Chapter 6. Security Mechanisms
This chapter describes NetDefendOS security features.
• Access Rules, page 193
• ALGs, page 196
• Web Content Filtering, page 242
• Anti-Virus Scanning, page 259
• Intrusion Detection and Prevention, page 265
• Denial-of-Service Attack Prevention, page 276
• Blacklisting Hosts and Networks, page 280
6.1. Access Rules
6.1.1. Introduction
One of the principal functions of NetDefendOS is to allow only authorized connections access to
protected data resources. Access control is primarily addressed by the NetDefendOS IP rule set in
which a range of protected LAN addresses are treated as trusted hosts, and traffic flow from
untrusted sources is restricted from entering trusted areas.
Before a new connection is checked against the IP rule set, NetDefendOS checks the connection
source against a set of Access Rules. Access Rules can specify what traffic source is expected on a
given interface and also to automatically drop traffic originating from specific sources. AccessRules
can provide an efficient and targeted initial filter of new connection attempts.
The Default Access Rule
Even if the administrator does not explicitly specify any Access Rules, a basic access rule is always
in place which is known as the Default Access Rule. This default rule always checks incoming
traffic by performing a reverse lookup in the routing tables. This lookup validates that the incoming
traffic is coming from a source that the routing tables indicate is accessible via the interface on
which the traffic arrived. If this reverse lookup fails then the connection is dropped and a "Default
Access Rule" log message will be generated.
For most configurations the Default Access Rule is sufficient and the administrator does not need to
explicitly specify other rules. The default rule can, for instance, protect against IP spoofing, which is
described in the next section. If Access Rules are explicitly specified, then the Default Access Rule
is still applied if a new connection does not match any of the specified rules.
6.1.2. IP spoofing
Traffic that pretends it comes from a trusted host can be sent by an attacker to try and get past a
firewall's security mechanisms. Such an attack is commonly known as Spoofing.
IP spoofing is one of the most common spoofing attacks. Trusted IP addresses are used to bypass
filtering. The header of an IP packet indicating the source address of the packet is modified by the
attacker to be a local host address. The firewall will believe the packet came from a trusted source.
Although the packet source cannot be responded to correctly, there is the potential for unnecessary
network congestion to be created and potentially a Denial of Service (DoS) condition could occur.
Even if the firewall is able to detect a DoS condition, it is hard to trace or stop because of its nature.
193
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...