D-Link DFL-2500 User Guide - Page 61

Service Types

Page 61 highlights

42 Chapter 8. Logical Objects one user's program to other parties in a network. At this layer, other parties are identified and can be reached by specific application protocol types and corresponding parameters, such as port numbers. For example, the Web-browsing service HTTP is defined as to use the TCP protocol with destination port 80. Some of the other popular services at this layer include FTP, POP3, SMTP, Telnet, and so on. Beside these officially defined applications, user customized services can also be created in D-Link firewalls. Services are simplistic, in that they cannot carry out any action in the firewall on their own. Thus, a service definition does not include any information whether the service should be allowed through the firewall or not. That decision is made entirely by the firewall's IP rules, in which the service is used as a filter parameter. For more information about how to use services in rules, please see 14 IP Rules. 8.2.1 Service Types In D-Link firewalls, services can be configured via three options: TCP/UDP, ICMP, and IP Protocol service. A service is basically defined by a descriptive name, the type of the protocol, and protocol parameters. Different services can be united into one Service Group to simplify policy configuration, so that the administrators do not need to configure one rule for every service. TCP and UDP based services Service applications most commonly run on TCP or UDP, and are often associated with a well-known port number. In the firewall, they are defined by the type of protocol that the application uses, and the assigned port number or port range. For many services, a single destination port is sufficient. The HTTP service, for instance, uses TCP destination port 80, Telnet uses TCP 23, and SMTP uses TCP 25. In these cases, all ports (0-65535) will be accepted as source ports. Multiple ports or port ranges may also be set, for instance, a service can be defined as having source ports 1024-65535 and destination ports 80-82, 90-92, 95. In this case, a TCP or UDP packet with the destination port being one of 80, 81, 82, 90, 91, 92 or 95, and the source port being in the range 1024-65535, will match this service. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

42
Chapter 8. Logical Objects
one user’s program to other parties in a network. At this layer, other
parties are identified and can be reached by specific
application protocol
types
and corresponding parameters, such as
port numbers
. For
example, the Web-browsing service HTTP is defined as to use the
TCP
protocol
with destination
port 80
. Some of the other popular services at this
layer include FTP, POP3, SMTP, Telnet, and so on. Beside these officially
defined applications, user customized services can also be created in D-Link
firewalls.
Services are simplistic, in that they cannot carry out any action in the
firewall on their own. Thus, a service definition does not include any
information whether the service should be allowed through the firewall or
not. That decision is made entirely by the firewall’s
IP rules
, in which the
service is used as a filter parameter. For more information about how to
use services in rules, please see
14 IP Rules
.
8.2.1
Service Types
In D-Link firewalls, services can be configured via three options:
TCP/UDP, ICMP,
and
IP Protocol
service. A service is basically defined
by a descriptive
name
, the
type
of the protocol, and protocol
parameters
.
Different services can be united into one
Service Group
to simplify policy
configuration, so that the administrators do not need to configure one rule
for every service.
TCP and UDP based services
Service applications most commonly run on TCP or UDP, and are often
associated with a well-known port number. In the firewall, they are defined
by the type of protocol that the application uses, and the assigned port
number or port range. For many services, a single
destination port
is
sufficient. The HTTP service, for instance, uses TCP destination port 80,
Telnet uses TCP 23, and SMTP uses TCP 25. In these cases, all ports
(0-65535) will be accepted as source ports.
Multiple
ports
or
port ranges
may also be set, for instance, a service can
be defined as having source ports 1024-65535 and destination ports 80-82,
90-92, 95. In this case, a TCP or UDP packet with the destination port
being one of 80, 81, 82, 90, 91, 92 or 95, and the source port being in the
range 1024-65535, will match this service.
D-Link Firewalls User’s Guide