HP-UX IPFilter A.03.05.13 Administrator's Guide: HP-UX 11i v3
Table Of Contents
- HP-UX IPFilter Version A.03.05.13 Administrator's Guide
- Legal Notices
- Table of Contents
- Preface: About This Document
- 1 Installing and Configuring HP-UX IPFilter
- Overview of HP-UX IPFilter Installation
- Step 1: Checking HP-UX IPFilter Installation Prerequisites
- Step 2: Loading HP-UX IPFilter Software
- Step 3: Determining the Rules for IPFilter
- Step 4: Adding Rules to the Rules Files
- Step 5: Loading IPFilter and NAT Rules
- Step 6: Verifying the Installation and Configuration
- Kernel Tunable Parameters
- Supported and Unsupported Interfaces
- Troubleshooting HP-UX IPFilter
- 2 HP-UX IPFilter on HP-UX 11i Version 3
- 3 Rules and Keywords
- IPFilter Configuration Files
- Basic Rules Processing
- IPFilter Keywords
- pass and block: Controlling IP Traffic
- in and out: Bidirectional Filtering
- quick: Optimizing IPFilter Rules Processing
- on: Filtering by Network Interfaces
- from and to: Filtering by IP Addresses and Subnets
- log: Tracking Packets on a System
- proto: Controlling Specific Protocols
- opt and ipopts: Filtering on IP Options
- icmp-type: Filtering ICMP Traffic by Type
- port: Filtering on TCP and UDP Ports
- keep state: Protecting TCP, UDP, and ICMP Sessions
- flags: Tight Filtering Based on TCP Header Flags
- keep frags: Letting Fragmented Packets Pass
- with frags: Dropping Fragmented Packets
- with short: Dropping Short Fragments
- return-rst: Responding to Blocked TCP Packets
- return-icmp: Responding to Blocked ICMP Packets
- dup-to: Drop-Safe Logging
- NAT Keywords
- 4 Dynamic Connection Allocation
- 5 Firewall Building Concepts
- Blocking Services by Port Number
- Using Keep State
- Using Keep State with UDP
- Using Keep State with ICMP
- Logging Techniques
- Improving Performance with Rule Groups
- Localhost Filtering
- Using the to
- Creating a Complete Filter by Interface
- Combining IP Address and Network Interface Filtering
- Using Bidirectional Filtering Capabilities
- Using port and proto to Create a Secure Filter
- 6 HP-UX IPFilter Utilities
- 7 HP-UX IPFilter and FTP
- 8 HP-UX IPFilter and RPC
- 9 HP-UX IPFilter and IPSec
- 10 HP-UX IPFilter and Serviceguard
- A HP-UX IPFilter Configuration Examples
- B HP-UX IPFilter Static Linking
- C Performance Guidelines
- Index

Rules and Keywords
IPFilter Keywords
Chapter 3 47
return-rst: Responding to Blocked TCP Packets
When you use the block keyword as described in “pass and block:
Controlling IP Traffic” on page 36, the blocked packet is dropped and no
response is sent to the remote system the packet. This can be a security
risk, because it might alert an attacker that a packet filter is running on
the system.
When a service is not running on a UNIX system, it normally notifies the
remote host with a return packet. In TCP, this is done with a Reset (RST)
packet. To configure IPFilter to return an RST packet to the origin, use
the return-rst keyword. For example:
block return-rst in quick on lan0 proto tcp from HostA to any
port = 23
pass out quick on lan0 proto tcp from any port = 23 to any
flags R/RSFUP
The first rule blocks the telnet connection from HostA and generates a
TCP RST packet. The second rule is necessary to let out the packet.
This example has two block statements since return-rst only works
with TCP; it still blocks UDP and ICMP protocols. When this is done, the
remote side receives a Connection Refused message instead of a
Connection Timed Out message.
return-icmp: Responding to Blocked ICMP Packets
You can configure IPFilter to send an error message when a packet is
sent to a UDP port on your system. For example:
block return-icmp(port-unr) in log quick on lan0 proto udp from
any to 20.20.20.0/24 port
The port-unreachable (port-unr) message is the default for a
return-icmp message. HP recommends that you use this message when
configuring most return-icmp rules.
When rules with return-icmp are configured, IPFilter returns the ICMP
packet with the IP address of the firewall, not the original destination of
the packet. Use the return-icmp-as-dest keyword to return the
original destination of the ICMP packet. The format is:
block return-icmp-as-dest(port-unr) in log on lan0 proto udp
from any to 20.20.20.0/24 port = 111