. . . . .
S E C U R I T Y Z O N E S A N D I N T E R F A C E S
User Guide
9-11
protocols can be passed seamlessly through the appliance. While in this mode
the appliance can be further configured to bypass various network security
functions that in some cases are not desired by the network/security administrator.
In addition to passing various protocols without interception, the Transparent mode supports
VLAN (802.1q) recognition and filtering. If desired, the appliance can be
deployed into an existing VLAN network, and be configured to recognize the various 802.1q
packets and apply traffic policies using its zone-based filter. This function is called Transparent-
VLAN filtering and is described in
Transparent Mode VLAN Filtering on page 12
.
Transparent Mode Simple Deployment
In
Figure 9-8
the appliance is deployed in transparent mode. Interface eth0 and
eth1 are configured in transparent mode with the address of 0.0.0.0. Interface eth0 is configured
in the Trust Zone and eth1 will assigned to the Untrust zone. A policy configured to any from the
Trust zone to the Untrust zone. To restrict external traffic from accessing the Trust zone, a policy
will be needed to deny ANY/All from the Untrust to Trust zone.
In
Figure 9-8
, if Workstation A makes a request to
www.yahoo.com
, the workstation performs a
DNS query for
www.yahoo.com
, the return address for the site will be a routable Internet address.
The host then performs an arp for its default gateway and sends the packet to the router 10.0.0.1.
The appliance inspects the outgoing request and runs the packet through its
Policy engine. Due to the permit policy created earlier, this packet will be left intact and allowed
out through the eth1 interface of the appliance. During the inspection process
a session is added for this packet meaning the return packet will be flagged as a valid "trust"
packet.
Figure 9-8 Transparent Mode
Transparent Mode Management
In order to manage the appliance through the network, you must configure a
management interface. In Transparent mode, the logical management interface, br0, is utilized.
In addition to configuring the br0 management interface, a default route is required to be
configured in order for the appliance to be managed by hosts that are outside
its immediate network subnet. For example, if SNMP or SSH is required from a host that is
somewhere on the Internet, the appliance will need a route configured to the
default gateway. If the host requesting the management traffic exists somewhere deep within the
LAN network, a static route may have to be added.
Note: br0 responds to requests on both the Untrust and Trust zones. If filtering of the
management request is required, the Manage-ip function should be used.
Содержание freeGuard Slim 100
Страница 10: ...FSL100 User Guide x ...
Страница 24: ...G E T T I N G ST A R T E D 1 1 14 User Guide ...
Страница 42: ...SY S T E M M A NA G E M E N T 2 2 18 User Guide ...
Страница 50: ...M A N A G I N G T R A F F IC F L O W 3 3 8 User Guide ...
Страница 58: ...C O N F IG U R I N G A TT A C K PRE VE N T I O N 4 4 8 User Guide ...
Страница 84: ...T R A F F I C F LO W R E P O R T I N G 5 5 26 User Guide ...
Страница 122: ...M O N I T O R I N G T R A FF I C 7 7 16 User Guide ...
Страница 134: ...U SI N G S N M P 8 8 12 User Guide ...
Страница 166: ...A L PH AB E T I C LI S T I NG OF LO G M E SS AG E S C C 4 User Guide ...
Страница 170: ...N O TI F I C A T I O N A N D S A F E T Y ST A TE M E N T S Battery Statement D D 4 User Guide ...