4.7.1 IP Filter
25
The following security features can be configured:
±
“
Port Forwarding
”
±
“
Parental Control/URL Filter
”
±
“
DMZ Host
”
±
“
IP Filter
”
To access these pages:
1.
Select
Configuration
>
Security
. The following page opens.
Figure 4-28: Security setting page
2.
To access and configure specific security feature, click the corresponding tab in this page.
4.7.1
IP Filter
Stateful Firewall
Settings on this page are actually Firewall settings. A stateful Firewall tracks the movement of packets over
a period of time. If an outgoing packet includes a request for responses from certain types of incoming
packet, the packet is tracked to ensure that only those types of incoming packets are allowed through the
Firewall. Other types of traffic are blocked. Each time outbound packets are sent from an inside host to an
outside host, the following stateful information is logged by the Firewall:
±
source and destination addresses
±
port details; protocol type and range of source and destination ports
±
sequencing information
±
additional flags for each connection associated with that particular inside host
All inbound packets are compared against this logged information and any manually configured address
and port details. These packets are only allowed through the Firewall if an appropriate connection exists or
if a filter explicitly allows that traffic. Address and port details are configured by defining Firewall validators
and filters. This makes it very difficult for hackers to break through the stateful Firewall, because they
would need to know addresses, port numbers, sequencing information and individual connection flags for
an inside host.
Firewall policies
A Firewall policy is the name of the rule that applies to a data path between two classes of security
interface. You can add different address validator and filter rules to each policy in order to provide different
levels of security to the inside networks attached to the router. For example, if your DMZ (DeMilitarited
Zone) contains an FTP server that can be accessed by external hosts, the rules between the dmz and
external security interfaces will be less stringent than those between the internal and external security
interfaces. Policies exist by default:
±
between the external interface and the internal interface
±
between the external interface and the DMZ interface
±
between the DMZ interface and the internal interface