Security 13-11
This filter blocks any packets coming from a remote network with the IP network address 200.233.14.0. The 0
at the end of the address signifies
any
host on the class C IP network 200.233.14.0. If, for example, the filter
is applied to a packet with the source IP address 200.233.14.5, it will block it.
In this case, the mask, which does not appear in the table, must be set to 255.255.255.0. This way, all
packets with a source address of 200.233.14.x will be matched correctly, no matter what the final address byte
is.
Note:
The protocol attribute for this filter is 0 by default. This tells the filter to ignore the IP protocol or type of
IP packet.
Design guidelines
Careful thought must go into designing a new filter set. You should consider the following guidelines:
■
Be sure the filter set’s overall purpose is clear from the beginning. A vague purpose can lead to a faulty
set, and that can actually make your network
less
secure.
■
Be sure each individual filter’s purpose is clear.
■
Determine how filter priority will affect the set’s actions. Test the set (on paper) by determining how the
filters would respond to a number of different hypothetical packets.
■
Consider the combined effect of the filters. If ever y filter in a set fails to match on a par ticular packet, the
packet is:
■
Passed if all the filters are configured to discard (
not
for ward)
■
Discarded if all the filters are configured to pass (for ward)
■
Discarded if the set contains a combination of pass and discard filters
Disadvantages of filters
Although using filter sets can greatly enhance network security, there are disadvantages:
■
Filters are complex. Combining them in filter sets introduces subtle interactions, increasing the likelihood
of implementation errors.
■
Enabling a large number of filters can have a negative impact on per formance. Processing of packets will
take longer if they have to go through many checkpoints.
■
Too much reliance on packet filters can cause too little reliance on other security methods. Filter sets are
not
a substitute for password protection, effective safeguarding of passwords, caller ID, the “must match”
option in the answer profile, PAP or CHAP in connection profiles, callback, and general awareness of how
your network may be vulnerable.
+-#---Source IP Addr---Dest IP Addr-----Proto-Src.Port-D.Port--On?-Fwd-+
+----------------------------------------------------------------------+
| 1 200.233.14.0 0.0.0.0 0 Yes No |
| |
+----------------------------------------------------------------------+
Summary of Contents for R7100
Page 1: ...Netopia R7100 SDSL Router User s Reference Guide ...
Page 12: ...User s Reference Guide ...
Page 18: ...2 4 User s Reference Guide ...
Page 30: ...4 8 User s Reference Guide ...
Page 44: ...5 14 User s Reference Guide ...
Page 68: ...User s Reference Guide ...
Page 80: ...8 12 User s Reference Guide ...
Page 110: ...9 30 User s Reference Guide ...
Page 116: ...10 6 User s Reference Guide ...
Page 148: ...12 20 User s Reference Guide WAN Event History page ...
Page 150: ...12 22 User s Reference Guide ...
Page 200: ...User s Reference Guide ...
Page 206: ...A 6 User s Reference Guide ...
Page 220: ...B 14 User s Reference Guide ...
Page 234: ...E 4 User s Reference Guide ...
Page 240: ...F 6 User s Reference Guide ...
Page 250: ...8 User s Reference Guide ...
Page 256: ...Index 6 ...
Page 258: ...2 User s Reference Guide ...