
Exercise caution in enabling application gateways as they impact the security of your network.
Enable any of the following types of application gateways:
PPTP
: For virtual private network access using Point-to-Point Tunneling Protocol. This is enabled by default.
SIP
: For VoIP (voice over IP) using Session Initiation Protocol.
TFTP
: Enables file transfer using Trivial File Transfer Protocol.
FTP
: To allow normal mode when using File Transfer Protocol. This is not needed for passive mode. This is enabled by default.
IRC
: For Direct Client to Client (DCC) transfer when using Internet Relay Chat. You may wish to forward TCP port 113 for incoming identd (RFC 1413) requests.
Firewall Options
Anti-Spoof
: Anti-Spoof checks help protect against malicious users faking the source address in packets they transmit in order to either hide themselves or to impersonate
someone else. Once the user has spoofed their address they can launch a network attack without revealing the true source of the attack or attempt to gain access to network
services that are restricted to certain addresses.
Log Web Access
: Enable this option to create a syslog record of web (IP port 80) access. Each entry will contain the IP address of the server and the client. Note that this
may create a lot of log entries, especially on a busy network. Sending the system log to a syslog server is recommended.
To view the logs, go to
Status
→
System Logs
. For configuration options, including syslog server setup, go to
System Settings
→
Administration
and select the
System Logging
tab.
Zone Firewall
A
zone
is a group of network interfaces. By default, all interfaces within a zone are allowed to initialize network communication with each other, but any network traffic
initialized outside of a zone to the interfaces within the zone is denied. Forwardings are used to allow traffic to traverse zones. Filter Policies are used to define how traffic
passing through a zone forwarding is filtered. Zones can be added, edited, or removed (except for the
All
and
Router
zone).
Zones
Create, edit, and remove zones (i.e., groups of network interfaces). Once you have defined zones, add rules to the
Filter Policies
and
Forwardings
sections to define
what traffic is allowed between zones.
CradlePoint COR IBR1100/IBR1150 – Manual
10/13/2014
52