15.1.1 IPv4 Filter Rules
The default behaviour with Action =
,**
consists of two implicit filter rules: If an in-
coming packet can be assigned to an existing connection and if a suitable connection is ex-
pected (e.g. such as an affiliated connection of an existing connection), the packet is al-
lowed.
The sequence of filter rules in the list is relevant: The filter rules are applied to each packet
in succession until a rule matches. If overlapping occurs, i.e. more than one filter rule
matches a packet, only the first rule is executed. This means that if the first rule denies a
packet, whereas a later rule allows it, the packet is rejected. A deny rule also has no effect
if a relevant packet has previously been allowed by another filter rule.
The security concept is based on the assumption that an infrastructure consists of trusted
and untrusted zones. The security policies
)3
and
/3
describe this as-
sumption. They define the filter rules Trusted Interfaces and Untrusted Interfaces which
are created by default and cannot be deleted.
If you use the Security Policy
)3
, all data packets are accepted. You can create
additional filter rules that discard specific packets. In the same way, you can allow specific
packets when using the
/3
policy.
A list of all configured filter rules is displayed in the Firewall->Policies+IPv4 Filter Rules
menu.
Using the
button in the line Trusted Interfaces , you can determine which interfaces are
Trusted . A new window opens with an interface list. You can mark individual interfaces as
trusted.
You can use the
button to insert another policy above the list entry. The configuration
menu for creating a new policy opens.
You can use the
button to move the list entry. A dialog box opens, in which you can se-
lect the position to which the policy is to be moved.
15.1.1.1 New
Note
Informationen on the selection of Trusted Interfaces can be found here:
on page 279.
Choose the New button to create additional parameters.
bintec elmeg GmbH
15 Firewall
be.IP 4isdn
279