D-Link DFL-2500 User Guide - Page 143

Access Rule

Page 143 highlights

124 Chapter 15. Access (Anti-spoofing) attacks. Even if the firewall is able to detect the DoS attacks, it is hard to trace or stop it because of the spoofing. 15.1.2 Anti-spoofing To equip the firewalls with Anti-spoofing capability, an extra filter against the source address verification is in need. D-Link firewalls provide the network administrators choices to do the source based IP filtering by Access Rule. Other features provided by D-Link firewalls, such as User Authentication and Encryption, ensure that proper authentication measures are in place and communication are carried out over secure channels, which can also reduce the spoofing threats.(See 17 User Authentication, VIII VPN) 15.2 Access Rule 15.2.1 Function The Access rule is capable of monitoring traffic to verify that packets arriving on an interface of the firewall do not have a source address which is associated with a network of another interface. In other words, the principle of the rules can be described as follows: • Any incoming traffic with a source IP address belonging to a local trusted host is NOT allowed. • Any outgoing traffic with a source IP address belonging to an outside untrusted network is NOT allowed. The first one prevents an outsider to use a local host's address as source address, and the second one prevents any local host to launch the spoofing. The Access rule set act as an add on filter to the firewall's rules list, and ensures that the source addresses of packets received on a specific interface are always within the correct network, provided that the Access rule is correctly configured. If the Access section lookup does not produce a hit, the firewall will perform a reverse lookup in its routing table. 15.2.2 Settings The configuration of an access rule is similar to normal rule, containing Filtering Fields and the Action to take. If the traffic matches all the fields, D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

124
Chapter 15. Access (Anti-spoofing)
attacks. Even if the firewall is able to detect the DoS attacks, it is hard to
trace or stop it because of the spoofing.
15.1.2
Anti-spoofing
To equip the firewalls with
Anti-spoofing
capability, an extra filter against
the source address verification is in need. D-Link firewalls provide the
network administrators choices to do the source based IP filtering by
Access Rule
.
Other features provided by D-Link firewalls, such as
User Authentication
and
Encryption
, ensure that proper authentication measures are in place
and communication are carried out over secure channels, which can also
reduce the spoofing threats.(See
17 User Authentication
,
VIII VPN
)
15.2
Access Rule
15.2.1
Function
The
Access rule
is capable of monitoring traffic to verify that packets
arriving on an interface of the firewall do not have a source address which is
associated with a network of another interface. In other words, the
principle of the rules can be described as follows:
Any incoming traffic with a source IP address belonging to a local
trusted host is NOT allowed.
Any outgoing traffic with a source IP address belonging to an outside
untrusted network is NOT allowed.
The first one prevents an outsider to use a local host’s address as source
address, and the second one prevents any local host to launch the spoofing.
The Access rule set act as an add on filter to the firewall’s rules list, and
ensures that the source addresses of packets received on a specific interface
are always within the correct network, provided that the Access rule is
correctly configured. If the Access section lookup does not produce a hit,
the firewall will perform a reverse lookup in its routing table.
15.2.2
Settings
The configuration of an access rule is similar to normal rule, containing
Filtering Fields
and the
Action
to take. If the traffic matches all the fields,
D-Link Firewalls User’s Guide