Page 116 / 252 Scroll up to view Page 111 - 115
Chapter 17 Firewall
NBG5715 User’s Guide
116
What is a Firewall?
Originally, the term “firewall” referred to a construction technique designed to prevent the spread of
fire from one room to another. The networking term "firewall" is a system or group of systems that
enforces an access-control policy between two networks. It may also be defined as a mechanism
used to protect a trusted network from a network that is not trusted. Of course, firewalls cannot
solve every security problem. A firewall is one of the mechanisms used to establish a network
security perimeter in support of a network security policy. It should never be the only mechanism or
method employed. For a firewall to guard effectively, you must design and deploy it appropriately.
This requires integrating the firewall into a broad information-security policy. In addition, specific
policies must be implemented within the firewall itself.
Stateful Inspection Firewall
Stateful inspection firewalls restrict access by screening data packets against defined access rules.
They make access control decisions based on IP address and protocol. They also "inspect" the
session data to assure the integrity of the connection and to adapt to dynamic protocols. These
firewalls generally provide the best speed and transparency; however, they may lack the granular
application level access control or caching that some proxies support. Firewalls, of one type or
another, have become an integral part of standard security solutions for enterprises.
About the NBG5715 Firewall
The NBG5715’s firewall feature physically separates the LAN and the WAN and acts as a secure
gateway for all data passing between the networks.
It is a stateful inspection firewall and is designed to protect against Denial of Service attacks when
activated (click
the
General
tab under
Firewall
and then click the
Enable
Firewall
check box).
The NBG5715's purpose is to allow a private Local Area Network (LAN) to be securely connected to
the Internet. The NBG5715 can be used to prevent theft, destruction and modification of data, as
well as log events, which may be important to the security of your network.
The NBG5715 is installed between the LAN and a broadband modem connecting to the Internet.
This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
The NBG5715 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically
separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband
(cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security from
the outside world. These computers will have access to Internet services such as e-mail, FTP and
the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host
is authorized to use a specific service.
Guidelines For Enhancing Security With Your Firewall
1
Change the default password via Web Configurator.
2
Think about access control before you connect to the network in any way, including attaching a
modem to the port.
3
Limit who can access your router.
Page 117 / 252
Chapter 17 Firewall
NBG5715 User’s Guide
117
4
Don't enable any local service (such as NTP) that you don't use. Any enabled service could present
a potential security risk. A determined hacker might be able to find creative ways to misuse the
enabled services to access the firewall or the network.
5
For local services that are enabled, protect against misuse. Protect by configuring the services to
communicate only with specific peers, and protect by configuring rules to block packets for the
services at specific interfaces.
6
Protect against IP spoofing by making sure the firewall is active.
7
Keep the firewall in a secured (locked) room.
17.2
The Firewall General Screen
Use this screen to enable or disable the NBG5715’s firewall, and set up firewall logs. Click
Security
>
Firewall
to open the
General
screen.
Figure 74
Security > Firewall > General l
The following table describes the labels in this screen.
17.3
The Firewall Services Screen
If an outside user attempts to probe an unsupported port on your NBG5715, an ICMP response
packet is automatically returned. This allows the outside user to know the NBG5715 exists. Use this
screen to prevent the ICMP response packet from being sent. This keeps outsiders from discovering
your NBG5715 when unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the services you want
to block and the date/time you want to block them.
Click
Security
>
Firewall
>
Services
. The screen appears as shown next.
Table 52
Security > Firewall > General
LABEL
DESCRIPTION
Enable Firewall
Select this check box to activate the firewall. The NBG5715 performs access
control and protects against Denial of Service (DoS) attacks when the firewall is
activated.
Apply
Click
Apply
to save the settings.
Reset
Click
Reset
to start configuring this screen again.
Page 118 / 252
Chapter 17 Firewall
NBG5715 User’s Guide
118
Figure 75
Security > Firewall > Services l
The following table describes the labels in this screen.
Table 53
Security > Firewall > Services
LABEL
DESCRIPTION
LABEL
DESCRIPTION
ICMP
Internet Control Message Protocol is a message control and error-reporting
protocol between a host server and a gateway to the Internet. ICMP uses
Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP
software and directly apparent to the application user.
Respond to Ping
on
The NBG5715 will not respond to any incoming Ping requests when
Disable
is
selected. Select
LAN
to reply to incoming LAN Ping requests. Select
WAN
to
reply to incoming WAN Ping requests. Otherwise select
LAN & WAN
to reply to
all incoming LAN and WAN Ping requests.
Apply
Click
Apply
to save the settings.
Enable Firewall Rule
Enable Firewall
Rule
Select this check box to activate the firewall rules that you define (see
Add
Firewall Rule
below).
Apply
Click
Apply
to save the settings.
Add Firewall Rule
Service Name
Enter a name that identifies or describes the firewall rule.
MAC Address
Enter the MAC address of the computer for which the firewall rule applies.
Dest IP Address
Enter the IP address of the computer to which traffic for the application or
service is entering.
The NBG5715 applies the firewall rule to traffic initiating from this computer.
Source IP Address
Enter the IP address of the computer that initializes traffic for the application or
service.
The NBG5715 applies the firewall rule to traffic initiating from this computer.
Page 119 / 252
Chapter 17 Firewall
NBG5715 User’s Guide
119
See
Appendix E on page 237
for commonly used services and port numbers.
Protocol
Select the protocol (
ALL
,
TCP
,
UDP
or
BOTH
) used to transport the packets for
which you want to apply the firewall rule.
Dest Port Range
Enter the port number/range of the destination that define the traffic type, for
example TCP port 80 defines web traffic.
Source Port
Range
Enter the port number/range of the source that define the traffic type, for
example TCP port 80 defines web traffic.
Add Rule
Click
Add
to save the firewall rule.
Firewall Rule
#
This is your firewall rule number. The ordering of your rules is important as rules
are applied in turn.
Service Name
This is a name that identifies or describes the firewall rule.
MAC address
This is the MAC address of the computer for which the firewall rule applies.
Dest IP
This is the IP address of the computer to which traffic for the application or
service is entering.
Source IP
This is the IP address of the computer from which traffic for the application or
service is initialized.
Protocol
This is the protocol (
ALL
,
TCP
,
UDP
or
BOTH
) used to transport the packets for
which you want to apply the firewall rule.
Dest Port Range
This is the port number/range of the destination that define the traffic type, for
example TCP port 80 defines web traffic.
Source Port
Range
This is the port number/range of the source that define the traffic type, for
example TCP port 80 defines web traffic.
Action
DROP
- Traffic matching the conditions of the firewall rule are stopped.
Delete
Click
Delete
to remove the firewall rule.
Reset
Click
Reset
to start configuring this screen again.
Table 53
Security > Firewall > Services (continued)
LABEL
DESCRIPTION
Page 120 / 252
Chapter 17 Firewall
NBG5715 User’s Guide
120

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top