Firewall rules set up
Issue 4 May 2005
167
12. If the filter rule set for the intended traffic is also to be applied to the reply packets, select
Keep State. This function can be applied to TCP, UDP, and ICMP packets.
13. If you want to change the default time-out settings for the TCP state, UDP state, or ICMP
state, click Advanced.
Note:
Note:
Keep State sets up a state table, with each entry set up by the sending side.
Reply packets pass through a matching filter that is based on the respective state
table entry. A state entry is not created for packets that are denied.
Note:
Note:
Although UDP is connectionless, if a packet is first sent out from a given port, a
reply is expected in the reverse direction on the same port. Keep State
“remembers” the port and ensures that the replying packet enters in the same
port.
14. Select the position of the firewall policy in the template.
15. Click Finish to return to the Firewall tab.
Priority of Firewall rules versus NAT rules
When packets pass through zones that have both Firewall rules and NAT rules set up, NAT
rules are applied before the firewall rules are applied. Depending on the type of NAT rule: static,
port NAT, or redirection, either the source IP address or the destination IP address of packets
are changed. When you set up your firewall rules, you need to consider the type of NAT
configured, as you must create the firewall rule to filter on the translated IP address and ports,
not on the original address and ports.
Setting up firewall rules for FTP
FTP and Firewall/NAT Operation
The File Transfer Protocol (FTP) uses two TCP connections, one for control, and another for
data. The primary methods for establishing the data connection are passive-FTP and
active-FTP. In the passive-FTP case, the FTP client makes the data connection to an IP
address/port the FTP server has specified. An active-FTP data connection is initiated by the
FTP server using information specified by the FTP client.
If the FTP client and FTP server are separated by a firewall, control and/or data connections will
normally be blocked. For FTP to function properly, state must be maintained for control and data
connections to complete. Typically, a wide range of ports behind the firewall also must be
exposed to the external network in order for an external FTP client (passive-FTP) or external
FTP server (active-FTP) data connection to be established. So, the location of client/server, as
well as mode of operation (active/passive-FTP) dictates the type of firewall issues.
Summary of Contents for 3.7
Page 1: ...VPNmanager Configuration Guide Release 3 7 670 100 600 Issue 4 May 2005...
Page 4: ......
Page 20: ...Preface 20 Avaya VPNmanager Configuration Guide Release 3 7...
Page 32: ...Overview of implementation 32 Avaya VPNmanager Configuration Guide Release 3 7...
Page 53: ...Preferences Issue 4 May 2005 53 Figure 16 Tunnel End Point Policy...
Page 54: ...Using VPNmanager 54 Avaya VPNmanager Configuration Guide Release 3 7...
Page 244: ...Using advanced features 244 Avaya VPNmanager Configuration Guide Release 3 7...
Page 292: ...Upgrading firmware and licenses 292 Avaya VPNmanager Configuration Guide Release 3 7...