•
Allow the server to use passive mode.
If this option is enabled, the FTP server is allowed to use both passive and active transfer
modes. With the option disabled, the server will never receive passive mode data channels.
NetDefendOS will handle the conversion automatically if clients use passive mode.
A range of server data ports is specified with this option. The client will be allowed to connect
to any of these if the server is using passive mode. The default range is
1024-65535
.
These options can determine if hybrid mode is required to complete the connection. For
example, if the client connects with passive mode but this is not allowed to the server then
hybrid mode is automatically used and the FTP ALG performs the conversion between the two
modes.
Predefined FTP ALGs and Services Before NetDefendOS Version 11.01
In older versions of NetDefendOS, four predefined FTP
ALG
and
Service
objects were provided,
each with a different combination of client/server mode restrictions. These
ALG
and
Service
objects had the following names:
•
ftp-inbound - Clients can use any mode but servers cannot use passive mode.
•
ftp-outbound - Clients cannot use active mode but servers can use any mode.
•
ftp-passthrough - Both the client and the server can use any mode.
•
ftp-internal - The client cannot use active mode and the server cannot use passive mode.
Beginning with NetDefendOS version 11.01, these individual services are removed from a new
NetDefendOS installation. However, they remain in configurations that upgrade to 11.01 or later.
A new installation can recreate them manually but the recommended option is to use the
predefined
ftp
service with an
IP Policy
object, in which case all the options previously available
on the ALG are now available directly on the policy.
FTP ALG Command Restrictions
The FTP protocol consists of a set of standard commands that are sent between server and client.
If the NetDefendOS FTP ALG sees a command it does not recognize then the command is
blocked. This blocking must be explicitly lifted and the options for lifting blocking are:
•
Allow unknown FTP commands. These are commands the ALG does not consider part of the
standard set.
•
Allow the
SITE EXEC
command to be sent to an FTP server by a client.
•
Allow the
RESUME
command even if content scanning terminated the connection.
Note: Some commands are never allowed
Some commands, such as encryption instructions, are never allowed. Encryption would
mean that the FTP command channel could not be examined by the ALG and the
dynamic data channels could not be opened.
Control Channel Restrictions
Chapter 6: Security Mechanisms
438
Содержание NetDefendOS
Страница 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Страница 32: ...Chapter 1 NetDefendOS Overview 32 ...
Страница 144: ...Chapter 2 Management and Maintenance 144 ...
Страница 220: ... Enable DHCP passthrough Enable L2 passthrough for non IP protocols 4 Click OK Chapter 3 Fundamentals 220 ...
Страница 267: ... SourceNetwork lannet DestinationInterface any DestinationNetwork all nets 4 Click OK Chapter 3 Fundamentals 267 ...
Страница 284: ...Chapter 3 Fundamentals 284 ...
Страница 360: ...The ospf command options are fully described in the separate NetDefendOS CLI Reference Guide Chapter 4 Routing 360 ...
Страница 392: ...Chapter 4 Routing 392 ...
Страница 396: ...Web Interface 1 Go to Network Ethernet If1 2 Select Enable DHCP 3 Click OK Chapter 5 DHCP Services 396 ...
Страница 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Страница 420: ...Chapter 5 DHCP Services 420 ...
Страница 424: ...2 Now enter Name lan_Access Action Expect Interface lan Network lannet 3 Click OK Chapter 6 Security Mechanisms 424 ...
Страница 573: ...Chapter 6 Security Mechanisms 573 ...
Страница 575: ...This section describes and provides examples of configuring NAT and SAT rules Chapter 7 Address Translation 575 ...
Страница 607: ...Chapter 7 Address Translation 607 ...
Страница 666: ...Chapter 8 User Authentication 666 ...
Страница 775: ...Chapter 9 VPN 775 ...
Страница 819: ...Chapter 10 Traffic Management 819 ...
Страница 842: ...Chapter 11 High Availability 842 ...
Страница 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Страница 879: ...Chapter 13 Advanced Settings 879 ...