D-Link DFL-2500 User Guide - Page 129

Fields

Page 129 highlights

110 Chapter 14. IP Rules connection is found. The action of the rule is then carried out. If the action is Allow, the connection will be established and a state representing the connection is added to the firewall's internal state table. If the action is Drop, the new connection will be refused. First matching principle - If there are several matching rules, the first matching one decides what will happen to the connection. (Except for SAT rules, shown in Example.) Consecutive packets belonging to an existing connection will not need to be evaluated again. Instead, a highly optimized state-lookup algorithm will search the internal state table for an existing state representing the connection. This methodology is applied not only on TCP connections, but on UDP and ICMP traffic as well. Thus, the size of the firewall ruleset does not affect the throughput of the firewall. A rule is expressed in a definite form, consisting of two logical parts: the fields and the action. The subsections below explain the parameters of a rule that are available in D-Link firewalls. 14.1.1 Fields Fields are some pre-defined and reusable network objects, such as Addresses and Services, which are used by every rule for matching purpose. The following fields in the rule list are used by the firewall to check a packet in the traffic flow. All these filtering fields have to match the contents of a packet for any rule to trigger. ◦ Service: the protocol type that the packet must match. (Services are defined as logical objects before configuring the rules, see 8.2 Services ) ◦ Source Interface: one or a group of interfaces where the packet is received on the firewall. ◦ Source Network: the network that the source IP address of the packet matches. ◦ Destination Interface: one or a group of interfaces where the packet is aiming at. ◦ Destination Network: the network that the destination IP address of the packet matches. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

110
Chapter 14. IP Rules
connection is found. The action of the rule is then carried out. If the action
is
Allow
, the connection will be established and a
state
representing the
connection is added to the firewall’s internal state table. If the action is
Drop
, the new connection will be refused.
First matching principle
– If there are several matching rules, the first
matching one decides what will happen to the connection. (Except for SAT
rules, shown in
Example
.)
Consecutive packets belonging to an existing connection will not need to be
evaluated again. Instead, a highly optimized
state-lookup
algorithm will
search the internal state table for an existing state representing the
connection. This methodology is applied not only on TCP connections, but
on UDP and ICMP traffic as well. Thus, the size of the firewall ruleset does
not affect the throughput of the firewall.
A rule is expressed in a definite form, consisting of two logical parts:
the
fields
and
the action
. The subsections below explain the parameters of a
rule that are available in D-Link firewalls.
14.1.1
Fields
Fields are some pre-defined and reusable network objects, such as
Addresses
and
Services
, which are used by every rule for matching purpose. The
following fields in the rule list are used by the firewall to check a packet in
the traffic flow. All these filtering fields have to match the contents of a
packet for any rule to trigger.
Service
: the protocol type that the packet must match.
(Services are defined as logical objects before configuring the rules,
see
8.2 Services
)
Source Interface
: one or a group of interfaces where the packet is
received on the firewall.
Source Network
: the network that the source IP address of the
packet matches.
Destination Interface
: one or a group of interfaces where the
packet is aiming at.
Destination Network
: the network that the destination IP address
of the packet matches.
D-Link Firewalls User’s Guide