18.11.2014 Views

Clavister cOS Core Administration Guide

Clavister cOS Core Administration Guide

Clavister cOS Core Administration Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3: Fundamentals<br />

• Service<br />

The Service in an IP rule is also important because if an Application Layer Gateway object is to be<br />

applied to traffic then it must be associated with a service object (see Section 6.2, “ALGs”).<br />

When an IP rule is triggered by a match then one of the following Actions can occur:<br />

Allow<br />

FwdFast<br />

NAT<br />

SAT<br />

Drop<br />

Reject<br />

The packet is allowed to pass. As the rule is applied to only the opening of a<br />

connection, an entry in the "state table" is made to record that a connection is open.<br />

The remaining packets related to this connection will pass through the <strong>cOS</strong> <strong>Core</strong><br />

"stateful engine".<br />

Let the packet pass through the <strong>Clavister</strong> Security Gateway without setting up a<br />

state for it in the state table. This means that the stateful inspection process is<br />

bypassed and is therefore less secure than Allow or NAT rules. Packet processing<br />

time is also slower than Allow rules since every packet is checked against the entire<br />

rule set.<br />

This functions like an Allow rule, but with dynamic address translation (NAT) enabled<br />

(see Section 7.2, “NAT” in Chapter 7, Address Translation for a detailed description).<br />

This tells <strong>cOS</strong> <strong>Core</strong> to perform static address translation. A SAT rule always requires a<br />

matching Allow, NAT or FwdFast IP rule further down the rule set (see Section 7.4,<br />

“SAT” in Chapter 7, Address Translation for a detailed description).<br />

This tells <strong>cOS</strong> <strong>Core</strong> to immediately discard the packet. This is an "impolite" version of<br />

Reject in that no reply is sent back to the sender. It is often preferable since it gives a<br />

potential attacker no clues about what happened to their packets.<br />

This acts like Drop but will return a TCP RST or ICMP Unreachable message, informing<br />

the sending computer that the packet was dropped. This is a "polite" version of the<br />

Drop IP rule action.<br />

Reject is useful where applications that send traffic wait for a timeout to occur before<br />

realizing that the traffic was dropped. If an explicit reply is sent indicating that the<br />

traffic was dropped, the application need not wait for the timeout.<br />

Note: Some actions alter TCP sequence numbers<br />

In some situations with certain types of network equipment, the TCP sequence number<br />

needs to remain the same as data traffic traverses the security gateway.<br />

It is therefore important to know that only the FwdFast action guarantees that the TCP<br />

sequence number is unaltered. Other IP rule actions, such as Allow and NAT change the<br />

TCP sequence number as traffic flows through <strong>cOS</strong> <strong>Core</strong>.<br />

Logging<br />

When an IP Rule or IP Policy object is created the default is that logging is enabled. This means<br />

that a log message is generated whenever either is triggered. This behavior can be altered by<br />

disabling logging on the individual rule or policy object.<br />

Bi-directional Connections<br />

A common mistake when setting up IP Rules is to define two rules, one rule for traffic in one<br />

direction and another rule for traffic coming back in the other direction. In fact nearly all IP Rules<br />

182

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!