11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Packet-Filtering Routers<br />

Previous Table of Contents Next<br />

A packet-filtering router usually depends on access rules—that is, rules you set up within the router<br />

software itself. A packet filter usually has a rule set that starts with least common and works its way up<br />

to most common. What’s a rule set? Typically, a rule set looks something like a routing table but<br />

includes sockets as well as addresses. Any packet that comes in is compared against rule 1, then rule 2,<br />

all the way to the end. If at any time it matches up against a rule, processing stops. For example, for my<br />

192.168.1.0 network, the rules might be as follows:<br />

• Allow 192.168.1.0:any on if 0 to connect to all:any.<br />

• Deny all:any to connect to all:any.<br />

This means that anybody within my 192.168.1.0 network (provided they come in on router interface<br />

0) can connect to anything they darn well please. If condition 1 was not true, then condition 2 would<br />

apply, which denies everything. This is probably the most common firewall configuration: Allow certain<br />

sockets (or all sockets) from the inside to go to the outside and disallow all other connections (for<br />

example, connections from the outside).<br />

The most effective packet-filtering routers will have a filter on “which interface” the packet comes in on,<br />

in addition to what IP address the packet is from. This helps eliminate packet spoofing, where a packet<br />

claims to be from a certain network, but actually is not.<br />

A complex rule set results in confusion and possible misconfiguration. If you’re configuring a rule set,<br />

you should keep it simple.<br />

You should know that certain applications (such as active FTP) will ask the destination station to initiate a<br />

connection back to the requesting workstation, even though it’s a TCP application. It’s sort of like “Hey<br />

Fred, find out when the movie is, then call me back.”<br />

Under many firewall configurations, this is prohibited, because it means the firewall has to be configured<br />

so that a random workstation from the outside can initiate a connection to a random workstation on the<br />

inside. Might as well use a colander rather than a firewall!<br />

You can usually get around this type of application problem by using a different mode of the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!