A p p l i c a t i o n s N o t e s
C-5
•
Protocol (IP, ICMP, TCP, and UDP)
•
Protocol flags (for TCP and ICMP only)
•
Source and/or Destination IP address
•
Source and/or Destination port number
Information Policy
Before you define a filtering rule set, you must determine what information
you will permit to enter or exit the network and who should have access to
that information. This “information policy” can be divided into two broad
groups: open and closed. An open information policy, by default, allows
access to everything; filters are put in place to block access only to a small
number of sensitive addresses and/or protocols. This type of policy is
typically used in a trusted network situation that places a premium on
openness rather than security. Any filters applied are intended to deny access
to sensitive information not intended for public viewing, such as financial
data. A closed information policy, by default, blocks access to everything;
filters are put in place to allow access only to approved addresses and/or
protocols. A closed information policy is used when security and network
integrity are more important than ease of access. If your network is connected
to the Internet, a closed information policy will make your system less
vulnerable to attack.
Filtering Interface
You may apply IP Filtering to any interface that carries IP traffic. Rule sets
can be defined for both inbound and outbound traffic through each interface.
The block diagram below shows where IP Filtering is performed on the IAD.
Summary of Contents for JetFusion 2208
Page 6: ...E 2 0 0 0 A 2 G B 2 1 1 0...
Page 22: ...1 6 2 0 0 0 A 2 G B 2 1 1 0...
Page 198: ...6 12 2 0 0 0 A 2 G B 2 1 1 0...
Page 206: ...7 8 2 0 0 0 A 2 G B 2 1 1 0...
Page 210: ...8 4 2 0 0 0 A 2 G B 2 1 1 0...
Page 212: ...A 2 2 0 0 0 A 2 G B 2 1 1 0...
Page 224: ...B 12 2 0 0 0 A 2 G B 2 1 1 0...