Security 14-19

Basic Firewall is suitable for a LAN containing only client hosts that wish to access servers on the WAN, not for a LAN containing servers providing services to clients on the WAN. Basic Firewall’s general strategy is to explicitly pass WAN-originated TCP and UDP traffic to ports greater than 1023. Ports lower than 1024 are the service origination ports for various Internet services such as FTP, Telnet, and the World Wide Web (WWW).

A more complicated filter set would be required to provide WAN access to a LAN-based server. See “Possible modifications,” below, for ways to allow remote hosts to use services provided by servers on the LAN.

Possible modifications

You can modify the sample filter set Basic Firewall to allow incoming traffic using the examples below. These modifications are not intended to be combined. Each modification is to be the only one used with Basic Firewall.

The results of combining filter set modifications can be difficult to predict. It is recommended that you take special care if making more than one modification to the sample filter set.

Trusted host. To allow unlimited access by a trusted remote host with the IP address a.b.c.d (corresponding to a numbered IP address such as 163.176.8.243), insert the following input filter ahead of the current input filter 1:

Enabled: Yes

Forward: Yes

Source IP Address: a.b.c.d

Source IP Address Mask: 255.255.255.255

Dest. IP Address: 0.0.0.0

Dest. IP Address Mask: 0.0.0.0

Protocol Type: 0

Trusted subnet. To allow unlimited access by a trusted remote subnet with subnet address a.b.c.d (corresponding to a numbered IP address such as 163.176.8.0) and subnet mask e.f.g.h (corresponding to a numbered IP mask such as 255.255.255.0), insert the following input filter ahead of the current input filter 1:

Enabled: Yes

Forward: Yes

Source IP Address: a.b.c.d

Source IP Address Mask: e.f.g.h

Dest. IP Address: 0.0.0.0

Dest. IP Address Mask: 0.0.0.0

Protocol Type: 0

Page 223
Image 223
Netopia R2020 manual Possible modifications