18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IP Filter rule<br />

basics<br />

Chapter 4: Understanding Policy Configuration<br />

IP Filter rule basics<br />

IP Filter rules allow you to securely forward IP packets between networks,<br />

allowing traffic to pass between the networks (for example, encrypted VPN<br />

sessions). You can create IP Filter rules for TCP, UDP, ICMP, and many other<br />

protocols (such as AH).<br />

Security Alert: Secure Computing strongly recommends that you use IP Filter only<br />

for non-TCP/UDP protocols, such as Vines, PPTP, NES, etc. Using IP Filter for a<br />

TCP/UDP protocol will, in most cases, severely degrade the effectiveness <strong>of</strong> the<br />

<strong>Sidewinder</strong> <strong>G2</strong> and will expose your network to security hazards.<br />

Functionally, IP Filter is based upon a rule database in the <strong>Sidewinder</strong> <strong>G2</strong><br />

kernel. IP Filter rules filter incoming packets based on source IP address,<br />

destination IP address, and ports. Like proxy rules, IP Filter rules also have the<br />

option <strong>of</strong> using network address translation (NAT) and/or redirection. You can<br />

configure and manage the IP Filter rule database using the Admin Console.<br />

IP Filter processing can be configured to reject the following source address<br />

packets:<br />

• Packets with broadcast source addresses<br />

• Packets with source addresses on a loopback network that were received<br />

on a non-loopback device<br />

Note: Packets that are rejected for source route information will generate a<br />

netprobe audit event.<br />

When you initially configure the <strong>Sidewinder</strong> <strong>G2</strong>, you will have a default IP Filter<br />

rule group that is assigned in the active rules. This rule group is empty. You can<br />

create and add rules and/or rule groups to this group, or create your own group<br />

and assign it as the active rule group instead.<br />

The following sections summarize how IP Filtering works when stateful packet<br />

inspection (also known as session tracking) is enabled and when it is not<br />

enabled. The sections also provide information on what criteria is used to<br />

determine rule matches and what happens after the <strong>Sidewinder</strong> <strong>G2</strong> checks the<br />

packet against the active IP Filter rules.<br />

Note: For information on creating IP Filter rules, see “Creating IP Filter rules” on<br />

page 228.<br />

121

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!