Cyclades-PR2000
The configuration for “Stop forged packets” is shown in the following listing:
Rules Lists |
|
|
|
|
Rule List Name | Rule | Default | List | Linked |
| Status | Scope | Type | Rule |
|
|
|
| List |
slot1_in | Enabled | Permit | Filter |
|
Filter_list Name slot1_in |
|
|
| |
Rule 0 |
|
|
|
|
Status |
| Enabled |
|
|
Scope |
| Deny |
|
|
Protocol |
| 0 |
|
|
Source IP Operator | Equal |
|
| |
Source IP start |
| 10.0.0.0 |
|
|
Source IP Mask |
| 255.0.0.0 |
|
|
Destination IP | Operator | None |
|
|
Source Port Operator | None |
|
| |
Destination Port Operator | None |
|
| |
TCP connections allowed | Y |
|
| |
Account Process allowed | N |
|
|
FIGURE 12.6 OUTPUT FOR INTERIOR ROUTER EXAMPLE
Slot1_in, rule 0, prohibits any incoming packets with source IP addresses of the internal network. Since the addresses used for internal networks cannot be routed on the Internet, they cannot be valid unless there is a leak of traffic through another router to the perimeter network.
Imagine that, as shown in the figure, the network is expanded and another range of IP addresses is used (not a
Chapter 12 - Filters and Rules | 104 |