D-Link DFL-2500 User Guide - Page 203

Scenario 2

Page 203 highlights

184 Chapter 19. Intrusion Detection System (IDS) 1. A packet arrives on the firewall and initial verifications regarding source/destination IP addresses and source/destination ports are performed. If this packet is accepted by the firewall's IP rule set, a connection will be established between the source and destination, before passing the packet on to the IDS sub-system. If the packet is a part of an already existing connection, it is also passed on to the IDS sub-system. If the packet is denied by the IP rule set, it is dropped. 2. The source and destination information of the packet is compared to the Intrusion Detection Rules. If a match is found, it is passed on to the next level of IDS processing - pattern matching. If not, it is accepted, with possible further actions, as defined by the rule set (for example address translation, logging, etc). 3. The pattern-matching engine searches the payload of the packet for pre-defined signatures. If a match is found, the final level of IDS processing will be carried out - the action. If not, the packet is accepted, with possible further actions, as defined by the rule set (for example address translation, logging, etc). 4. Depending on the action defined in the Intrusion Detection Rule, the packet can be dropped, logged, both, or ignored. 19.2.2 Scenario 2 This is similar to the first scenario, but with one big difference. Traffic will always be passed on to the IDS regardless of the action chosen by the firewall's IP rule set. This means that traffic that the firewall drops will also be analyzed. Figure 19.2 shows the events sequence when the firewall's IP rule set decides that the traffic is not valid and should be dropped and the traffic is passed to IDS for further analyzing. 1. A packet arrives on the firewall and initial verifications regarding source/destination IP addresses and source/destination ports are performed. The firewall's IP rule set decides that this packet should be dropped, but before that, traffic is passed on to the IDS sub-system for further analyzing. 2. The source and destination information of new packet is compared to the Intrusion Detection Rules. If a match is found, it is passed on to the next level of IDS processing - pattern matching. If not, the packet is dropped. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

184
Chapter 19. Intrusion Detection System (IDS)
1. A packet arrives on the firewall and initial verifications regarding
source/destination IP addresses and source/destination ports are
performed. If this packet is accepted by the firewall’s IP rule set, a
connection will be established between the source and destination,
before passing the packet on to the IDS sub-system. If the packet is a
part of an already existing connection, it is also passed on to the IDS
sub-system. If the packet is denied by the IP rule set, it is dropped.
2. The source and destination information of the packet is compared to
the Intrusion Detection Rules. If a match is found, it is passed on to
the next level of IDS processing - pattern matching. If not, it is
accepted, with possible further actions, as defined by the rule set (for
example address translation, logging, etc).
3. The pattern-matching engine searches the payload of the packet for
pre-defined signatures. If a match is found, the final level of IDS
processing will be carried out – the action. If not, the packet is
accepted, with possible further actions, as defined by the rule set (for
example address translation, logging, etc).
4. Depending on the action defined in the Intrusion Detection Rule, the
packet can be dropped, logged, both, or ignored.
19.2.2
Scenario 2
This is similar to the first scenario, but with one big difference. Traffic will
always be passed on to the IDS regardless of the action chosen by the
firewall’s IP rule set. This means that traffic that the firewall drops will
also be analyzed. Figure
19.2
shows the events sequence when the firewall’s
IP rule set decides that the traffic is not valid and should be dropped and
the traffic is passed to IDS for further analyzing.
1. A packet arrives on the firewall and initial verifications regarding
source/destination IP addresses and source/destination ports are
performed. The firewall’s IP rule set decides that this packet should
be dropped, but before that, traffic is passed on to the IDS
sub-system for further analyzing.
2. The source and destination information of new packet is compared to
the Intrusion Detection Rules. If a match is found, it is passed on to
the next level of IDS processing - pattern matching. If not, the packet
is dropped.
D-Link Firewalls User’s Guide