TCP | UDP | Description |
|
|
|
518 | 518 | ntalk (new terminal chat) |
- | 520 | RIP |
540 | 540 | uucp (UNIX to UNIX copy) |
540 | 540 | |
543 | 543 | klogin (Kerberized login) |
1642 | - | PortMux daemon |
- | 1645 | RADIUS security |
- | 1646 | RADIUS accounting |
|
|
|
Filtering RIP messages
If the NETServer is listening for or broadcasting RIP messages, you should permit them (UDP dst eq 520) to pass in the appro- priate direction(s).
Note that spurious RIP messages can disrupt your routing tables. If you are listening for RIP messages on a given interface, you may wish to consider filtering out RIP updates from untrusted networks.
FTP Packet Filtering
FTP is one of the most difficult protocols to permit while still protecting your network. The input and output filters must permit two separate
In the example below, we will permit all users on the local class C network, 192.77.203.0 to initiate an FTP connection to any other host on the Internet. However, incoming FTPs will be denied.
Step 1 - Create two filters
Since we will be filtering both incoming and outgoing packets, we must create two filters.
add filter ftp.in add filter ftp.out