D-Link DFL-800-AV-12 User Manual - Page 73

The IP Rule Set, 3.5.1. Security Policies, Policy Characteristics

Page 73 highlights

3.5. The IP Rule Set Chapter 3. Fundamentals 3.5. The IP Rule Set 3.5.1. Security Policies Policy Characteristics NetDefendOS Security Policies designed by the administrator, regulate the way in which traffic can flow through a D-Link Firewall. Policies in NetDefendOS are defined by different NetDefendOS rule sets. These rule sets share a common means of specifying filtering criteria which determine the type of traffic to which they will apply. This set of criteria consists of: Source Interface Source Network Destination Interface Destination Network Service An Interface or Interface Group where the packet is received at the D-Link Firewall. This can also be a VPN tunnel. The network that contains the source IP address of the packet. This might be a NetDefendOS IP object which could define a single IP address or range of addresses. An Interface or an Interface Group from which the packet would leave the D-Link Firewall. This can also be a VPN tunnel. The network to which the destination IP address of the packet belongs. This might be a NetDefendOS IP object which could define a single IP address or range of addresses. The protocol type to which the packet belongs. Service objects define a protocol/port type. Examples might be HTTP or ICMP. Custom services can also be defined.(see Section 3.2, "Services" for more information.) The NetDefendOS rule sets, all of which use the same five filtering parameters, include: • IP rules. • Pipe rules (see Section 10.1, "Traffic Shaping"). • Policy-based Routing rules (see Section 4.3, "Policy-based Routing"). • IDP rules (see Section 6.5, "Intrusion Detection and Prevention"). • Authentication rules (source net/interface only - see Chapter 8, User Authentication). Specifying Any Interface or Network When specifying the filtering criteria in any of the rule sets specified above there are three useful pre-defined options that can be used : • For a Source or Destination Network, the all-nets option is equivalent to the IP address 0.0.0.0/0 which will mean that any IP address is acceptable. • For Source or Destination Interface, the any option can be used so that NetDefendOS will not care about the interface which the traffic is going to or coming from. • The Destination Interface can be specified as core. This means that traffic, such as an ICMP Ping is destined for the D-Link Firewall itself and it is NetDefendOS that will respond to it. 73

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

3.5. The IP Rule Set
3.5.1. Security Policies
Policy Characteristics
NetDefendOS Security
Policies
designed by the administrator, regulate the way in which traffic can
flow through a D-Link Firewall. Policies in NetDefendOS are defined by different NetDefendOS
rule sets
. These rule sets share a common means of specifying filtering criteria which determine the
type of traffic to which they will apply. This set of criteria consists of:
Source Interface
An
Interface
or
Interface Group
where the packet is received at
the D-Link Firewall. This can also be a VPN tunnel.
Source Network
The network that contains the source IP address of the packet.
This might be a NetDefendOS IP object which could define a
single IP address or range of addresses.
Destination Interface
An
Interface
or an
Interface Group
from which the packet
would leave the D-Link Firewall. This can also be a VPN tunnel.
Destination Network
The network to which the destination IP address of the packet
belongs. This might be a NetDefendOS IP object which could
define a single IP address or range of addresses.
Service
The protocol type to which the packet belongs. Service objects
define a protocol/port type. Examples might be
HTTP
or
ICMP
.
Custom services can also be defined.(see Section 3.2, “Services”
for more information.)
The NetDefendOS rule sets, all of which use the same five filtering parameters, include:
IP rules.
Pipe rules (see Section 10.1, “Traffic Shaping”).
Policy-based Routing rules (see Section 4.3, “Policy-based Routing”).
IDP rules (see Section 6.5, “Intrusion Detection and Prevention”).
Authentication rules (source net/interface only - see Chapter 8,
User Authentication
).
Specifying Any Interface or Network
When specifying the filtering criteria in any of the rule sets specified above there are three useful
pre-defined options that can be used :
For a Source or Destination Network, the
all-nets
option is equivalent to the IP address
0.0.0.0/0
which will mean that any IP address is acceptable.
For Source or Destination Interface, the
any
option can be used so that NetDefendOS will not
care about the interface which the traffic is going to or coming from.
The Destination Interface can be specified as
core
. This means that traffic, such as an ICMP
Ping
is destined for the D-Link Firewall itself and it is NetDefendOS that will respond to it.
3.5. The IP Rule Set
Chapter 3. Fundamentals
73