27
P
ACKET
F
ILTERS
Introduction
This chapter describes procedures for setting up packet filters for the
OfficeConnect Gateway. The following topics are described:
Filtering Overview
Filter Types
Creating Filters
Configuring Filters
Managing Filters
Filter Examples
Keywords
Filtering Overview
Packet Filters are primarily used in networks that cross organizational or corporate
boundaries. They control inter-network data transmission by accepting or rejecting
passage of specific packets through network interfaces based on packet header
information.
When data packets are received by a network interface, the packet filter analyzes
the packet header information against its set of rules. Based on these rules that
you define, the filter permits the packet to pass through or discards it.
Filtering Capabilities
The OfficeConnect Gateway supports the following filtering capabilities:
Input and output filtering; packet filters can be created to control inbound or
outbound data packets
Source and destination address filtering; a packet filter can accept or deny
access to a host or user based on the address of the source and / or destination
Protocol Filtering; inbound or outbound network traffic can be evaluated based
on the protocol
Source and destination port filtering; a packet filter can control what services
local or remote users can access
Filtering can be used to control the content of IP Routing Information Packets
(RIP) sent / received on specific ports
Established session filtering; a packet filter can permit users to connect with a
remote network without letting remote users have access to the local network
(or vice versa)
Filter Types
Filters can be classified by the following types:
Summary of Contents for OfficeConnect 3C100XF
Page 1: ...http www 3com com OfficeConnect Gateway CLI User s Guide Release 1 0 Part No 10042302 Rev AA ...
Page 14: ...xiv ...
Page 18: ...iv ABOUT THIS GUIDE ...
Page 30: ...1 12 CHAPTER 1 USING THE COMMAND LINE INTERFACE CLI ...
Page 50: ...3 14 CHAPTER 3 ADMINISTRATIVE CLI COMMANDS ...
Page 58: ...4 8 CHAPTER 4 CONFIGURING AND MANAGING USERS ...
Page 70: ...6 8 CHAPTER 6 BRIDGING COMMANDS ...
Page 78: ...8 4 CHAPTER 8 INTERFACE COMMANDS ...
Page 82: ...9 4 CHAPTER 9 ARP COMMANDS ...
Page 88: ...11 4 CHAPTER 11 DHCP COMMANDS ...
Page 124: ...12 36 CHAPTER 12 IP ROUTING COMMANDS ...
Page 134: ...13 10 CHAPTER 13 DNS COMMANDS ...
Page 142: ...15 6 CHAPTER 15 MULTICASTING AND IGMP COMMANDS ...
Page 160: ...17 8 CHAPTER 17 PPP COMMANDS ...
Page 182: ...21 6 CHAPTER 21 ADDRESS TRANSLATION COMMANDS ...
Page 186: ...22 4 CHAPTER 22 IPSEC COMMANDS ...
Page 188: ...23 2 CHAPTER 23 SECURITY ASSOCIATION SA COMMANDS ...
Page 192: ...24 4 CHAPTER 24 TCP COMMANDS ...
Page 204: ...25 12 CHAPTER 25 SNMP COMMANDS ...
Page 210: ...26 6 CHAPTER 26 IP FILTERS COMMANDS ...
Page 238: ...29 6 CHAPTER 29 TRACEROUTE COMMANDS ...
Page 255: ...xv RFC 1483 16 3 RFC 1483 MER 16 4 ...
Page 256: ...xvi ...
Page 260: ......