traverse the NetDefend Firewall (as well as allowing NetDefendOS to respond to ICMP
Ping
requests), some IP rules must be defined by the administrator.
Each IP rule or IP policy that is added by the administrator will define the following basic filtering
criteria:
•
From what interface to what interface traffic flows.
•
From what network to what network the traffic flows.
•
What kind of protocol is affected (the
service
).
•
What action the rule will take when a match on the filter triggers.
Specifying Any Interface or Any Network
When specifying the filtering criteria in any of the policy rule sets, there are several useful
predefined configuration objects that can be used:
•
For a source or destination network, the all-nets option is equivalent to the IP address
0.0.0.0/0
which will mean that any IP address is acceptable.
•
For source or destination interface, the any option can be used so that NetDefendOS will not
care about the interface which the traffic is going to or coming from.
•
The destination interface can be specified as core. This means that traffic, such as an ICMP
Ping
, is destined for the NetDefend Firewall itself and NetDefendOS will respond to it.
New connections that are initiated by NetDefendOS itself do not need an explicit IP rule or IP
policy because they are allowed by default. For this reason, the interface core is not used as
the source interface. Such connections include those needed to connect to the external
databases needed for such NetDefendOS features as IDP and dynamic web content filtering.
•
The Service can be specified as all_services which includes all possible protocols.
Creating a Drop All Rule/Policy
Traffic that does not match any Ip rule or IP policy in the IP rule set is, by default, dropped by
NetDefendOS. In order to be able to log the dropped connections, it is recommended that an
explicit IP rule or IP policy is defined that drops traffic for all source/destination
networks/interfaces is placed as the last item in the IP rule set. This is sometimes referred to as a
Drop All
rule/policy.
Tip: Include the rule set name in the drop all name
There may be several IP rule sets in use. It is recommended to include the IP rule set name
in the name of the drop all rule so it can be easily identified in log messages.
For example, the drop all IP rule or IP policy for the
main
rule set should be called
main_drop_all
or similar.
The IP Addresses in IP Rules or IP Policies can be IPv4 or IPv6
IP rules and IP policies support either IPv4 or IPv6 addresses as the source and destination
network in the filtering properties.
Chapter 3: Fundamentals
230
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...