User Manual
Security Examples
11-30
◆ Prevents IP spoofing
◆ Permits outgoing Telnet connections
◆ Permits SMTP (Simple Mail Transfer Protocol) traffic to the local SMTP server, 192.0.1.102. The
backup SMTP server is 192.0.1.103
◆ Permits NNTP (Network News Transfer Protocol) traffic between the local NNTP server,
192.0.1.104, and the remote NNTP server, 192.0.2.100
◆ Permits outgoing FTP connections
◆ Denies X-Windows traffic, but permits incoming TCP/IP traffic to ports 1023 and higher.
◆ Permits DNS queries to the local Domain Name Server, 192.0.1.101
◆ Permits ICMP (Internet Control Message Protocol) messages
◆ Permits outgoing finger requests
The firewall will be named fw_i. Packets that do not specifically match the filters in fw_i will be denied
passage through the SCS.
Note: Due to the length of the commands in the following examples, the keywords
Define and Filter are shortened to Def and Filt.
The Set/Define Filter Create command is used to create the firewall.
Figure 11-58: Creating the Filter List
To prevent IP spoofing, the Define Filter Add Deny IP SRC command is used. This filter will block any
packets from an outside network that claim to have originated from the local network. This filter is placed
at the beginning of the filter list; if it were not, spoofed IP packets could be permitted passage by filters
positioned before this rule.
Figure 11-59: Preventing IP Spoofing
Note: The CERT advisory on IP spoofing is available from ftp://cert.org/pub/
cert_advisories/CA-95:01.IP.spoofing.
To permit outgoing Telnet connections initiated from the local network, the following command is used:
Figure 11-60: Permitting Outgoing Telnet Connections
Local>> DEF FILT fw_i CREATE
Local>> DEF FILT fw_i ADD DENY IP SRC 255.255.255.0 192.0.1.0
Local>> DEF FILT fw_i ADD ALLOW IP TCP SPORT EQ TELNET DPORT GT 1023 ACK