3Com Router User Manual
Here you can view all the pages of manual 3Com Router User Manual. The 3Com manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 551
39 CONFIGURING FIREWALL This chapter covers the following topics: ■Firewall Overview ■Configure Firewall ■Displaying and Debugging Firewall ■Firewall Configuration Example Firewall OverviewA firewall is used to control the network equipment, which accesses the internal network resources. Setting a firewall at the access entry point of the intranet can control access to the internal network resources by the external network devices. In case of multiple entry points, every access entry point should...
Page 552
548CHAPTER 39: CONFIGURING FIREWALL Classification of Firewalls Usually firewalls are divided into two types: network layer firewalls and application layer firewalls. A network layer firewall mainly obtains the packet head information of data packets, such as protocol number, source address and source port, destination address and destination port, or directly obtains the data of a packet head. But an application layer firewall analyzes the whole information stream. Commonly used firewalls include...
Page 553
Firewall Overview549 Figure 171 Packet filtering schematic diagram The following can be realized by data packet filtering: ■Prohibit logging on with telnet from outside ■Every E-mail is sent by SMTP (Simple Message Transfer Protocol). ■One PC, rather than all other PCs, can send news to us by NNTP (Network News Transfer Protocol). Packet filtering in 3Com routers security equipment features the following: ■Based on access-list (Access Control List - ACL): ACL is applied not only in packet filtering...
Page 554
550CHAPTER 39: CONFIGURING FIREWALL acl acl-number [ match-order config | auto ] rule { normal | special }{ permit | deny } [source source-addr source-wildcard | any ] ■Extended access control list acl acl-number [ match-order config | auto ] rule { normal | special }{ permit | deny } pro-number [source source-addr source-wildcard | any ] [source-port operator port1 [ port2 ] ] [ destination dest-addr dest- wildcard | any ] [destination-port operator port1 [ port2 ] ] [icmp-type icmp-type...
Page 555
Firewall Overview551 Ta b l e 619 Mnemonic Symbol of the Port Number ProtocolMnemonic SymbolMeaning and Actual Value TCPbgp chargen cmd daytime discard domain echo exec finger ftp ftp-data gopher hostname irc chat klogin kshell login lpd nntp pop2 pop3 smtp sunrpc syslog tacacs talk telnet time uucp whois www Border Gateway Protocol (179) Character generator (19) Remote commands (rcmd, 514) Daytime (13) Discard (9) Domain Name Service (53) Echo (7) Exec (rsh, 512) Finger (79) File Transfer Protocol...
Page 556
552CHAPTER 39: CONFIGURING FIREWALL As for the ICMP, you can specify the ICMP packet type. You can use a number (ranging 0 to 255) or a mnemonic symbol to specify the packet type. UDPbiff bootpc bootps discard dns dnsix echo mobilip-ag mobilip-mn nameserver netbios-dgm netbios-ns netbios-ssn ntp rip snmp snmptrap sunrpc syslog tacacs-ds talk tftp time who Xdmcp Mail notify (512) Bootstrap Protocol Client (68) Bootstrap Protocol Server (67) Discard (9) Domain Name Service (53) DNSIX Securit Attribute...
Page 557
Firewall Overview553 Ta b l e 620 Mnemonic Symbol of the ICMP Message Type By configuring the firewall and adding appropriate access rules, you can use packet filtering to check IP packets that pass the router. The passing of unexpected packets can thus be prohibited. In this way the packet filtering helps to protect the network security. Configure the match sequence of access control list An access control rule can be composed of several “permit” and “deny” statements and the range of the data...
Page 558
554CHAPTER 39: CONFIGURING FIREWALL The “depth-first” principle means matching the access rules with the smallest definition range of data packets. It can be achieved by comparing the wildcards of address. The smaller the wildcards are, the smaller the range specified by the host is. For example, 129.102.1.1.0.0.0.0 specifies a host (the address is 129.102.1.1), while 129.102.1.1.0.0.255.255 specifies a network segment (the range of the address is from 129.102.1.1 to 129.102.255.255), obviously the...
Page 559
Configure Firewall 555 Configuring Standard Access Control ListThe value of the standard access control list is an integer from 1 to 99. First of all, enter the ACL view through acl command, and configure the match sequence of the access control list, and then configure specific access rules through rule command. If the matching sequence is not configured, it will be conducted by auto mode. Perform the following configurations in system view and ACL view. Ta b l e 622 Configure Standard Access...
Page 560
556CHAPTER 39: CONFIGURING FIREWALL normal means that this rule functions during normal time range, while special means that this rule will function during the special time range. Users shall set the special time range when using special. Multiple rules with the same serial number will be matched according to “depth-first”principle. By default, normal is adopted. Setting the Default Firewall Filtering ModeThe default firewall-filtering mode means that when there is no suitable access rule to...