Contents
Text formatting conventions..........................................................................................................................................................................................................................7
Command syntax conventions....................................................................................................................................................................................................................7
Notes, cautions, and warnings.....................................................................................................................................................................................................................8
Brocade customers........................................................................................................................................................................................................................................... 8
Brocade OEM customers..............................................................................................................................................................................................................................9
Stateful firewall and connection tracking........................................................................................................................................................................................................14
TCP strict tracking.......................................................................................................................................................................................................................................................15
Applying firewall instances to interfaces.........................................................................................................................................................................................................16
Interaction between firewall, NAT, and routing............................................................................................................................................................................................16
Zone-based firewall....................................................................................................................................................................................................................................................17
Control plane policing............................................................................................................................................................................................................................................... 19
Filtering on source IP address................................................................................................................................................................................................................. 22
Filtering on source and destination IP addresses.........................................................................................................................................................................22
Filtering on source IP address and destination protocol.......................................................................................................................................................... 23
Defining a network-to-network filter.....................................................................................................................................................................................................24
Filtering on source MAC address.......................................................................................................................................................................................................... 25
Excluding an address.................................................................................................................................................................................................................................... 26
Matching TCP flags........................................................................................................................................................................................................................................ 27
Matching ICMP type names..................................................................................................................................................................................................................... 28
Matching groups..............................................................................................................................................................................................................................................28
Configuring stateful behavior per rule set..........................................................................................................................................................................................29
Configuring global state policies............................................................................................................................................................................................................ 30
Filtering traffic between zones...................................................................................................................................................................................................................31
Filtering traffic between the transit zones..........................................................................................................................................................................................33
Applying a rule set to a VRRP interface............................................................................................................................................................................................. 35
Using VRRP with a zone-based firewall.............................................................................................................................................................................................36
Brocade 5600 vRouter Firewall Configuration Guide
53-1004253-01
3
Summary of Contents for 5600 vRouter
Page 6: ...Brocade 5600 vRouter Firewall Configuration Guide 6 53 1004253 01 ...
Page 10: ...Preface Brocade 5600 vRouter Firewall Configuration Guide 10 53 1004253 01 ...
Page 12: ...About This Guide Brocade 5600 vRouter Firewall Configuration Guide 12 53 1004253 01 ...
Page 20: ...Firewall Overview Brocade 5600 vRouter Firewall Configuration Guide 20 53 1004253 01 ...
Page 100: ...ICMPv6 Types Brocade 5600 vRouter Firewall Configuration Guide 100 53 1004253 01 ...