Linux Workshop
Lab 21 Firewall definitions Example implemented firewall policies
Example implemented user defined chains
Policy Egress filtering
Description Restrictive: Only explicitly authorized packets may exit the protected host
Chain BADIP
Description Checks for unwanted source and destination IP addresses
SHUN Ingress filtering
Restrictive: Only explicitly authorized packets may enter the protected host
Checks for hostile source and destination IP addresses
FLAGS
Checks for unwanted TCP flag combinations
FLOOD
Checks for excessive rate of arrival of SYN packets
IN
Checks for inbound TCP/UDP datagrams
OUT
Checks for outbound TCP/UDP datagrams
IN_ICMP
Checks for inbound ICMP messages
Hostile hosts
Inbound ICMP
Outbound ICMP
Inbound services
Hostile hosts are shunned: all related inbound and outbound traffic is blocked Only the following messages are authorized: destination unreachable, parameter problem, source quench, and time exceeded Only the following messages are authorized: destination unreachable, fragmentation needed, parameter problem, source quench Remote clients can access SSH and Web services. Other services are blocked.
Outbound services Local clients can access remote DNS, FTP, HTTP, HTTPS, RSYNC, SMTP, SSH, WHOIS. Other services are blocked. Logging
Blocked packets go to the Syslog service
Ping
Only specified hosts
Special IP's
Blocked on the Internet interface (such as RFC 1918: private IP addresses)
SYN flood
SYN's are blocked when a threshold is exceeded (blunting the effect of a SYN flood attack)
TCP flags
Accept only official combinations (blocking TCP scans such as the ID check and the Christmas tree attack)
OUT_ICMP Checks for outbound ICMP messages LBADIP
Logs and drops packets having unwanted source and destination IP addresses
LDROP
Logs and drops packets
LFLAGS
Logs and drops packets having unwanted TCP flag combinations
LFLOOD
Logs and drops SYN packets
LSHUN
Logs and drops packets from shunned hosts
Theory Modules LPIC 1 Certification Bible, isbn 0-7645-4772-0 ➢ p. 721-727 Blocking unwanted connections with IPChains (kernel version 2.2). Downloadable manual(www.novell.com/documentation) SUSE LINUX Enterprise Server – Install. and Admin. ➢ p. 643-651 Masquerading and Firewalls
Extra References ➢ www.tldp.org ➢ www.ethereal.com ➢ Red Hat Linux Firewalls, Bill McCarty,
isbn 0-7645-2463-1 ➢ /scripts/firewall/ directory on the course DVD.
© October 2, 2005, wiki.novell.com/index.php/Roberts_Quick_References, author of Foundations of Linux networking