Industrial IoT Authors: Elizabeth White, Stackify Blog, Yeshim Deniz, SmartBear Blog, Liz McMillan

Related Topics: Industrial IoT, Microservices Expo

Industrial IoT: Article

Why Current Network Protocol-Based Firewalls and Routers Can't Handle XML

Enterprises will implement XML Proxies as a transparent layer over current network traffic (both inside and across the firewall)

Look in the network closet in any good-sized company today and you’ll find a wide assortment of network gear: firewalls, switches, gateways, routers, hubs, bridges, the list goes on and on. Each of these devices essentially either directs or secures the packets that form the automobiles on the streets and freeways of today’s networks. All data networks -- including the mother of all data networks, the Internet -- are built from these packet-directing and packet-securing devices. All this equipment works pretty well, as long as they don’t care what is actually inside the packets. And there’s the rub. The amount of traffic going over the network that is XML formatted -- in particular, Web Services messages -- is set to explode, and all that equipment in the closet is completely unprepared to direct or secure that XML traffic.

To understand why XML traffic is different from other network traffic, it is important to look under the covers of just what network traffic is, and how network devices work. The key to understanding network traffic is the Open System Interconnection, or OSI model for networking. The OSI model describes network traffic as a stack of layers, each one more abstract than the layer below. The diagram below illustrates the seven basic levels of the OSI model -- physical, link, network, transport, session, presentation, and application:

All the network gear mentioned above works at the five lower levels of the OSI stack. Vendors such as Cisco, Nortel, 3Com, Linksys, Intel, and dozens of others have produced hardware network appliances that direct and secure packets, and streamline and improve the efficiency of handling network traffic. All of this network gear -- gateways, routers, firewalls, etc. -- have melded together into a broad category called "network intermediaries" in that they facilitate communications between systems, but aren't the end systems themselves. However, for all these network intermediaries do, they are still stuck in the lower five levels of the OSI stack -- because they don’t deal with content.

Making the Case for the XML Proxy
The first six levels of the stack basically handle the nuts and bolts of network communication, while Web traffic (HTTP), email (SMTP), and other Internet protocols are part of the uppermost, application layer. As far as a firewall or router or gateway is concerned, this Internet traffic consists of nothing but applications talking to applications. Where, then, do the emerging XML and Web Services protocols such as SOAP, WSDL, and UDDI operate? These protocols don’t really fit in the OSI stack at all, because they are content-oriented, rather than network protocol-oriented specifications. So, while the OSI model is a mechanism that provides an understanding of traditional networking products, new XML-aware networking products must transcend the limited OSI model and focus not on the message packet or envelope, but rather the content of the message itself.

This distinction between XML-aware, content-oriented products and network protocol-oriented devices is clearest when looking at firewalls. Most current firewalls work by blocking access to all network traffic, except ones that run on certain TCP ports such as Web traffic (HTTP port 80 and HTTPS port 443) and email traffic (SMTP port 25). However, most XML and Web Services traffic runs over the standard HTTP and HTTPS ports. Unfortunately, today’s TCP/IP-based firewalls can only permit or deny all traffic through these ports. The big problem with this all-or-nothing proposition is that XML/Web Services traffic might be undesirable at the content-level, unlike standard HTTP traffic, because Web Service traffic could theoretically execute any instruction on any computer on a company’s internal network.

Therefore, firewalls must become aware not only of the network ports and IP addresses, but also of the content itself that is traveling across the network. Unfortunately, current firewall, router, proxy, and switch solutions are simply not up to the task. Instead of being simply network and IP-aware, these solutions need to be content-aware. More specifically, they need to be XML-aware. These devices must be able to inspect and understand XML traffic as it flows across the network and perform some sort of activity on the traffic, following the policies set for the purpose.

ZapThink prefers the term XML Proxy to describe the evolving role of XML-aware network intermediaries. XML Proxies consist of either software or hardware applications that monitor network traffic for XML content and perform some kind of activity on that traffic. We distinguish XML Proxies from other types of network intermediaries in that they are XML-aware, while others may be TCP/IP aware or HTTP aware. However, other than the fact that XML Proxies facilitate XML communications and are capable of processing XML documents, the role that XML Proxies fill varies depending on the activity they perform on the XML content.

XML Proxies currently on the market offer a wide-ranging set of functionality for handling corporate-wide XML security, management, routing, transformation, and performance enhancement. Enterprises will implement XML Proxies as a transparent layer over current network traffic (both inside and across the firewall), monitoring and acting on XML data by following established rules.

The ZapThink Take
Today there are many vendors who have recognized the need for XML-aware network intermediaries, and are developing a range of products to meet this need. Being a nascent market, however, the terminology is all over the map: network appliance, software XML firewall, XML application firewall, XML switch, Web Services gateway, the list seems endless. ZapThink considered this terminology tangle and came up with a recommendation. While the term "XML-aware Intermediaries" is a broadly inclusive and generally accurate assessment of the current products and services on the market, ZapThink believes that "XML Proxy" is a more marketable name, and hence one that can more adequately distinguish the current class of products and solutions on the market today and in the years to come.

More Stories By Ron Schmelzer

Ron Schmelzer is founder and senior analyst of ZapThink. A well-known expert in the field of XML and XML-based standards and initiatives, Ron has been featured in and written for periodicals and has spoken on the subject of XML at numerous industry conferences.

@ThingsExpo Stories
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...