10-2
Stinger®
IP2000 Configuration Guide
Filter Configuration
Defining IP filters
You can define a filter to monitor inbound packets, outbound packets, or both. The
action specified in the filter can apply to packets that match the specifications, or to
all packets except those that match the specifications.
A
filter
profile can include up to 12 input filters and 12 output filters, each of which
specifies a set of comparisons that are made in a defined order and an action to be
taken when a match occurs. The filters are applied in sequence. The filtering process
stops immediately if conditions in a packet match a single filter specification, and the
action in that filter is applied to the packet.
If a filter specifies rules only in one direction, no filtering is applied to traffic in the
other direction. For example, if a filter specifies only input filter rules, all output
packets are processed without any filtering.
Defining IP filters
The filtering subsystem uses an implicit default rule at the end of the filtering process
to perform a default action on packets that do not match the specified filter rules. For
an IP filter, the implicit default filter rule causes the system to drop all nonmatching
packets in the specified direction. For details about explicit default rules for IP filters,
see “Explicit default filter rules” on page 10-6.
Overview of
ip-filter
settings
Note
Only the
ip-filter
type is supported for the IP2000, and only the parameters
in the
ip-filter
subprofile are applicable. For details about other settings, which
may be supported on an optional T1000 module, see the Stinger Reference. The system
does not prevent you from configuring other types of filters, but it displays a warning
message if you do. Those filters will have no effect.
Following are the
filter
profile settings for defining IP filters. The parameters are
shown with their default values for input filters. The same values apply for output
filter specifications—setting the parameters in an input filter affects the inbound data
stream, and setting them in an output filter affects the outbound data stream.
[in FILTER/""]
filter-name* = ""
[in FILTER/"":input-filters[1]]
valid-entry = no
forward = no
type = gen-filter
[in FILTER/"":input-filters[1]:ip-filter]
protocol = 0
source-address-mask = 0.0.0.0
source-address = 0.0.0.0
dest-address-mask = 0.0.0.0
dest-address = 0.0.0.0
Src-Port-Cmp = none
source-port = 0
Dst-Port-Cmp = none
dest-port = 0
tcp-estab = no