
  • messages is used generically herein to describe a piece of information which may or may not be, but is typically communicated via one or more communication mechanisms of any type.
  • storage mechanism includes any type of memory, storage device or other mechanism for maintaining instructions or data in any format.
  • Computer-readable medium is an extensible term including any memory, storage device, storage mechanism, and other storage and signaling mechanisms including interfaces and devices such as network interface cards and buffers therein, as well as any communications devices and signals received and transmitted, and other current and evolving technologies that a computerized system can interpret, receive, and/or transmit.
  • memory includes any random access memory (RAM), read only memory (ROM), flash memory, integrated circuits, and/or other memory components or elements.
  • storage device includes any solid state storage media, disk drives, diskettes, networked services, tape drives, and other storage devices.
  • Memories and storage devices may store computer-executable instructions to be executed by a processing element and/or control logic, and data which is manipulated by a processing element and/or control logic.
  • data structure is an extensible term referring to any data element, variable, data structure, database, and/or one or more organizational schemes that can be applied to data to facilitate interpreting the data or performing operations on it, such as, but not limited to memory locations or devices, sets, queues, trees, heaps, lists, linked lists, arrays, tables, pointers, etc.
  • a data structure is typically maintained in a storage mechanism.
  • pointer and link are used generically herein to identify some mechanism for referencing or identifying another element, component, or other entity, and these may include, but are not limited to a reference to a memory or other storage mechanism or location therein, an index in a data structure, a value, etc.
  • the term "one embodiment” is used herein to reference a particular embodiment, wherein each reference to “one embodiment” may refer to a different embodiment, and the use of the term repeatedly herein in describing associated features, elements and/or limitations does not establish a cumulative set of associated features, elements and/or limitations that each and every embodiment must include, although an embodiment typically may include all these features, elements and/or limitations.
  • the phrase "means for xxx” typically includes computer-readable medium containing computer-executable instructions for performing xxx.
  • the terms "first,” “second,” etc. are typically used herein to denote different units (e.g., a first element, a second element). The use of these terms herein does not necessarily connote an ordering such as one unit or event occurring or coming before another, but rather provides a mechanism to distinguish between particular units.
  • a singular tense of a noun is non-limiting, with its use typically including one or more of the particular thing rather than just one (e.g., the use of the word "memory” typically refers to one or more memories without having to specify “memory or memories,” or “one or more memories” or “at least one memory”, etc.).
  • the phrases “based on x” and “in response to x” are used to indicate a minimum set of items x from which something is derived or caused, wherein "x" is extensible and does not necessarily describe a complete list of items on which the operation is performed, etc.
  • Coupled to is used to indicate some level of direct or indirect connection between two elements or devices, with the coupling device or devices modifying or not modifying the coupled signal or communicated information.
  • subset is used to indicate a group of all or less than all of the elements of a set.
  • subtree is used to indicate all or less than all of a tree.
  • or is used herein to identify a selection of one or more, including alb of the conjunctive items.
  • IPsec Internet Protocol security
  • One embodiment stores a hierarchy of items in a search priority order. Multiple element definitions and groups of elements are identified. Representations of the element definitions and elements are stored in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements.
  • the element definitions include Internet Protocol security policies and the elements include Internet Protocol security associations.
  • the searchable data structure includes an associative memory or a plurality of associative memory entries.
  • an element definition or element corresponding to a range of values is split into multiple entries.
  • the hierarchy includes more than two levels, and the element definitions and groups of elements are just two of the more than two levels.
  • One embodiment maintains a data structure for an identified ordered list of Internet Protocol security policies. Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories. Corresponding context memory entries associated with the ordered list of internet Protocol security policies are programmed into one or more context memories.
  • An associative memory lookup operation is performed on the ordered associative memory entries based on a received packet to identify a particular associative memory entry location.
  • a lookup operation is performed on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies.
  • a particular security association entry based on the received packet is added to the ordered associative memory entries, the particular security association entry corresponding to the particular Internet Protocol security policy, and the particular security association entry being added to the ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of the ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
  • FIG. 2A is a block diagram illustrating one embodiment for storing and searching a hierarchy of items.
  • Programming mechanism 200 (e.g., a packet processor, scheduler, processing element, ASIC, circuib or any other mechanism) generates and programs the hierarchy of entries in one or more associative memories 201 and one or more context memories 202.
  • the number of levels of hierarchy can vary among embodiments, or upon applications thereof. For example, in the context of IPsec, there are two levels (i.e., security policies and security associations). For example, in the context of computer scheduling or processing units, one embodiment uses two levels (e.g., processes and threads within processes). One embodiment, uses three levels (e.g., applications, processes, and threads).
  • the types and number of applications and levels of hierarchy supported is extensible, and these are just a few examples of an unlimited number supported by embodiments.
  • Lookup word generation mechanism 210 (e.g., a packet processor, scheduler, processing element, ASIC, circuib or any other mechanism) generates a lookup value 211 for the context in which the embodiment is operating.
  • Associative memory 201 performs a lookup operation based on lookup value 211 to identify matching location result 212.
  • matching location/lookup result 212 is used.
  • a lookup operation is performed in context memory 202 based on matching location result 212 to generate lookup result 213.
  • FIG. 2 B is a block diagram illustrating one embodiment for storing and searching a hierarchy of items.
  • System 240 includes a prioritized searchable data structure programmed with a hierarchy of entries.
  • System 240 typically includes mechanisms and means for storing and searching a hierarchy of items. For example, one embodiment includes a process corresponding to one of the block or flow diagrams illustrated herein, or corresponding to any other means or mechanism implementing all or part of a claim with other internal or external components or devices possibly implementing other elements/limitations of a claim. Additionally, a single or multiple systems, devices, components, etc. may comprise an embodiment.
  • system 240 includes a processing element 241, memory 242, storage devices 243, one or more associative memories 244 and an interface 245 for receiving and transmitting packets or other items, which are coupled via one or more communications mechanisms 249 (shown as a bus for illustrative purposes).
  • Various embodiments of system 240 may include more or less elements.
  • one embodiment does not include an associative memory; rather, the prioritized searchable data structure is stored in memory 242, in storage devices 243, and/or external to system 240, etc.
  • the operation of system 240 is typically controlled by processing element 241 using memory 242 and storage devices 243 to perform one or more tasks or processes, such as, but not limited to storing and searching a hierarchy of items.
  • Memory 242 is one type of computer-readable medium, and typically comprises random access memory (RAM), read only memory (ROM), flash memory, integrated circuits, and/or other memory components.
  • RAM random access memory
  • ROM read only memory
  • flash memory integrated circuits, and/or other memory components.
  • Memory 242 typically stores computer-executable instructions to be executed by processing element 241 and/or data which is manipulated by processing element 241 for implementing functionality in accordance with one embodiment of the invention.
  • Storage devices 243 are another type of computer-readable medium, and typically comprise solid state storage media, disk drives, diskettes, networked services, tape drives, and other storage devices. Storage devices 243 typically store computer-executable instructions to be executed by processing element 241 and/or data which is manipulated by processing element 241 for implementing functionality in accordance with one embodiment of the invention.
  • FIG. 3 A is a block diagram illustrating a prioritized searchable data structure 300 used in one embodiment.
  • data structure 300 is stored in one or more associative memories (with or without corresponding context memories).
  • data structure 300 is stored in one or more other memories and/or storage devices.
  • data structure 300 includes multiple entries 301-309, with the prioritized search order as indicated.
  • the first group of one or more elements 301 is stored before the corresponding first element definition 302.
  • a second group of one or more elements 303 is stored before the corresponding second element definition 304, and so on as indicated by the representation of n partitions of elements and their corresponding definitions.
  • stored in data structure 300 are representations of element definitions and elements in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements.
  • FIG. 3B is a block diagram illustrating a prioritized searchable data structure 310 used in one embodiment.
  • data structure 310 is stored in one or more associative memories (with or without corresponding context memories).
  • data structure 310 is stored in one or more other memories and/or storage devices. As shown, data structure 310 includes multiple entries 311-319, with the prioritized search order as indicated.
  • the first group of one or more security associations 311 is stored before the corresponding first security policy definition 312.
  • a second group of one or more security associations 313 is stored before the corresponding second security policy definition 314, and so on as indicated by the representation of m partitions of security associations and their corresponding security policy definitions.
  • stored in data structure 310 are representations of security policies and security associations in a prioritized searchable data structure in decreasing search priority such that representations of each particular security policy is stored after representations of a set of particular security associations associated with the particular security policy and before representations of lower priority security policies and their associated security associations.
  • FIG. 3C is a block diagram illustrating a prioritized searchable data structure 330 used in one embodiment.
  • data structure 330 is stored in one or more associative memories (with or without corresponding context memories). In one embodiment, data structure 330 is stored in one or more other memories and/or storage devices. Note, in one embodiment, the ordering of the items within each of the hierarchy level groups 331-336 matter; while, in one embodiment, the ordering of the items within at least one of the hierarchy level groups 331-336 does not matter. As shown, data structure 300 includes N hierarchy levels to emphasize that one embodiment supports two or more levels of hierarchy, with the prioritized search order as indicated. Within a particular hierarchy level, there may be the same or different number of groups.
  • hierarchy level 1 includes /groups of entries in a prioritized search order
  • hierarchy level 2 includes K groups of entries in a prioritized search order
  • hierarchy level N includes E groups of entries in a prioritized search order.
  • the values of J, K, and E are different. While in one embodiment, at two of the values of J, K, and E are the same.
  • element definitions and groups of elements maybe programmed in any of the groups 331- 336 as long as the required hierarchy corresponding to the desired search order is maintained.
  • the element definitions are always in the lowest priority group 332, 334, and 336 within each of the hierarchy levels.
  • the elements are always in the highest search priority groups 331, 333 and 335, while the other groups included multiple levels of element definitions.
  • groups 331-336 only include element definitions.
  • groups 331-336 only include elements (and/or representations of any other items).
  • the hierarchy levels and groups illustrated in FIG. 3C are used in one embodiment to store N hierarchy levels of groups entries for classifying animals. Each hierarchy level could include groups of (1) species, (2) genus, (3) family, (4) order, (5) class, (6) phylum, and (7) kingdom, in the search order of one to seven. Thus, when a search is performed, the species will be identified if it is known.
  • FIG. 4 is a block diagram illustrating one embodiment for storing and searching a hierarchy of items of particular use with IPsec and using one or more ternary content addressable memories depicted as TCAM 424.
  • TCAM 424 another type of associative memory is used.
  • FIG. 4 uses the specific label of TCAM, another type of the extensible types of associative memories (e.g., CAM) is used in one embodiment.
  • TCAM manager 422 programs and updates TCAM 424 and context memories within inbound security processor with context memory 402 and within outbound security processor with context memory 442.
  • TCAM manager 422 uses memory 421 which stores security policy and associations database in programming one or more associative memories 424 and corresponding context memories.
  • inbound security processor 402 only performs a lookup operation in TCAM for clear-packet SP searches as indicated by RFC 2401 ; while in one embodiment, a different search mechanism is employed as the architecture depicted in FIG. 4 is extensible to meet the needs of a particular application. Note, in one embodiment, the contents of a particular database may be replicated in order to optimize lookup (e.g., for inbound and for outbound packets) and/or update actions.
  • inbound security processor 402 receives inbound packets 411 and generates lookup requests included in updates and lookup requests 412. TCAM manager 422, either immediately or after storing a lookup request, generates the appropriate lookup word if not already provided by inbound security processor 402. This lookup word is communicated in programming and lookup requests 423 to TCAM 424, which performs the associative memory lookup operation to generate lookup result 413, which is used to perform a lookup operation in the context memory within inbound security processor 402.
  • the context memory within inbound security processor 402 includes an array of pointers/indices indexed by the TCAM match address included in lookup results 413. Inbound security processor 402 use the pointer/index from that array to locate the SPD entry.
  • inbound security processor 402 uses the TCAM match location as an index into an array of SP entries in the context memory, with one or more entries possibly pointing to the same SP in memory 401 storing a copy of the SP database (SPD).
  • a context memory is not used. Rather, the SPD maintained in memory 401 is indexed directly by the TCAM match index, with duplicate SPs in the array, and null entries (or other indications) for indices that do not refer to SPs.
  • the SPD stored in memory 401 is maintained as an array of bytes. Each byte corresponds to the TCAM entry with the same index and contains the desired action when a clear packet is matched to its associated TCAM entry.
  • the allowed actions include: to drop, to pass, and to secure. If the action is to secure the packet, a SA tunnel will be set up.
  • TCAM manager 422 When an SP is set up, TCAM manager 422 must initiate the corresponding SP in the SPD.
  • such an update request 412 is communicated to the inbound security processor 402, which updates memory 401.
  • One embodiment includes a security association database (SAD) stored in memory 403.
  • the SAD is implemented as an array indexed by the security policy index (SPI). hi one embodiment, the seventeen least significant bits of the SPI are used; while in one embodiment, another set of bytes are used.
  • TCAM manager 422 also sets up these SA entries when they are inserted.
  • output bound security processor 442 uses TCAM 424 for matching both security policies and service associations.
  • Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories 424 and corresponding context memory entries are programmed in the context memory of outbound security processor 442.
  • the hierarchy of security policies and security associations are stored in TCAM 424 such that security association entries corresponding to a particular security policy are stored before the particular security policy, and security policies are stored in their prioritized order.
  • security associations associated with a security policy are stored after entries corresponding to all higher priority security policies (and their respective security associations); while in one embodiment, this ordering is not required.
  • a single lookup operation in TCAM 424 can be used to identify a security association corresponding to the highest priority security policy if one exists, otherwise the security policy itself will be identified.
  • an associative memory lookup operation is initiated by outbound security processor 442 based on a received outbound packet 431 to identify a particular associative memory entry location (e.g., included in lookup results 433).
  • a lookup operation is then performed in the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies or one of the security associations.
  • TCAM manager 432 adds a particular security association entry based on the received packet is added to the TCAM prior to the particular associative memory entry location identified during the lookup operation (i.e., the entry corresponding to the matching security policy) and after entries corresponding to security policy of higher priority.
  • the context memory in outbound security processor with context memory 442 includes pointers/indices to SPs and SAs (e.g., similar to the pointer array previously described herein).
  • outbound security processor 442 maintains a direct array of intermixed SPs and SAs indexed by TCAM match address.
  • the SP information includes a reference id, and information related to treatment on match: drop, pass, or initiate a tunnel.
  • the SA information contents requires multiple cache lines, which by including enough memory on outbound security processor 442 , the latter scheme can be used while avoiding the extra memory transaction per-packet. Additionally, one embodiment also includes a mechanism to determine when elements should be removed.
  • One embodiment includes outbound security processor 442 (which includes a context array that also serves as the SPD), a memory with security policy database 441 , and a memory with security association database (SAD) 443. hi one embodiment, two security association databases are used to enhance performance.
  • Outbound security processor 442 processes each outbound packet by first extracting the five selectors specified in RFC 2401, and then performing a search for a match in TCAM 424.
  • outbound security processor 442 indexes the context array using the index of the matched TCAM entry included in lookup results 433.
  • the context array entry indicates whether the TCAM match corresponds to a matching SA or SP. If it is a SP, the context array also consists of the appropriate action for packet matching that SA. If it is a SA, the context array contains the index into the SAD for the corresponding S A. There is only one data structure of outbound SA.
  • FIG. 5 A illustrates associative memory entries used in one embodiment.
  • TCAM entry 500 includes a source address field 501, a destination address field 502, a source port field 503, a destination port field 504, a protocol type field 505, a service indication field 506, an entry type field 507 to indicate whether the entry is a SA or SP entry, and an implementation specific field 508.
  • a source address field 501 e.g., a service policy
  • a source port field 503 e.g., a source port field 503
  • a protocol type field 505 e.g., a service indication field 506
  • an entry type field 507 to indicate whether the entry is a SA or SP entry
  • one embodiment sets the mask field to don't care in field 507 if the entry corresponds to a service policy because every search is performed on the SPD (e.g., on all SP entries). By not masking out the value when the entry corresponds to an SA, then either all entries can be searched or only SPs can be searched.
  • global mask register-0 510 has bits set to match in fields 511-516 and to ignore (i.e., don't card) in fields 517-518.
  • Global mask register- 1 520 has bits set to match in fields 521-527 and to ignore (i.e., don't card) in field 528.
  • a search will cause only SP entries to be searched.
  • FIG. 5B illustrates a process used in one embodiment for generating multiple associative memory entries for a corresponding range of values.
  • Some applications desire to match on a range of values (e.g., source port number 72-83).
  • the splitter is required to perform any required entry expansion. For example, implementing the destination port ranges ⁇ 25 and > 25 requires splitting a single entry into sixteen entries.
  • FIG. 5B illustrates pseudo code of a mechanism used in one embodiment to split entries into multiple entries. The splitter converts a SP specified in a range-set format into a SP specified in an expanded form using a collection of matching values and don't-care mask.
  • support a range of 1 to 15 becomes 4 sets of (matching values, don't care mask): (0x1, Oxe), (0x2,0xd), (0x4, Oxb), and (0x8, 0x7).
  • the TCAM entry d...d is checked to see if it matches a subset of the values covered by the range. If not, then the process is repeated with 0d...d and ld...d. This happens recursively (using the stacks - not function recursion). Branches are trimmed when the entry being tested matches a disjoint set of values. Entries are saved when they match a subset of the values matched by the range. Entries that match overlapping sets are split and pushed onto the work stack. FIG.
  • FIG. 6A illustrates a process used in one embodiment for processing an inbound packet. Processing begins with process block 600, and proceeds to process block 602, wherein a packet is received. As determined in process block 604, if the packet is marked as conforming to IPsec, then in process block 606 the packet is processed, and processing is completed as indicated by process block 619. Otherwise, in process block 610, a lookup word is generated based on the received packet (e.g., with fields in accordance to those stored in the associative memory or other implementations of the data structure). In process block 612, a lookup operation is initiated and performed in the associative memory using the lookup word and a global mask register such that only SP entries are searched.
  • FIG. 6B illustrates a process used in one embodiment for processing an outbound packet. Processing begins with process block 640, and proceeds to process block 642, wherein a packet is received. Next, in process block 644, a lookup word is generated based on the received packet. ). In process block 646, a lookup operation is initiated and performed in the associative memory using the lookup word and a global mask register such that both SP and S A entries are searched.
  • the lookup result is received and a lookup operation based on the result is performed in the context memory in process block 648.
  • the action to perform is identified in the SAD based on the lookup result retrieved from the context memory, and the packet is processed according to the identified action.
  • the packet is processed according to the action identified by the context memory; and in process block 662, a security access entry is added to the SAD and the associative and context memories are updated accordingly. Processing is complete as indicated by process block 669.
  • FIG. 7 illustrates a process used in one embodiment for adding an entry to an ordered list of associative memory entries.
  • Processing begins with process block 700, and proceeds to process block 702, wherein an associative memory or other prioritized searchable data structure update request is identified.
  • process block 704 the partition and possibly the exact location(s) to add one or more entries entry are identified.
  • process block 706 if there is space to add the one or more entries in the identified partition, then the entries are added in process block 712. Otherwise, space for the new entries is made (or attempted to be made) in process block 708.
  • process block 710 if this expansion of the partition was successful, then the then the entries are added in process block 712. Otherwise, there is no room for the entries and an error condition is generated. Processing is complete as indicated by process block 714. FIGs.
  • 8A-D and 9A-D illustrate processes used in one embodiment for expanding partitions and redistributing space allocated to partitions. Note, these processes may call each in a recursive or other fashion to expand/shrink partitions to redistribute the free space among partitions.
  • One embodiment attempts to maintain an even distribution of free space (or something approximating such) across all partitions to minimize the amount of adjusting to be performed in adding one or more entries to a partition.
  • a single insert of an element or element definition (which may include one or more associative memory entries) can be quickly performed and limits the worst-case insertion time, which is important for applications with high update rates.
  • FIG. 8A illustrates a process used in one embodiment to expand a partition. Processing begins with process block 800.
  • the partition to increase in size corresponds does not have a left neighboring partition, then as determined in process block 804, if the partition has a right neighboring partition, then leftward space is acquired from the neighboring right partition in process block 810. Otherwise, in process block 806, it has been identified as the only partition and the partition acquires the whole associative memory space available for use as the hierarchical database. Otherwise, it was determined in process block 802 that the partition has a left neighboring partition. As determined in process block 812, if the partition does not have a right neighboring partition, then in process block 814, rightward space of the left neighboring partition.
  • leftward space of left neighboring partition is acquired, hi process block 818, the space count for the partition is updated based on the acquired space.
  • process block 820 if enough space has been acquired, then processing proceeds to process block 808.
  • process block 822 rightward space of the right neighboring partition is acquired, and in process block 824, the space count for the partition is updated based on the acquired space.
  • process block 826 if enough space has been acquired, then processing proceeds to process block 808. Otherwise, in process block 828, leftward space of the left neighboring partition is acquired.
  • process block 830 if the partition to the left is starving (e.g., has less or significantly less free space the average free space across partitions), then in process block 832, rightward space of the right neighboring partition is acquired, and it is fed to the starving partition to the right in process block 834.
  • process block 836 if the partition to the right is starving (e.g., has less or significantly less free space the average free space across partitions), then in process block 838, leftward space of the left neighboring partition is acquired, and it is fed to the starving partition to the left in process block 840. Finally, the amount of space granted to the partition is returned in process block 808, and processing is complete as indicated by process block 849.
  • process block 8B illustrates a process used in one embodiment to get leftward space from a partition.
  • Processing begins with process block 850, and proceeds to process block 852, wherein the available space in the current partition is computed. As determined in process block 854, if there is extra space, then in process block 856, this partition is shrunk to free up space for other partition. Otherwise, in process block 858, the partition determines whether it is starving (e.g.,. needs more space) and updates its status accordingly. Next, as determined in process block 860, are there more partitions to the left to examine to get the needed space, then in process block 862, the partition to the left is selected and processing returns to process block 852. Otherwise, in process block 864, entries in the current partition are flushed/shifted to the left.
  • FIG. 8C illustrates a process used in one embodiment to get rightward space from a partition. Processing begins with process block 880, and proceeds to process block 882, wherein the available space in the current partition is computed.
  • process block 884 if there is extra space, then in process block 886, this partition is shrunk to free up space for other partition. Otherwise, in process block 887, the partition determines whether it is starving (e.g.,. needs more space) and updates its status accordingly. Next, as determined in process block 888, are there more partitions to the right to examine to get the needed space, then in process block 890, the partition to the right is selected, and processing returns to process block 882. Otherwise, in process block 892, entries in the current partition are flushed/shifted to the right, hi one embodiment, all the elements/SAs and definitions/SPs are moved tight against its neighbor so there is no free space in between them.
  • FIG. 9A illustrates a process used in one embodiment to feed a left starving partition. Processing begins with process block 900, and proceeds to process block 902, wherein the number of partitions to the left are counted. The integral and fractional values of the free space are computed in process block 904. The current partition is expanded by the integral amount in process block 906.
  • process block 912 If there is a fractional amount left for the current partition as determined in process block 908, then the current partition is expanded by one more entry and the fractional amount is decreased by one in process block 910. As detenriined in process block 912, if there is a left neighbor remaining, then in process block 914, the left neighbor partition is selected, and processing returns to process block 906.
  • FIG. 9B illustrates a process used in one embodiment to feed a right starving partition. Processing begins with process block 930, and proceeds to process block 932, wherein the number of partitions to the right are counted. The integral and fractional values of the free space are computed in process block 934. The current partition is expanded by the integral amount in process block 936. If there is a fractional amount left for the current partition as determined in process block 940, then the current partition is expanded by one more entry and the fractional amount is decreased by one in process block 942.
  • process block 944 if there is a right neighbor remaining, then in process block 946, the left neighbor partition is selected, and processing returns to process block 936. Otherwise, in process block 948, if there is any more remaining free space, it is given to the current partition. Processing is complete as indicated by process block 950.
  • process block 948 if there is any more remaining free space, it is given to the current partition. Processing is complete as indicated by process block 950.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Mechanisms for storing and searching a hierarchy of items are disclosed which may be particularly useful for implementing security policies (312, 314, 319I) and security associations (311, 313, 318), such as, but not limited to Internet Protocol security (IPsec). A hierarchy of items is stored in a search priority order. Multiple element definitions and groups of elements are identified. Representations of the element definitions and elements are stored in a prioritized searchable data structure (310) in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements. The element definitions may include Internet Protocol security policies (312, 314, 319) and the elements may include Internet Protocol security associations (311, 313, 318). The searchable data structure may include an associative memory or a plurality of associative memory entries.

Description

INTERNET PROTOCOL SECURITY MATCHING VALUES IN AN ASSOCIATIVE MEMORY
TECHNICAL FIELD One embodiment of the invention especially relates to communications and computer systems; and more particularly, one embodiment relates to storing and searching a hierarchy of items which may be particularly useful for implementing security policies and security associations, such as, but not limited to Internet Protocol security (IPsec) in routers, packet switching systems, computers, and/or other devices.
BACKGROUND The communications industry is rapidly changing to adjust to emerging technologies and ever increasing customer demand. This customer demand for new applications and increased performance of existing applications is driving communications network and system providers to employ networks and systems having greater speed and capacity (e.g., greater bandwidth). In trying to achieve these goals, a common approach taken by many communications providers is to use packet switching technology. hicreasingly, public and private communications networks are being built and expanded using various packet technologies, such as Internet Protocol (IP). A security architecture for the Internet Protocol (IP sec) is defined in. S. KENT and R. ATKINSON, "Security Architecture for IP," RFC 2401, November 1998, which is hereby incorporated by reference. An IPsec implementation operates in a host or a security gateway environment, affording protection to IP traffic. The protection offered is based on requirements defined by a Security Policy Database (SPD) established and maintained by a user or system administrator, or by an application operating within constraints established by either of the above. In general, packets are selected for one of three processing modes based on IP and transport layer header information matched against entries in the database. Each packet is either afforded IPsec security services, discarded, or allowed to bypass IPsec, based on the applicable database policies. IPsec provides security services at the IP layer by enabling a system to select required security protocols, determine the algorithm(s) to use for the service(s), and put in place any cryptographic keys required to provide the requested services. IPsec can be used to protect one or more "paths" between a pair of hosts, between a pair of security gateways, or between a security gateway and a host. The set of security services that IPsec can provide includes access control, connectionless integrity, data origin authentication, rejection of replayed packets (a form of partial sequence integrity), confidentiality (encryption), and limited traffic flow confidentiality. Because these services are provided at the IP layer, they can be used by any higher layer protocol, e.g., TCP, UDP, ICMP, BGP, etc. IPsec packet classification is specified as a two layer hierarchy: the relevant security policy (SP) must be found first out of an ordered list of SPs, and then within the context of the located SP, the correct security association (SA) must be found. A security association is a simplex "connection" that affords security services to the traffic carried by it. To secure typical, bi directional communication between two hosts or between two security gateways, two security associations (one in each direction) are required. A security association is uniquely identified by a triple consisting of a Security Parameter Index (SPI), an IP Destination Address, and a security protocol identifier. In principle, the destination address may be a unicast address, an IP broadcast address, or a multicast group address. The set of security services offered by an SA depends on the security protocol selected, the SA mode, the endpoints of the SA, and on the election of optional services within the protocol. For example, one security protocol provides data origin authentication and connectionless integrity for IP datagrams. The IP datagrams transmitted over an individual S A are afforded protection by exactly one security protocol. Sometimes a security policy may call for a combination of services for a particular traffic flow that is not achievable with a single S A. hi such instances it will be necessary to employ multiple SAs to implement the required security policy. The term "security association bundle" or "SA bundle" is applied to a sequence of SAs through which traffic must be processed to satisfy a security policy. The order of the sequence is defined by the policy. (Note that the SAs that comprise a bundle may terminate at different endpoints. For example, one SA may extend between a mobile host and a security gateway and a second, nested SA may extend to a host behind the gateway.) RFC 2401 defines that there are two nominal databases in the IPsec general model, with these two databases being the security policy database (SPD) and the security association database (SAD). The former specifies the policies that determine the disposition of all IP traffic inbound or outbound from a host, security gateway, or BITS or BITW IPsec implementation. The latter database contains parameters that are associated with each (active) security association. This section also defines the concept of a selector, a set of IP and upper layer protocol field values that is used by the security policy database to map traffic to a policy, i.e., an SA (or SA bundle). Each interface for which IPsec is enabled requires nominally separate inbound vs. outbound databases (SAD and SPD), because of the directionality of many of the fields that are used as selectors. Typically there is just one such interface, for a host or security gateway (SG). Note that an SG would always have at least two interfaces, but the "internal" one to the corporate net, usually would not have IPsec enabled and so only one pair of S ADs and one pair of SPDs would be needed. On the other hand, if a host had multiple interfaces or an SG had multiple external interfaces, it might be necessary to have separate SAD and SPD pairs for each interface. Ultimately, a security association is a management construct used to enforce a security policy in the IPsec environment. Thus, an essential element of S A processing is an underlying Security Policy Database (SPD) that specifies what services are to be offered to IP datagrams and in what fashion. The form of the database and its interface are outside the scope of RFC 2401. However, RFC 2401 does specify certain minimum management functionality that must be provided, to allow a user or system administrator to control how IPsec is applied to traffic transmitted or received by a host or transiting a security gateway. The SPD must be consulted during the processing of all traffic (inbound and outbound), including non IPsec traffic. In order to support this, the SPD requires distinct entries for inbound and outbound traffic. The SPD contains an ordered list of policy entries. Each policy entry is keyed by one or more selectors that define the set of IP traffic encompassed by this policy entry. One can think of this as separate SPDs (inbound vs. outbound), a addition, a nominally separate SPD must be provided for each IPsec enabled interface. A SPD must discriminate among traffic that is afforded IPsec protection and traffic that is allowed to bypass IPsec. This applies to the IPsec protection to be applied by a sender and to the IPsec protection that must be present at the receiver. For any outbound or inbound datagram, three processing choices are possible: discard, bypass IPsec, or apply IPsec. The first choice refers to traffic that is not allowed to exit the host, traverse the security gateway, or be delivered to an application at all. The second choice refers to traffic that is allowed to pass without additional IPsec protection. The third choice refers to traffic that is afforded IPsec protection, and for such traffic the SPD must specify the security services to be provided, protocols to be employed, algorithms to be used, etc. i each IPsec implementation there is a nominal security association database, in which each entry defines the parameters associated with one SA. Each SA has an entry in the SAD. For outbound processing, entries are pointed to by entries in the SPD. Note that if an SPD entry does not currently point to an S A that is appropriate for the packet, the implementation creates an appropriate S A (or S A Bundle) and links the SPD entry to the SAD entry. For inbound processing, each entry in the SAD is indexed by a destination IP address, IP sec protocol type, and SPI. The following parameters are associated with each entry in the SAD. This description does not purport to be a MIB, but only a specification of the minimal data items required to support an SA in an IPsec implementation. FIG. 1 illustrates a prior art implementation based on RFC 2401 for processing an outbound packet. Processing begins with process block 100, and proceeds to process block 102, wherein a database lookup operation is performed in the security policy database based on the packet to identify the corresponding security policy. If no policy is found as determined in process block 104, then the packet is dropped in process block 106, and processing is complete as indicated by process block 108. Otherwise, in process block 110, a second lookup operation is performed based on the packet, this time in the security association database corresponding to the security policy identified in the previous lookup operation. As determined in process block 112, if a corresponding security association is not located, then in process block 114, the security association is added to the corresponding security association database. In process block 116, the packet is processed according to the corresponding security association. Processing is complete as indicated by process block 118. RFC 2401 defines a two step process for performing lookup operations to in order to identify a SA associated with a packet, i.e., by first performing a lookup in a security policy database and then, performing a subsequent second lookup operation based on the identified security policy to identify the corresponding security association). Especially as packet rates and then number of packets to be processed by a packet processor increases, this two stage lookup process can be limiting. Desired is a new way of performing IPsec identification operations.
SUMMARY Disclosed are, inter alia, methods, apparatus, data structures, computer-readable medium, mechanisms, and means for storing and searching a hierarchy of items which may be particularly useful for implementing security policies and security associations, such as, but not limited to Internet Protocol security (IPsec) in routers, packet switching systems, computers, and/or other devices. One embodiment stores a hierarchy of items in a search priority order. Multiple element definitions and groups of elements are identified. Representations of the element definitions and elements are stored in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements. In one embodiment, the element definitions include Internet Protocol security policies and the elements include Internet Protocol security associations. In one embodiment, the searchable data structure includes an associative memory or a plurality of associative memory entries. In one embodiment, an element definition or element corresponding to a range of values is split into multiple entries. In one embodiment, the hierarchy includes more than two levels, and the element definitions and groups of elements are just two of the more than two levels. One embodiment maintains a data structure for an identified ordered list of Internet
Protocol security policies. Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories. Corresponding context memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more context memories. An associative memory lookup operation is performed on the ordered associative memory entries based on a received packet to identify a particular associative memory entry location. A lookup operation is performed on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies. A particular security association entry based on the received packet is added to the ordered associative memory entries, the particular security association entry corresponding to the particular Internet Protocol security policy, and the particular security association entry being added to the ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of the ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
BRIEF DESCRIPTION OF THE DRAWINGS The appended claims set forth the features of the invention with particularity. The invention, together with its advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which: FIG. 1 illustrates a prior art implementation of IPsec; FIG. 2A is a block diagram illustrating one embodiment for storing and searching a hierarchy of items; FIG. 2 B is a block diagram illustrating one embodiment for storing and searching a hierarchy of items; FIG. 3 A is a block diagram illustrating a prioritized searchable data structure used in one embodiment; FIG. 3B is a block diagram illustrating a prioritized searchable data structure used in one embodiment; FIG. 3C is a block diagram illustrating a prioritized searchable data structure used in one embodiment; FIG. 4 is a block diagram illustrating one embodiment for storing and searching a hierarchy of items of particular use with IPsec; FIG. 5A illustrates associative memory entries used in one embodiment; FIG. 5B illustrates a process used in one embodiment for generating multiple associative memory entries for a corresponding range of values; FIG. 6A illustrates a process used in one embodiment for processing an inbound packet; FIG. 6B illustrates a process used in one embodiment for processing an outbound packet; FIG. 7 illustrates a process used in one embodiment for adding an entry to an ordered list of associative memory entries; and FIGs. 8A-D and 9A-D illustrate processes used in one embodiment for expanding partitions and redistributing space allocated to partitions. DETAILED DESCRIPTION Disclosed are, inter alia, methods, apparatus, data structures, computer-readable medium, mechanisms, and means for storing and searching a hierarchy of items which may be particularly useful for implementing security policies and security associations, such as, but not limited to Internet Protocol security (IPsec) for use in routers, packet switching systems, computers, and/or other devices. Embodiments described herein include various elements and limitations, with no one element or limitation contemplated as being a critical element or limitation. Each of the claims individually recites an aspect of the invention in its entirety. Moreover, some embodiments described may include, but are not limited to, inter alia, systems, networks, integrated circuit chips, embedded processors, ASICs, methods, and computer-readable medium containing instructions. One or multiple systems, devices, components, etc. may comprise one or more embodiments. That may include some elements or limitations of a claim maybe performed by the same or different systems, devices, components, etc. The embodiments described hereinafter embody various aspects and configurations within the scope and spirit of the invention, with the figures illustrating exemplary and non-limiting configurations. As used herein, the term "packet" refers to packets of all types or any other units of information or data, including, but not limited to, fixed length cells and variable length packets, each of which may or may not be divisible into smaller packets or cells. The term "packet" as used herein also refers to both the packet itself or a packet indication, such as, but not limited to all or part of a packet or packet header, a data structure value, pointer or index, or any other part or identification of a packet. Moreover, these packets may contain one or more types of information, including, but not limited to, voice, data, video, and audio information. The term "item" is used generically herein to refer to a packet or any other unit or piece of information or data, a device, component, element, or any other entity. The phrases "processing a packet" and "packet processing" typically refer to performing some steps or actions based on the packet contents (e.g., packet header or other fields), and such steps or action may or may not include modifying, storing, dropping, and/or forwarding the packet and/or associated data. The term "system" is used generically herein to describe any number of components, elements, sub-systems, devices, packet switch elements, packet switches, routers, networks, computer and/or communication devices or mechanisms, or combinations of components thereof. The term "computer" is used generically herein to describe any number of computers, including, but not limited to personal computers, embedded processing elements and systems, control logic, ASICs, chips, workstations, mainframes, etc. The term "processing element" is used generically herein to describe any type of processing mechanism or device, such as a processor, ASIC, field programmable gate array, computer, etc. The term "device" is used generically herein to describe any type of mechanism, including a computer or system or component thereof. The terms "task" and "process" are used generically herein to describe any type of running program, including, but not limited to a computer process, task, thread, executing application, operating system, user process, device driver, native code, machine or other language, etc., and can be interactive and/or non-interactive, executing locally and/or remotely, executing in foreground and/or background, executing in the user and/or operating system address spaces, a routine of a library and/or standalone application, and is not limited to any particular memory partitioning technique. The steps, connections, and processing of signals and information illustrated in the figures, including, but not limited to any block and flow diagrams and message sequence charts, may be performed in the same or in a different serial or parallel ordering and/or by different components and/or processes, threads, etc., and/or over different connections and be combined with other functions in other embodiments in keeping within the scope and spirit of the invention. Furthermore, the term "identify" is used generically to describe any manner or mechanism for directly or indirectly ascertaining something, which may include, but is not limited to receiving, retrieving from memory, determining, defining, calculating, generating, etc. Moreover, the terms "network" and "communications mechanism" are used generically herein to describe one or more networks, communications mediums or communications systems, including, but not limited to the Internet, private or public telephone, cellular, wireless, satellite, cable, local area, metropolitan area and/or wide area networks, a cable, electrical connection, bus, etc., and internal communications mechanisms such as message passing, interprocess communications, shared memory, etc. The term "message" is used generically herein to describe a piece of information which may or may not be, but is typically communicated via one or more communication mechanisms of any type. The term "storage mechanism" includes any type of memory, storage device or other mechanism for maintaining instructions or data in any format. "Computer-readable medium" is an extensible term including any memory, storage device, storage mechanism, and other storage and signaling mechanisms including interfaces and devices such as network interface cards and buffers therein, as well as any communications devices and signals received and transmitted, and other current and evolving technologies that a computerized system can interpret, receive, and/or transmit. The term "memory" includes any random access memory (RAM), read only memory (ROM), flash memory, integrated circuits, and/or other memory components or elements. The term "storage device" includes any solid state storage media, disk drives, diskettes, networked services, tape drives, and other storage devices. Memories and storage devices may store computer-executable instructions to be executed by a processing element and/or control logic, and data which is manipulated by a processing element and/or control logic. The term "data structure" is an extensible term referring to any data element, variable, data structure, database, and/or one or more organizational schemes that can be applied to data to facilitate interpreting the data or performing operations on it, such as, but not limited to memory locations or devices, sets, queues, trees, heaps, lists, linked lists, arrays, tables, pointers, etc. A data structure is typically maintained in a storage mechanism. The terms "pointer" and "link" are used generically herein to identify some mechanism for referencing or identifying another element, component, or other entity, and these may include, but are not limited to a reference to a memory or other storage mechanism or location therein, an index in a data structure, a value, etc. The term "one embodiment" is used herein to reference a particular embodiment, wherein each reference to "one embodiment" may refer to a different embodiment, and the use of the term repeatedly herein in describing associated features, elements and/or limitations does not establish a cumulative set of associated features, elements and/or limitations that each and every embodiment must include, although an embodiment typically may include all these features, elements and/or limitations. In addition, the phrase "means for xxx" typically includes computer-readable medium containing computer-executable instructions for performing xxx. hi addition, the terms "first," "second," etc. are typically used herein to denote different units (e.g., a first element, a second element). The use of these terms herein does not necessarily connote an ordering such as one unit or event occurring or coming before another, but rather provides a mechanism to distinguish between particular units. Additionally, the use of a singular tense of a noun is non-limiting, with its use typically including one or more of the particular thing rather than just one (e.g., the use of the word "memory" typically refers to one or more memories without having to specify "memory or memories," or "one or more memories" or "at least one memory", etc.). Moreover, the phrases "based on x" and "in response to x" are used to indicate a minimum set of items x from which something is derived or caused, wherein "x" is extensible and does not necessarily describe a complete list of items on which the operation is performed, etc. Additionally, the phrase "coupled to" is used to indicate some level of direct or indirect connection between two elements or devices, with the coupling device or devices modifying or not modifying the coupled signal or communicated information. The term "subset" is used to indicate a group of all or less than all of the elements of a set. The term "subtree" is used to indicate all or less than all of a tree. Moreover, the term "or" is used herein to identify a selection of one or more, including alb of the conjunctive items. Disclosed are, ter alia, methods, apparatus, data structures, computer-readable medium, mechanisms, and means for storing and searching a hierarchy of items which may be particularly useful for implementing security policies and security associations, such as, but not limited to Internet Protocol security (IPsec) in routers, packet switching systems, computers, and/or other devices. One embodiment stores a hierarchy of items in a search priority order. Multiple element definitions and groups of elements are identified. Representations of the element definitions and elements are stored in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements. In one embodiment, the element definitions include Internet Protocol security policies and the elements include Internet Protocol security associations. In one embodiment, the searchable data structure includes an associative memory or a plurality of associative memory entries. In one embodiment, an element definition or element corresponding to a range of values is split into multiple entries. In one embodiment, the hierarchy includes more than two levels, and the element definitions and groups of elements are just two of the more than two levels. One embodiment maintains a data structure for an identified ordered list of Internet Protocol security policies. Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories. Corresponding context memory entries associated with the ordered list of internet Protocol security policies are programmed into one or more context memories. An associative memory lookup operation is performed on the ordered associative memory entries based on a received packet to identify a particular associative memory entry location. A lookup operation is performed on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies. A particular security association entry based on the received packet is added to the ordered associative memory entries, the particular security association entry corresponding to the particular Internet Protocol security policy, and the particular security association entry being added to the ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of the ordered list of Internet Protocol security policies located prior to the particular associative memory entry location. FIG. 2A is a block diagram illustrating one embodiment for storing and searching a hierarchy of items. Programming mechanism 200 (e.g., a packet processor, scheduler, processing element, ASIC, circuib or any other mechanism) generates and programs the hierarchy of entries in one or more associative memories 201 and one or more context memories 202. The number of levels of hierarchy can vary among embodiments, or upon applications thereof. For example, in the context of IPsec, there are two levels (i.e., security policies and security associations). For example, in the context of computer scheduling or processing units, one embodiment uses two levels (e.g., processes and threads within processes). One embodiment, uses three levels (e.g., applications, processes, and threads). The types and number of applications and levels of hierarchy supported is extensible, and these are just a few examples of an unlimited number supported by embodiments. Lookup word generation mechanism 210 (e.g., a packet processor, scheduler, processing element, ASIC, circuib or any other mechanism) generates a lookup value 211 for the context in which the embodiment is operating. Associative memory 201 performs a lookup operation based on lookup value 211 to identify matching location result 212. In one embodiment, matching location/lookup result 212 is used. In one embodiment, a lookup operation is performed in context memory 202 based on matching location result 212 to generate lookup result 213. FIG. 2 B is a block diagram illustrating one embodiment for storing and searching a hierarchy of items. System 240 includes a prioritized searchable data structure programmed with a hierarchy of entries. System 240 typically includes mechanisms and means for storing and searching a hierarchy of items. For example, one embodiment includes a process corresponding to one of the block or flow diagrams illustrated herein, or corresponding to any other means or mechanism implementing all or part of a claim with other internal or external components or devices possibly implementing other elements/limitations of a claim. Additionally, a single or multiple systems, devices, components, etc. may comprise an embodiment. In one embodiment, system 240 includes a processing element 241, memory 242, storage devices 243, one or more associative memories 244 and an interface 245 for receiving and transmitting packets or other items, which are coupled via one or more communications mechanisms 249 (shown as a bus for illustrative purposes). Various embodiments of system 240 may include more or less elements. For example, one embodiment does not include an associative memory; rather, the prioritized searchable data structure is stored in memory 242, in storage devices 243, and/or external to system 240, etc. The operation of system 240 is typically controlled by processing element 241 using memory 242 and storage devices 243 to perform one or more tasks or processes, such as, but not limited to storing and searching a hierarchy of items. Memory 242 is one type of computer-readable medium, and typically comprises random access memory (RAM), read only memory (ROM), flash memory, integrated circuits, and/or other memory components. Memory 242 typically stores computer-executable instructions to be executed by processing element 241 and/or data which is manipulated by processing element 241 for implementing functionality in accordance with one embodiment of the invention. Storage devices 243 are another type of computer-readable medium, and typically comprise solid state storage media, disk drives, diskettes, networked services, tape drives, and other storage devices. Storage devices 243 typically store computer-executable instructions to be executed by processing element 241 and/or data which is manipulated by processing element 241 for implementing functionality in accordance with one embodiment of the invention. FIG. 3 A is a block diagram illustrating a prioritized searchable data structure 300 used in one embodiment. In one embodiment, data structure 300 is stored in one or more associative memories (with or without corresponding context memories). In one embodiment, data structure 300 is stored in one or more other memories and/or storage devices. Note, in one embodiment, the ordering of the element definitions/security policies matters, while the ordering of elements within the group of elements/security associations does not matter. In one embodiment, however, the ordering of elements within the group of elements/security associations does matter. As shown, data structure 300 includes multiple entries 301-309, with the prioritized search order as indicated. The first group of one or more elements 301 is stored before the corresponding first element definition 302. A second group of one or more elements 303 is stored before the corresponding second element definition 304, and so on as indicated by the representation of n partitions of elements and their corresponding definitions. In one embodiment, stored in data structure 300 are representations of element definitions and elements in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition is stored after representations of a set of particular elements associated with the particular element definition and before representations of lower priority element definitions and their associated elements. FIG. 3B is a block diagram illustrating a prioritized searchable data structure 310 used in one embodiment. In one embodiment, data structure 310 is stored in one or more associative memories (with or without corresponding context memories). In one embodiment, data structure 310 is stored in one or more other memories and/or storage devices. As shown, data structure 310 includes multiple entries 311-319, with the prioritized search order as indicated. The first group of one or more security associations 311 is stored before the corresponding first security policy definition 312. A second group of one or more security associations 313 is stored before the corresponding second security policy definition 314, and so on as indicated by the representation of m partitions of security associations and their corresponding security policy definitions. In one embodiment, stored in data structure 310 are representations of security policies and security associations in a prioritized searchable data structure in decreasing search priority such that representations of each particular security policy is stored after representations of a set of particular security associations associated with the particular security policy and before representations of lower priority security policies and their associated security associations. FIG. 3C is a block diagram illustrating a prioritized searchable data structure 330 used in one embodiment. In one embodiment, data structure 330 is stored in one or more associative memories (with or without corresponding context memories). In one embodiment, data structure 330 is stored in one or more other memories and/or storage devices. Note, in one embodiment, the ordering of the items within each of the hierarchy level groups 331-336 matter; while, in one embodiment, the ordering of the items within at least one of the hierarchy level groups 331-336 does not matter. As shown, data structure 300 includes N hierarchy levels to emphasize that one embodiment supports two or more levels of hierarchy, with the prioritized search order as indicated. Within a particular hierarchy level, there may be the same or different number of groups. For example and as shown, hierarchy level 1 includes /groups of entries in a prioritized search order, hierarchy level 2 includes K groups of entries in a prioritized search order, and hierarchy level N includes E groups of entries in a prioritized search order. Note, in one embodiment, the values of J, K, and E are different. While in one embodiment, at two of the values of J, K, and E are the same. Also, in one embodiment, element definitions and groups of elements maybe programmed in any of the groups 331- 336 as long as the required hierarchy corresponding to the desired search order is maintained. In one embodiment, there are multiple levels of element definitions. In one embodiment, there are multiple levels of elements. In one embodiment, the element definitions are always in the lowest priority group 332, 334, and 336 within each of the hierarchy levels. In one embodiment, the elements are always in the highest search priority groups 331, 333 and 335, while the other groups included multiple levels of element definitions. In one embodiment, groups 331-336 only include element definitions. In one embodiment, groups 331-336 only include elements (and/or representations of any other items). For example, the hierarchy levels and groups illustrated in FIG. 3C are used in one embodiment to store N hierarchy levels of groups entries for classifying animals. Each hierarchy level could include groups of (1) species, (2) genus, (3) family, (4) order, (5) class, (6) phylum, and (7) kingdom, in the search order of one to seven. Thus, when a search is performed, the species will be identified if it is known. Otherwise, the first matching entry of corresponding genus, family, order, class, phylum or kingdom will be identified (in the programmed order). Additionally, in one embodiment, the hierarchy levels and groups illustrated in FIG. 3C are used to store N hierarchy levels of groups entries for identifying a matching thread, else process, else application, else user, etc. (or some variant thereof). FIG. 4 is a block diagram illustrating one embodiment for storing and searching a hierarchy of items of particular use with IPsec and using one or more ternary content addressable memories depicted as TCAM 424. In one embodiment, another type of associative memory is used. Even though FIG. 4 uses the specific label of TCAM, another type of the extensible types of associative memories (e.g., CAM) is used in one embodiment. TCAM manager 422 programs and updates TCAM 424 and context memories within inbound security processor with context memory 402 and within outbound security processor with context memory 442. In one embodiment, TCAM manager 422 uses memory 421 which stores security policy and associations database in programming one or more associative memories 424 and corresponding context memories. In one embodiment, inbound security processor 402 only performs a lookup operation in TCAM for clear-packet SP searches as indicated by RFC 2401 ; while in one embodiment, a different search mechanism is employed as the architecture depicted in FIG. 4 is extensible to meet the needs of a particular application. Note, in one embodiment, the contents of a particular database may be replicated in order to optimize lookup (e.g., for inbound and for outbound packets) and/or update actions. In one embodiment, inbound security processor 402 receives inbound packets 411 and generates lookup requests included in updates and lookup requests 412. TCAM manager 422, either immediately or after storing a lookup request, generates the appropriate lookup word if not already provided by inbound security processor 402. This lookup word is communicated in programming and lookup requests 423 to TCAM 424, which performs the associative memory lookup operation to generate lookup result 413, which is used to perform a lookup operation in the context memory within inbound security processor 402. In one embodiment, the context memory within inbound security processor 402 includes an array of pointers/indices indexed by the TCAM match address included in lookup results 413. Inbound security processor 402 use the pointer/index from that array to locate the SPD entry. Thus, when the SP search is completed, inbound security processor 402 uses the TCAM match location as an index into an array of SP entries in the context memory, with one or more entries possibly pointing to the same SP in memory 401 storing a copy of the SP database (SPD). In one embodiment, a context memory is not used. Rather, the SPD maintained in memory 401 is indexed directly by the TCAM match index, with duplicate SPs in the array, and null entries (or other indications) for indices that do not refer to SPs. In one embodiment, the SPD stored in memory 401 is maintained as an array of bytes. Each byte corresponds to the TCAM entry with the same index and contains the desired action when a clear packet is matched to its associated TCAM entry. The allowed actions include: to drop, to pass, and to secure. If the action is to secure the packet, a SA tunnel will be set up. When an SP is set up, TCAM manager 422 must initiate the corresponding SP in the SPD. In one embodiment, such an update request 412 is communicated to the inbound security processor 402, which updates memory 401. One embodiment includes a security association database (SAD) stored in memory 403. In one embodiment, the SAD is implemented as an array indexed by the security policy index (SPI). hi one embodiment, the seventeen least significant bits of the SPI are used; while in one embodiment, another set of bytes are used. When a packet with a valid IPSec header arrives, its SPI is extracted and indexed into the SAD. TCAM manager 422 also sets up these SA entries when they are inserted. In one embodiment, output bound security processor 442 uses TCAM 424 for matching both security policies and service associations. Ordered associative memory entries associated with the ordered list of Internet Protocol security policies are programmed into one or more associative memories 424 and corresponding context memory entries are programmed in the context memory of outbound security processor 442. In one embodiment, the hierarchy of security policies and security associations are stored in TCAM 424 such that security association entries corresponding to a particular security policy are stored before the particular security policy, and security policies are stored in their prioritized order. In one embodiment, security associations associated with a security policy are stored after entries corresponding to all higher priority security policies (and their respective security associations); while in one embodiment, this ordering is not required. Thus, in one embodiment, a single lookup operation in TCAM 424 can be used to identify a security association corresponding to the highest priority security policy if one exists, otherwise the security policy itself will be identified. hi one embodiment, an associative memory lookup operation is initiated by outbound security processor 442 based on a received outbound packet 431 to identify a particular associative memory entry location (e.g., included in lookup results 433). A lookup operation is then performed in the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies or one of the security associations. If a security policy is identified, TCAM manager 432 adds a particular security association entry based on the received packet is added to the TCAM prior to the particular associative memory entry location identified during the lookup operation (i.e., the entry corresponding to the matching security policy) and after entries corresponding to security policy of higher priority. In one embodiment, the context memory in outbound security processor with context memory 442 includes pointers/indices to SPs and SAs (e.g., similar to the pointer array previously described herein). In one embodiment, outbound security processor 442 maintains a direct array of intermixed SPs and SAs indexed by TCAM match address. In one embodiment, the SP information includes a reference id, and information related to treatment on match: drop, pass, or initiate a tunnel. In one embodiment, the SA information contents requires multiple cache lines, which by including enough memory on outbound security processor 442 , the latter scheme can be used while avoiding the extra memory transaction per-packet. Additionally, one embodiment also includes a mechanism to determine when elements should be removed. One embodiment includes outbound security processor 442 (which includes a context array that also serves as the SPD), a memory with security policy database 441 , and a memory with security association database (SAD) 443. hi one embodiment, two security association databases are used to enhance performance. Outbound security processor 442 processes each outbound packet by first extracting the five selectors specified in RFC 2401, and then performing a search for a match in TCAM 424. If a match is found, outbound security processor 442 indexes the context array using the index of the matched TCAM entry included in lookup results 433. The context array entry indicates whether the TCAM match corresponds to a matching SA or SP. If it is a SP, the context array also consists of the appropriate action for packet matching that SA. If it is a SA, the context array contains the index into the SAD for the corresponding S A. There is only one data structure of outbound SA. FIG. 5 A illustrates associative memory entries used in one embodiment. As shown, TCAM entry 500 includes a source address field 501, a destination address field 502, a source port field 503, a destination port field 504, a protocol type field 505, a service indication field 506, an entry type field 507 to indicate whether the entry is a SA or SP entry, and an implementation specific field 508. Note, one embodiment sets the mask field to don't care in field 507 if the entry corresponds to a service policy because every search is performed on the SPD (e.g., on all SP entries). By not masking out the value when the entry corresponds to an SA, then either all entries can be searched or only SPs can be searched. Thus, global mask register-0 510 has bits set to match in fields 511-516 and to ignore (i.e., don't card) in fields 517-518. Thus, using global mask register-0 510 in a search will cause both SP and SA entries to be searched. Global mask register- 1 520 has bits set to match in fields 521-527 and to ignore (i.e., don't card) in field 528. Thus, using global mask register- 1 520 in a search with the lookup word specifying SP entry types, a search will cause only SP entries to be searched. Note, the use of block masks are described in Ross et al., "Block Mask Ternary CAM," US Patent 6,389,506, issued May 14, 2002, which is hereby incorporated by reference. FIG. 5B illustrates a process used in one embodiment for generating multiple associative memory entries for a corresponding range of values. Some applications desire to match on a range of values (e.g., source port number 72-83). Because TCAMs do not support arbitrary sets or ranges as selection criteria, the splitter is required to perform any required entry expansion. For example, implementing the destination port ranges < 25 and > 25 requires splitting a single entry into sixteen entries. FIG. 5B illustrates pseudo code of a mechanism used in one embodiment to split entries into multiple entries. The splitter converts a SP specified in a range-set format into a SP specified in an expanded form using a collection of matching values and don't-care mask. For example, support a range of 1 to 15 becomes 4 sets of (matching values, don't care mask): (0x1, Oxe), (0x2,0xd), (0x4, Oxb), and (0x8, 0x7). As shown, first, the TCAM entry d...d is checked to see if it matches a subset of the values covered by the range. If not, then the process is repeated with 0d...d and ld...d. This happens recursively (using the stacks - not function recursion). Branches are trimmed when the entry being tested matches a disjoint set of values. Entries are saved when they match a subset of the values matched by the range. Entries that match overlapping sets are split and pushed onto the work stack. FIG. 6A illustrates a process used in one embodiment for processing an inbound packet. Processing begins with process block 600, and proceeds to process block 602, wherein a packet is received. As determined in process block 604, if the packet is marked as conforming to IPsec, then in process block 606 the packet is processed, and processing is completed as indicated by process block 619. Otherwise, in process block 610, a lookup word is generated based on the received packet (e.g., with fields in accordance to those stored in the associative memory or other implementations of the data structure). In process block 612, a lookup operation is initiated and performed in the associative memory using the lookup word and a global mask register such that only SP entries are searched. The lookup result is received and a lookup operation based on the result is performed in the context memory in process block 614. Then, in process block 616, the packet is processed according to the action identified in the context memory. Processing is complete as indicated by process block 619. FIG. 6B illustrates a process used in one embodiment for processing an outbound packet. Processing begins with process block 640, and proceeds to process block 642, wherein a packet is received. Next, in process block 644, a lookup word is generated based on the received packet. ). In process block 646, a lookup operation is initiated and performed in the associative memory using the lookup word and a global mask register such that both SP and S A entries are searched. The lookup result is received and a lookup operation based on the result is performed in the context memory in process block 648. As determined in process block 650, if the entry matched corresponds to an SA entry, then in process block 652, the action to perform is identified in the SAD based on the lookup result retrieved from the context memory, and the packet is processed according to the identified action. Otherwise, in process block 660, the packet is processed according to the action identified by the context memory; and in process block 662, a security access entry is added to the SAD and the associative and context memories are updated accordingly. Processing is complete as indicated by process block 669. FIG. 7 illustrates a process used in one embodiment for adding an entry to an ordered list of associative memory entries. Processing begins with process block 700, and proceeds to process block 702, wherein an associative memory or other prioritized searchable data structure update request is identified. Next, in process block 704, the partition and possibly the exact location(s) to add one or more entries entry are identified. As determined in process block 706, if there is space to add the one or more entries in the identified partition, then the entries are added in process block 712. Otherwise, space for the new entries is made (or attempted to be made) in process block 708. As determined in process block 710, if this expansion of the partition was successful, then the then the entries are added in process block 712. Otherwise, there is no room for the entries and an error condition is generated. Processing is complete as indicated by process block 714. FIGs. 8A-D and 9A-D illustrate processes used in one embodiment for expanding partitions and redistributing space allocated to partitions. Note, these processes may call each in a recursive or other fashion to expand/shrink partitions to redistribute the free space among partitions. One embodiment attempts to maintain an even distribution of free space (or something approximating such) across all partitions to minimize the amount of adjusting to be performed in adding one or more entries to a partition. By maintaining an approximate even distribution of free space among partitions, a single insert of an element or element definition (which may include one or more associative memory entries) can be quickly performed and limits the worst-case insertion time, which is important for applications with high update rates. Note, one embodiment does not attempt to maintain an even distribution of free space, which maybe practical for an application with a relatively low insertion rate, especially when compared to the worst-case insertion time. In one embodiment, when a partition requires space or is starving (e.g., not out of space, but is desirable to increase its space for future additions), it acquires space from a neighboring partition or partitions, and possibly these acquire space from a neighboring partition of there, etc. Some of the free space may be reallocated during this or another process to feed starving partitions. Of course, one embodiment uses another mechanism for expanding partitions and redistributing space. FIG. 8A illustrates a process used in one embodiment to expand a partition. Processing begins with process block 800. As determined in process block 802, if the partition to increase in size corresponds does not have a left neighboring partition, then as determined in process block 804, if the partition has a right neighboring partition, then leftward space is acquired from the neighboring right partition in process block 810. Otherwise, in process block 806, it has been identified as the only partition and the partition acquires the whole associative memory space available for use as the hierarchical database. Otherwise, it was determined in process block 802 that the partition has a left neighboring partition. As determined in process block 812, if the partition does not have a right neighboring partition, then in process block 814, rightward space of the left neighboring partition. Otherwise, in process block 816, leftward space of left neighboring partition is acquired, hi process block 818, the space count for the partition is updated based on the acquired space. As determined in process block 820, if enough space has been acquired, then processing proceeds to process block 808. Otherwise, in process block 822, rightward space of the right neighboring partition is acquired, and in process block 824, the space count for the partition is updated based on the acquired space. As determined in process block 826, if enough space has been acquired, then processing proceeds to process block 808. Otherwise, in process block 828, leftward space of the left neighboring partition is acquired. As determined in process block 830, if the partition to the left is starving (e.g., has less or significantly less free space the average free space across partitions), then in process block 832, rightward space of the right neighboring partition is acquired, and it is fed to the starving partition to the right in process block 834. As determined in process block 836, if the partition to the right is starving (e.g., has less or significantly less free space the average free space across partitions), then in process block 838, leftward space of the left neighboring partition is acquired, and it is fed to the starving partition to the left in process block 840. Finally, the amount of space granted to the partition is returned in process block 808, and processing is complete as indicated by process block 849. FIG. 8B illustrates a process used in one embodiment to get leftward space from a partition. Processing begins with process block 850, and proceeds to process block 852, wherein the available space in the current partition is computed. As determined in process block 854, if there is extra space, then in process block 856, this partition is shrunk to free up space for other partition. Otherwise, in process block 858, the partition determines whether it is starving (e.g.,. needs more space) and updates its status accordingly. Next, as determined in process block 860, are there more partitions to the left to examine to get the needed space, then in process block 862, the partition to the left is selected and processing returns to process block 852. Otherwise, in process block 864, entries in the current partition are flushed/shifted to the left. In one embodiment, all the elements/SAs and definitions/SPs are moved tight against its neighbor so there is no free space in between them. As determined in process block 866, if the current partition is not the original partition, then in process block 868, the next partition to the right is selected and processing returns to process block 864. Otherwise, in process block 870, the granted amount of space and the starvation status is returned. Processing is complete as indicated by process block 872. FIG. 8C illustrates a process used in one embodiment to get rightward space from a partition. Processing begins with process block 880, and proceeds to process block 882, wherein the available space in the current partition is computed. As determined in process block 884, if there is extra space, then in process block 886, this partition is shrunk to free up space for other partition. Otherwise, in process block 887, the partition determines whether it is starving (e.g.,. needs more space) and updates its status accordingly. Next, as determined in process block 888, are there more partitions to the right to examine to get the needed space, then in process block 890, the partition to the right is selected, and processing returns to process block 882. Otherwise, in process block 892, entries in the current partition are flushed/shifted to the right, hi one embodiment, all the elements/SAs and definitions/SPs are moved tight against its neighbor so there is no free space in between them. As determined in process block 894, if the current partition is not the original partition, then in process block 896, the next partition to the left is selected and processing returns to process block 892. Otherwise, in process block 898, the granted amount of space and the starvation status is returned. Processing is complete as indicated by process block 899. FIG. 9A illustrates a process used in one embodiment to feed a left starving partition. Processing begins with process block 900, and proceeds to process block 902, wherein the number of partitions to the left are counted. The integral and fractional values of the free space are computed in process block 904. The current partition is expanded by the integral amount in process block 906. If there is a fractional amount left for the current partition as determined in process block 908, then the current partition is expanded by one more entry and the fractional amount is decreased by one in process block 910. As detenriined in process block 912, if there is a left neighbor remaining, then in process block 914, the left neighbor partition is selected, and processing returns to process block 906.
Otherwise, in process block 916, if there is any more remaining free space, it is given to the current partition. Processing is complete as indicated by process block 918. FIG. 9B illustrates a process used in one embodiment to feed a right starving partition. Processing begins with process block 930, and proceeds to process block 932, wherein the number of partitions to the right are counted. The integral and fractional values of the free space are computed in process block 934. The current partition is expanded by the integral amount in process block 936. If there is a fractional amount left for the current partition as determined in process block 940, then the current partition is expanded by one more entry and the fractional amount is decreased by one in process block 942. As determined in process block 944, if there is a right neighbor remaining, then in process block 946, the left neighbor partition is selected, and processing returns to process block 936. Otherwise, in process block 948, if there is any more remaining free space, it is given to the current partition. Processing is complete as indicated by process block 950. In view of the many possible embodiments to which the principles of our invention may be applied, it will be appreciated that the embodiments and aspects thereof described herein with respect to the drawings/figures are only illustrative and should not be taken as limiting the scope of the invention. For example and as would be apparent to one skilled in the art, many of the process block operations can be re-ordered to be performed before, after, or substantially concurrent with other operations. Also, many different forms of data structures could be used in various embodiments. The invention as described herein contemplates all such embodiments as may come within the scope of the following claims and equivalents thereof.

Claims

CLAIMS What is claimed is:
1. A method for storing a hierarchy of items in a search priority order, the method comprising: identifying a plurality of element definitions and a plurality of groups of elements; and storing representations of the plurality of element definitions and elements of the plurality of groups of elements in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition of the plurality of element definitions is stored after representations of a set of particular elements of the plurality of groups of elements associated with said particular element definition and before representations of lower priority element definitions of the plurality of element definitions and their associated elements in the plurality of groups of elements.
2. The method of claim 1, wherein the plurality of element definitions includes Internet Protocol security policies and the plurality of groups of elements includes Intemet Protocol security associations.
3. The method of claim 2, wherein the searchable data structure includes an associative memory or a plurality of associative memory entries.
4. The method of claim 1, wherein the searchable data structure includes an associative memory or a plurality of associative memory entries.
5. A method for maintaining a data structure, the method comprising: identifying an ordered list of Internet Protocol security policies; progr-immmg ordered associative memory entries associated with the ordered list of Internet Protocol security policies; programming corresponding context memory entries associated with the ordered list of Intemet Protocol security policies; performing an associative memory lookup operation on said ordered associative memory entries based on a received packet to identify a particular associative memory entry location; performing a lookup operation on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Intemet Protocol security policies; and adding a particular security association entry based on the received packet to said ordered associative memory entries, the particular security association entry corresponding to the particular hitemet Protocol security policy, and the particular security association entry being added to said ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of said ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
6. The method of claim 5, wherein said adding the particular security association entry includes expanding a partition allocated for entries in an associative memory corresponding to the particular Internet Protocol security policy and its associated security association entries
7. The method of claim 6, wherein said expanding a partition includes redistributing free space to multiple partitions in the associative memory.
8. An apparatus for searching entries of an associative memory, the apparatus comprising: the associative memory; a programming mechanism coupled to the associative memory; and a mechanism for generating lookup words to the associative memory based on which the associative memory performs a lookup operation; wherein the programming mechanism is configured to store representations of a plurality of element definitions and elements of a plurality of groups of elements in the associative memory in decreasing search priority such that representations of each particular element definition of the plurality of element definitions is stored after representations of a set of particular elements of the plurality of groups of elements associated with said particular element definition and before representations of lower priority element definitions of the plurality of element definitions and their associated elements in the plurality of groups of elements.
9. The apparatus of claim 8, wherein the plurality of element definitions includes
Internet Protocol security policies and the plurality of groups of elements includes hiteπiet Protocol security associations.
10. The apparatus of claim 9, wherein the programming mechanism includes means for updating the associative memory with new security associations associated with the plurality of security policies .
11. The apparatus of claim 9, wherein the programming mechanism includes an update mechanism for updating the associative memory with new security associations associated with the plurality of security policies.
12. An apparatus for storing a hierarchy of items in a search priority order, the apparatus comprising: means for identifying a plurality of element definitions and a plurality of groups of elements; and means for storing representations of the plurality of element definitions and elements of the plurality of groups of elements in a prioritized searchable data structure in decreasing search priority such that representations of each particular element definition of the plurality of element definitions is stored after representations of a set of particular elements of the plurality of groups of elements associated with said particular element definition and before representations of lower priority element definitions of the plurality of element definitions and their associated elements in the plurality of groups of elements.
13. The apparatus of claim 12, wherein the plurality of element definitions includes Internet Protocol security policies and the plurality of groups of elements includes Internet Protocol security associations.
14. The apparatus of claim 13, wherein the searchable data structure includes an associative memory or a plurality of associative memory entries.
15. The apparatus of claim 12, wherein the searchable data structure includes an associative memory or a plurality of associative memory entries.
16. The apparatus of claim 15, wherein said means for storing includes means for splitting a range into a plurality of entries.
17. An apparatus for maintaining a data structure based an ordered list of hitemet Protocol security policies, the apparatus comprising: means for programming ordered associative memory entries associated with the ordered list of Internet Protocol security policies; means for programming corresponding context memory entries associated with the ordered list of Internet Protocol security policies; means for performing an associative memory lookup operation on said ordered associative memory entries based on a received packet to identify a particular associative memory entry location; means for performing a lookup operation on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies; and means for adding a particular security association entry based on the received packet to said ordered associative memory entries, the particular security association entry corresponding to the particular hitemet Protocol security policy, and the particular security association entry being added to said ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of said ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
18. The apparatus of claim 17, wherein said means for adding the particular security association entry includes means for expanding a partition allocated for entries in an associative memory coπesponding to the particular Internet Protocol security policy and its associated security association entries
19. The apparatus of claim 18, wherein said means for expanding a partition includes redistributing free space to multiple partitions in the associative memory.
20. The apparatus of claim 17, wherein said means for expanding the partition includes means for getting space from neighboring partitions.
21. The apparatus of claim 17, wherein said means for expanding the partition includes means for feeing another starving partition.
22. The apparatus of claim 17, wherein said means for adding the particular security association entry includes means for splitting the security association entry into a plurality of associative memory entries of said ordered associative memory entries.
23. A computer-readable medium containing computer-executable instructions for performing steps for maintaining a data stracture based an ordered list of Internet Protocol security policies, said steps comprising: programming ordered associative memory entries associated with the ordered list of Internet Protocol security policies; programming corresponding context memory entries associated with the ordered list of Internet Protocol security policies; performing an associative memory lookup operation on said ordered associative memory entries based on a received packet to identify a particular associative memory entry location; performing a lookup operation on the context memory based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies; and adding a particular security association entry based on the received packet to said ordered associative memory entries, the particular security association entry coπesponding to the particular hitemet Protocol security policy, and the particular security association entry being added to said ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of said ordered list of hitemet Protocol security policies located prior to the particular associative memory- entry location.
24. The computer-readable medium of claim 23, wherein said adding the particular security association entry includes expanding a partition allocated for entries in an associative memory corresponding to the particular Internet Protocol security policy and its associated security association entries
25. The computer-readable medium of claim 24, wherein said expanding a partition includes redistributing free space to multiple partitions in the associative memory.
26. An apparatus for maintaining entries of an associative memory based an ordered list of Internet Protocol security policies, the apparatus comprising: the associative memory including ordered associative memory entries associated with the ordered list of Intemet Protocol security policies; a programming mechanism coupled to the associative memory; a mechanism for generating lookup words to the associative memory based on which the associative memory performs a lookup operation to identify a particular associative memory entry location; a context memory for performing lookup operations based on the particular associative memory entry location to identify a particular Internet Protocol security policy of the ordered list of Internet Protocol security policies; wherein the programming mechanism is configured to add a particular security association entry based on the received packet to said ordered associative memory entries, the particular security association entry coπesponding to the particular Internet Protocol security policy, and the particular security association entry being added to said ordered associative memory entries prior to the particular associative memory entry location and after other security policy entries of said ordered list of Internet Protocol security policies located prior to the particular associative memory entry location.
27. The apparatus of claim 26, wherein the programming mechanism expands a partition allocated for entries in an associative memory coπesponding to the particular
Intemet Protocol security policy and its associated security association entries
28. The apparatus of claim 26, wherein the programming mechanism redistributes free space to multiple partitions in the associative memory.
29. The apparatus of claim 26, wherein the programming mechanism is further configured to split a range coπesponding to the particular security association entry into a plurality of associative memory entries.
PCT/US2004/016475 2003-07-09 2004-05-26 Internet protocol security matching values in an associative memory WO2005010777A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP04753320.3A EP1649389B1 (en) 2003-07-09 2004-05-26 Internet protocol security matching values in an associative memory
AU2004260370A AU2004260370A1 (en) 2003-07-09 2004-05-26 Internet protocol security matching values in an associative memory
CA2521470A CA2521470C (en) 2003-07-09 2004-05-26 Internet protocol security matching values in an associative memory

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/616,737 2003-07-09
US10/616,737 US6988106B2 (en) 2003-07-09 2003-07-09 Strong and searching a hierarchy of items of particular use with IP security policies and security associations

Publications (1)

Publication Number Publication Date
WO2005010777A1 true WO2005010777A1 (en) 2005-02-03

Family

ID=33564829

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/016475 WO2005010777A1 (en) 2003-07-09 2004-05-26 Internet protocol security matching values in an associative memory

Country Status (6)

Country Link
US (2) US6988106B2 (en)
EP (1) EP1649389B1 (en)
CN (2) CN100419752C (en)
AU (1) AU2004260370A1 (en)
CA (1) CA2521470C (en)
WO (1) WO2005010777A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077616A1 (en) * 2007-09-14 2009-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Handling trust in an IP multimedia subsystem communication network
WO2011003470A1 (en) * 2009-07-10 2011-01-13 Telefonaktiebolaget Lm Ericsson (Publ) Method for selecting an ipsec policy
WO2018059278A1 (en) * 2016-09-29 2018-04-05 Huawei Technologies Co., Ltd. System and method for packet classification using multiple security databases

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010612A1 (en) 2002-06-11 2004-01-15 Pandya Ashish A. High performance IP processor using RDMA
US20050108518A1 (en) * 2003-06-10 2005-05-19 Pandya Ashish A. Runtime adaptable security processor
US7685254B2 (en) * 2003-06-10 2010-03-23 Pandya Ashish A Runtime adaptable search processor
US7941606B1 (en) 2003-07-22 2011-05-10 Cisco Technology, Inc. Identifying a flow identification value mask based on a flow identification value of a packet
US7197597B1 (en) 2003-07-22 2007-03-27 Cisco Technology, Inc. Performing lookup operations in a content addressable memory based on hashed values of particular use in maintaining statistics for packet flows
TWI225999B (en) * 2003-08-22 2005-01-01 Ind Tech Res Inst A method for searching Peer-based security policy database
US7240149B1 (en) 2003-11-06 2007-07-03 Cisco Technology, Inc. Multiple branch operations in an associative memory
US7249228B1 (en) 2004-03-01 2007-07-24 Cisco Technology, Inc. Reducing the number of block masks required for programming multiple access control list in an associative memory
US7290083B2 (en) * 2004-06-29 2007-10-30 Cisco Technology, Inc. Error protection for lookup operations in content-addressable memory entries
US7219195B2 (en) * 2004-12-21 2007-05-15 Cisco Technology, Inc. Associative memory with invert result capability
US7523251B2 (en) * 2005-01-18 2009-04-21 Cisco Technology, Inc. Quaternary content-addressable memory
US7685165B2 (en) * 2005-04-01 2010-03-23 International Business Machines Corporation Policy based resource management for legacy data
US7773590B2 (en) * 2005-04-26 2010-08-10 Cisco Technology, Inc. Combined interface and non-interface specific associative memory lookup operations for processing of packets
WO2007002466A2 (en) * 2005-06-22 2007-01-04 Netlogic Microsystems, Inc. Access control list processor
US20070101424A1 (en) * 2005-07-25 2007-05-03 Nec Laboratories America, Inc. Apparatus and Method for Improving Security of a Bus Based System Through Communication Architecture Enhancements
JP4634349B2 (en) * 2006-08-22 2011-02-16 株式会社日立製作所 IPSec processing device, network system, and IPSec processing program
US7689889B2 (en) 2006-08-24 2010-03-30 Cisco Technology, Inc. Content addressable memory entry coding for error detection and correction
US7996348B2 (en) 2006-12-08 2011-08-09 Pandya Ashish A 100GBPS security and search architecture using programmable intelligent search memory (PRISM) that comprises one or more bit interval counters
US9141557B2 (en) 2006-12-08 2015-09-22 Ashish A. Pandya Dynamic random access memory (DRAM) that comprises a programmable intelligent search memory (PRISM) and a cryptography processing engine
US8175271B2 (en) * 2007-03-30 2012-05-08 Oracle America, Inc. Method and system for security protocol partitioning and virtualization
US8023504B2 (en) * 2008-08-27 2011-09-20 Cisco Technology, Inc. Integrating security server policies with optimized routing control
US8245141B1 (en) 2008-10-29 2012-08-14 Cisco Technology, Inc. Hierarchical collaboration policies in a shared workspace environment
US9413662B1 (en) * 2009-01-13 2016-08-09 Juniper Networks, Inc. Intra-term logical or operation in a network filter
CN102098207B (en) * 2009-12-09 2012-08-08 华为技术有限公司 Method, device and system for establishing Internet protocol security (IPSec) channel
US8539547B2 (en) 2010-08-18 2013-09-17 Certes Networks, Inc. Policy selector representation for fast retrieval
CN102420769A (en) * 2011-12-27 2012-04-18 汉柏科技有限公司 Method for forwarding internet protocol security (IPSec)
US10044582B2 (en) 2012-01-28 2018-08-07 A10 Networks, Inc. Generating secure name records
US9912555B2 (en) 2013-03-15 2018-03-06 A10 Networks, Inc. System and method of updating modules for application or content identification
US9722918B2 (en) 2013-03-15 2017-08-01 A10 Networks, Inc. System and method for customizing the identification of application or content type
US9838425B2 (en) 2013-04-25 2017-12-05 A10 Networks, Inc. Systems and methods for network access control
US9294503B2 (en) 2013-08-26 2016-03-22 A10 Networks, Inc. Health monitor based distributed denial of service attack mitigation
US9171174B2 (en) * 2013-11-27 2015-10-27 At&T Intellectual Property I, L.P. Methods, systems, and computer program products for verifying user data access policies when server and/or user are not trusted
US9906422B2 (en) 2014-05-16 2018-02-27 A10 Networks, Inc. Distributed system to determine a server's health
CN104184744A (en) * 2014-09-11 2014-12-03 东南大学 IPSec security alliance hardware lookup device and method based on IPv6
US9756071B1 (en) 2014-09-16 2017-09-05 A10 Networks, Inc. DNS denial of service attack protection
US9537886B1 (en) 2014-10-23 2017-01-03 A10 Networks, Inc. Flagging security threats in web service requests
US9621575B1 (en) 2014-12-29 2017-04-11 A10 Networks, Inc. Context aware threat protection
US9584318B1 (en) 2014-12-30 2017-02-28 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack defense
US9900343B1 (en) 2015-01-05 2018-02-20 A10 Networks, Inc. Distributed denial of service cellular signaling
US9848013B1 (en) 2015-02-05 2017-12-19 A10 Networks, Inc. Perfect forward secrecy distributed denial of service attack detection
US10063591B1 (en) 2015-02-14 2018-08-28 A10 Networks, Inc. Implementing and optimizing secure socket layer intercept
US9787581B2 (en) 2015-09-21 2017-10-10 A10 Networks, Inc. Secure data flow open information analytics
US10469594B2 (en) 2015-12-08 2019-11-05 A10 Networks, Inc. Implementation of secure socket layer intercept
CN105760657B (en) * 2016-02-01 2018-12-07 深圳市新产业生物医学工程股份有限公司 The detection scheme choosing method and device calculated for likelihood ratio
US10812348B2 (en) 2016-07-15 2020-10-20 A10 Networks, Inc. Automatic capture of network data for a detected anomaly
US10341118B2 (en) 2016-08-01 2019-07-02 A10 Networks, Inc. SSL gateway with integrated hardware security module
US10382562B2 (en) 2016-11-04 2019-08-13 A10 Networks, Inc. Verification of server certificates using hash codes
US10250475B2 (en) 2016-12-08 2019-04-02 A10 Networks, Inc. Measurement of application response delay time
US10404594B2 (en) * 2016-12-13 2019-09-03 Oracle International Corporation System and method for providing partitions of classification resources in a network device
US10397270B2 (en) 2017-01-04 2019-08-27 A10 Networks, Inc. Dynamic session rate limiter
US10187377B2 (en) 2017-02-08 2019-01-22 A10 Networks, Inc. Caching network generated security certificates
US10904101B2 (en) * 2017-06-16 2021-01-26 Cisco Technology, Inc. Shim layer for extracting and prioritizing underlying rules for modeling network intents
US20210011910A1 (en) * 2019-07-08 2021-01-14 Gsi Technology Inc. Reference distance similarity search
CN113965386B (en) * 2021-10-25 2023-11-03 绿盟科技集团股份有限公司 Industrial control protocol message processing method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6038560A (en) * 1997-05-21 2000-03-14 Oracle Corporation Concept knowledge base search and retrieval system
US6347376B1 (en) 1999-08-12 2002-02-12 International Business Machines Corp. Security rule database searching in a network security environment
US6470332B1 (en) * 1999-05-19 2002-10-22 Sun Microsystems, Inc. System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles
US6567812B1 (en) * 2000-09-27 2003-05-20 Siemens Aktiengesellschaft Management of query result complexity using weighted criteria for hierarchical data structuring

Family Cites Families (59)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3648264A (en) 1968-09-30 1972-03-07 Texas Instruments Inc Magnetic head with printed circuit coil
US3648254A (en) 1969-12-31 1972-03-07 Ibm High-speed associative memory
US4296475A (en) 1978-12-19 1981-10-20 U.S. Philips Corporation Word-organized, content-addressable memory
US4791606A (en) 1987-09-01 1988-12-13 Triad Semiconductors International Bv High density CMOS dynamic CAM cell
US4996666A (en) 1988-08-12 1991-02-26 Duluk Jr Jerome F Content-addressable memory system capable of fully parallel magnitude comparisons
US5440715A (en) 1990-06-27 1995-08-08 Advanced Micro Devices, Inc. Method and apparatus for expanding the width of a content addressable memory using a continuation bit
US5404482A (en) 1990-06-29 1995-04-04 Digital Equipment Corporation Processor and method for preventing access to a locked memory block by recording a lock in a content addressable memory with outstanding cache fills
US5339076A (en) 1992-04-27 1994-08-16 Integrated Information Technology Data compression using content addressable memory
US5383146A (en) 1992-06-08 1995-01-17 Music Semiconductors, Inc. Memory with CAM and RAM partitions
WO1994022253A1 (en) 1993-03-20 1994-09-29 International Business Machines Corporation Method and apparatus for extracting connection information from protocol headers
US5450351A (en) 1993-11-19 1995-09-12 International Business Machines Corporation Content addressable memory implementation with random access memory
US6047369A (en) 1994-02-28 2000-04-04 Intel Corporation Flag renaming and flag masks within register alias table
US5428565A (en) 1994-03-11 1995-06-27 Intel Corporation Single stage sensing apparatus for a content addressable memory
US6041389A (en) 1995-11-16 2000-03-21 E Cirrus Logic, Inc. Memory architecture using content addressable memory, and systems and methods using the same
US6069573A (en) 1996-06-17 2000-05-30 Hewlett-Packard Company Match and match address signal prioritization in a content addressable memory encoder
US5978885A (en) 1996-06-17 1999-11-02 Hewlett Packard Co. Method and apparatus for self-timing associative data memory
US5841874A (en) 1996-08-13 1998-11-24 Motorola, Inc. Ternary CAM memory architecture and methodology
US5956336A (en) 1996-09-27 1999-09-21 Motorola, Inc. Apparatus and method for concurrent search content addressable memory circuit
US5802567A (en) 1996-10-31 1998-09-01 International Business Machines Corporation Mechanism for managing offset and aliasing conditions within a content-addressable memory-based cache memory
US5852569A (en) 1997-05-20 1998-12-22 Quality Semiconductor, Inc. Content addressable memory multiple match detection circuit
US6181698B1 (en) 1997-07-09 2001-01-30 Yoichi Hariguchi Network routing table using content addressable memory
US6199140B1 (en) 1997-10-30 2001-03-06 Netlogic Microsystems, Inc. Multiport content addressable memory device and timing signals
US6658002B1 (en) 1998-06-30 2003-12-02 Cisco Technology, Inc. Logical operation unit for packet processing
US6389506B1 (en) 1998-08-07 2002-05-14 Cisco Technology, Inc. Block mask ternary cam
US6289414B1 (en) * 1998-10-08 2001-09-11 Music Semiconductors, Inc. Partially ordered cams used in ternary hierarchical address searching/sorting
US6081440A (en) 1998-11-05 2000-06-27 Lara Technology, Inc. Ternary content addressable memory (CAM) having fast insertion and deletion of data values
JP4156112B2 (en) * 1998-12-25 2008-09-24 富士通株式会社 High-speed search method and high-speed search device
US6137707A (en) 1999-03-26 2000-10-24 Netlogic Microsystems Method and apparatus for simultaneously performing a plurality of compare operations in content addressable memory device
EP1041499A1 (en) * 1999-03-31 2000-10-04 International Business Machines Corporation File or database manager and systems based thereon
US6651096B1 (en) 1999-04-20 2003-11-18 Cisco Technology, Inc. Method and apparatus for organizing, storing and evaluating access control lists
US20030014627A1 (en) * 1999-07-08 2003-01-16 Broadcom Corporation Distributed processing in a cryptography acceleration chip
US6175513B1 (en) 1999-07-12 2001-01-16 Netlogic Microsystems Method and apparatus for detecting multiple matches in a content addressable memory
US6374326B1 (en) 1999-10-25 2002-04-16 Cisco Technology, Inc. Multiple bank CAM architecture and method for performing concurrent lookup operations
US6526474B1 (en) 1999-10-25 2003-02-25 Cisco Technology, Inc. Content addressable memory (CAM) with accesses to multiple CAM arrays used to generate result for various matching sizes
US6154384A (en) 1999-11-12 2000-11-28 Netlogic Microsystems, Inc. Ternary content addressable memory cell
US6134135A (en) 2000-01-10 2000-10-17 Switchcore, A.B. Mask arrangement for scalable CAM/RAM structures
US6535951B1 (en) 2000-02-29 2003-03-18 Cisco Technology, Inc. Hit result register file used in a CAM
US6240003B1 (en) 2000-05-01 2001-05-29 Micron Technology, Inc. DRAM content addressable memory using part of the content as an address
US20010042204A1 (en) * 2000-05-11 2001-11-15 David Blaker Hash-ordered databases and methods, systems and computer program products for use of a hash-ordered database
US6246601B1 (en) 2000-06-14 2001-06-12 Netlogic Microsystems, Inc. Method and apparatus for using an inter-row configurable content addressable memory
US6658458B1 (en) 2000-06-22 2003-12-02 Cisco Technology, Inc. Cascading associative memory arrangement
US6725326B1 (en) 2000-08-15 2004-04-20 Cisco Technology, Inc. Techniques for efficient memory management for longest prefix match problems
EP1211614A1 (en) * 2000-11-28 2002-06-05 Koninklijke Philips Electronics N.V. Method for performing a search in a hierarchical structure of objects
JP3601445B2 (en) * 2000-12-06 2004-12-15 日本電気株式会社 Packet transfer apparatus, transfer information management method used therefor, and transfer information search method thereof
US6606681B1 (en) 2001-02-23 2003-08-12 Cisco Systems, Inc. Optimized content addressable memory (CAM)
US6862281B1 (en) 2001-05-10 2005-03-01 Cisco Technology, Inc. L4 lookup implementation using efficient CAM organization
US7107464B2 (en) * 2001-07-10 2006-09-12 Telecom Italia S.P.A. Virtual private network mechanism incorporating security association processor
US7613699B2 (en) * 2001-08-03 2009-11-03 Itt Manufacturing Enterprises, Inc. Apparatus and method for resolving security association database update coherency in high-speed systems having multiple security channels
US6775737B1 (en) 2001-10-09 2004-08-10 Cisco Technology, Inc. Method and apparatus for allocating and using range identifiers as input values to content-addressable memories
US6715029B1 (en) 2002-01-07 2004-03-30 Cisco Technology, Inc. Method and apparatus for possibly decreasing the number of associative memory entries by supplementing an associative memory result with discriminator bits from an original set of information
US6650561B2 (en) 2002-01-30 2003-11-18 International Business Machines Corporation High reliability content-addressable memory using shadow content-addressable memory
US6871262B1 (en) 2002-02-14 2005-03-22 Cisco Technology, Inc. Method and apparatus for matching a string with multiple lookups using a single associative memory
US6871265B1 (en) 2002-02-20 2005-03-22 Cisco Technology, Inc. Method and apparatus for maintaining netflow statistics using an associative memory to identify and maintain netflows
US7336660B2 (en) 2002-05-31 2008-02-26 Cisco Technology, Inc. Method and apparatus for processing packets based on information extracted from the packets and context indications such as but not limited to input interface characteristics
JP2004013504A (en) * 2002-06-06 2004-01-15 Univ Hiroshima Pattern recognizing system, associative memory device to be used for the system, and pattern recognition processing method
US7424468B2 (en) * 2002-07-02 2008-09-09 Samsung Electronics Co., Ltd. Internet protocol address look-up device
US7103708B2 (en) 2002-08-10 2006-09-05 Cisco Technology, Inc. Performing lookup operations using associative memories optionally including modifying a search key in generating a lookup word and possibly forcing a no-hit indication in response to matching a particular entry
US7065609B2 (en) 2002-08-10 2006-06-20 Cisco Technology, Inc. Performing lookup operations using associative memories optionally including selectively determining which associative memory blocks to use in identifying a result and possibly propagating error indications
US6717946B1 (en) 2002-10-31 2004-04-06 Cisco Technology Inc. Methods and apparatus for mapping ranges of values into unique values of particular use for range matching operations using an associative memory

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6038560A (en) * 1997-05-21 2000-03-14 Oracle Corporation Concept knowledge base search and retrieval system
US6470332B1 (en) * 1999-05-19 2002-10-22 Sun Microsystems, Inc. System, method and computer program product for searching for, and retrieving, profile attributes based on other target profile attributes and associated profiles
US6347376B1 (en) 1999-08-12 2002-02-12 International Business Machines Corp. Security rule database searching in a network security environment
US6567812B1 (en) * 2000-09-27 2003-05-20 Siemens Aktiengesellschaft Management of query result complexity using weighted criteria for hierarchical data structuring

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1649389A4

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090077616A1 (en) * 2007-09-14 2009-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Handling trust in an IP multimedia subsystem communication network
US9900347B2 (en) * 2007-09-14 2018-02-20 Telefonaktiebolaget Lm Ericsson (Publ) Handling trust in an IP multimedia subsystem communication network
WO2011003470A1 (en) * 2009-07-10 2011-01-13 Telefonaktiebolaget Lm Ericsson (Publ) Method for selecting an ipsec policy
CN102474499A (en) * 2009-07-10 2012-05-23 瑞典爱立信有限公司 Method for selecting an IPsec policy
WO2018059278A1 (en) * 2016-09-29 2018-04-05 Huawei Technologies Co., Ltd. System and method for packet classification using multiple security databases

Also Published As

Publication number Publication date
EP1649389A4 (en) 2012-01-04
CN100419752C (en) 2008-09-17
CA2521470C (en) 2011-07-26
US20050010612A1 (en) 2005-01-13
EP1649389B1 (en) 2014-10-01
US7493328B2 (en) 2009-02-17
CA2521470A1 (en) 2005-02-03
US20060074899A1 (en) 2006-04-06
US6988106B2 (en) 2006-01-17
AU2004260370A1 (en) 2005-02-03
EP1649389A1 (en) 2006-04-26
CN1781098A (en) 2006-05-31
CN101345759B (en) 2012-05-09
CN101345759A (en) 2009-01-14

Similar Documents

Publication Publication Date Title
CA2521470C (en) Internet protocol security matching values in an associative memory
US7197597B1 (en) Performing lookup operations in a content addressable memory based on hashed values of particular use in maintaining statistics for packet flows
US7941606B1 (en) Identifying a flow identification value mask based on a flow identification value of a packet
US7349382B2 (en) Reverse path forwarding protection of packets using automated population of access control lists based on a forwarding information base
US7177978B2 (en) Generating and merging lookup results to apply multiple features
EP1808987B1 (en) Longest prefix matching using tree bitmap data structures
EP1623347B1 (en) Comparison tree data structures and lookup operations
US6775737B1 (en) Method and apparatus for allocating and using range identifiers as input values to content-addressable memories
US7313667B1 (en) Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing
US7082492B2 (en) Associative memory entries with force no-hit and priority indications of particular use in implementing policy maps in communication devices
US7480255B2 (en) Data structure identifying for multiple addresses the reverse path forwarding information for a common intermediate node and its use
US20040230583A1 (en) Comparison tree data structures of particular use in performing lookup operations
US20060233173A1 (en) Policy-based processing of packets
US20070261110A1 (en) Packet firewalls of particular use in packet switching devices
US7403526B1 (en) Partitioning and filtering a search space of particular use for determining a longest prefix match thereon
US7551609B2 (en) Data structure for storing and accessing multiple independent sets of forwarding information
AU2004286543A1 (en) Associative memory with entry groups and skip operations
US7249228B1 (en) Reducing the number of block masks required for programming multiple access control list in an associative memory
US7299317B1 (en) Assigning prefixes to associative memory classes based on a value of a last bit of each prefix and their use including but not limited to locating a prefix and for maintaining a Patricia tree data structure
US7773590B2 (en) Combined interface and non-interface specific associative memory lookup operations for processing of packets
US7788445B2 (en) Intelligent allocation of programmable comparison operations for reducing the number of associative memory entries required
US7024515B1 (en) Methods and apparatus for performing continue actions using an associative memory which might be particularly useful for implementing access control list and quality of service features
US7523251B2 (en) Quaternary content-addressable memory
US7240149B1 (en) Multiple branch operations in an associative memory
US7941605B1 (en) Methods and apparatus for generating a result based on a lookup result from a lookup operation using an associative memory and processing based on a discriminator portion of a lookup word

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DPEN Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2521470

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 20048112976

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2004260370

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2004260370

Country of ref document: AU

Date of ref document: 20040526

Kind code of ref document: A

WWP Wipo information: published in national office

Ref document number: 2004260370

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 2004753320

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2004753320

Country of ref document: EP