SunScreen 3.1 Administration Guide

Chapter 4 Creating and Managing Rules

This chapter describes:

The following information describes using the administration GUI. Appendix A contains information about the command line interface.

Packet Filtering Rules

To View and Edit the Details of an Object
  1. Click on the cell in the Packet Filtering Table containing the object you want to view or edit. The dialog window for the chosen object appears.

To Edit a Rule

Click and highlight the name of the policy whose rules you want to edit in the Policies List page.

  1. Click the Edit button.

    The Policy Rules page appears.

    Figure 4-1 Policy Rules Area of the Policy Rules Page

    Graphic

  2. Click the Packet Filtering tab in the Policy Rules area.

  3. Click and highlight the rule to edit.

  4. Click the Edit... button.

    The Rule Definition dialog window for the selected policy appears.

    Figure 4-2 Rule Definition Dialog Window with Show Actions Button

    Graphic

  5. Edit each field by clicking the down arrow to display the choice list.

    You can add a new address, range of addresses, or list of addresses for both the Source and Destination addresses.

  6. (Optional) Click the OK button in the Rule Definition dialog window when you have finished editing the rule.

  7. (Optional) Click the Verify Policy button at the top of the Policy Rules page to ensure that you have created a valid policy.

  8. Click the Save Changes button to be sure the changes are saved.


    Note -

    Each Save creates a Version.


To Add a New Rule
  1. Click the Add New... button in the Policy Rules area of the Policy Rules page.

    The Rule Definition dialog window for the selected policy appears.

    Figure 4-3 Rule Definition Dialog Window

    Graphic

  2. Edit each field by clicking the down arrow to display the choice list.

  3. Click the OK button when you have finished editing the rule.

  4. (Optional) Click the OK button in the Rule Definition dialog window when you have finished editing the rule.

  5. (Optional) Click the Verify Policy button at the top of the Policy Rules page to ensure that you have created a valid policy.

To Move a Rule
  1. Click the Move button to display the Move Rule dialog window.

    Figure 4-4 Move Rule Dialog Window

    Graphic

  2. Type the number of the rule that you want to move in the From Rule Index field.

  3. Type the number of the position to which you want to move the rule in the To Rule Index field.

  4. Click the OK button.

    The rules reorder themselves to reflect the change you made. You must move each rule whose position you want to change.

  5. Click the Verify button below the Rules area to confirm that the rules will work when you activate this policy.

  6. (Optional) Click the OK button in the Rule Definition dialog window when you have finished editing the rule.

  7. (Optional) Click the Verify Policy button at the top of the Policy Rules page to ensure that you have created a valid policy.

  8. Click the Activate button in the Policy List page to activate this policy


    Note -

    Edits do not affect the behavior of the SunScreen until you activate the policy.


To Delete a Rule

Note -

Do not delete all the packet filtering rules or you may lose all access to the Screen.


  1. Select the rule you want to delete from the table in the Packet Filtering area.

  2. Click the Delete... button.

    The Delete Rule dialog window appears.

    Figure 4-5 Delete Rule Dialog Window

    Graphic

  3. Click the Yes button.

Administrative Access Rules

You use the Administrative Access Rules tab to:

You can add new users that you have created, re-add users for whom new passwords have been defined, or SecurID assigned names on this page. You add user, create and change passwords, and change SecurID names. Also, you can add an Access Rule for users, and change the encryption parameters.

You must activate a new policy for any changes to take effect.

The fields of the Administrative Access Rules tab are described in the SunScreen Reference Manual.

The following information describes using the administration GUI. Appendix A contains information about the command line interface.

To Add an Administrative Access Rule for Local Administration
  1. Click the Administrative Access tab in the Policy Rules area of the Policy Rules page to move to the Administrative Access area.

    Figure 4-6 Administrative Access Area

    Graphic

  2. Click the Add New... button, or Edit button, below the Access Rules for GUI Local Administration area.

    The Local Access Rules dialog window appears.

    Figure 4-7 Local Access Rules Dialog Window

    Graphic

In the Administrative Access definition dialog window, there are different fields for local and remote administration.

The fields for Local Administration are:

To Add an Administrative Access Rule for Remote Administration

If you are adding an additional remote Administration Station, you must add a rule for it. Make a note of the encryption parameters you are using, these parameters have to match the encryption parameters on the remote Administration Station.

  1. Click the Administrative Access Rules tab in the Policy Rules area.

  2. Click the Add New... button in the Access Rules for Remote Administration area.

    The Remote Access Rule dialog window appears.

    Figure 4-8 Remote Access Rules Dialog Window

    Graphic

    Encryption can have two values: SKIP_VERSION_1, and SKIP_Version_2.

    • Fields required for SKIP_VERSION_1:

      • Certificate Group

      • Key Algorithm

      • Data Algorithm

    • Fields required for SKIP Version 2:

      • MAC Algorithm

      • Certificate Group

      • Key Algorithm

      • Data Algorithm

  3. Click the down arrow on the Screen field to display the choice list of Screens.

    Perform this step only if you want to associate this entry with a specific screen.


    Note -

    If you are using the Centralized Management Group feature, and this field is left blank, or with a "*" in it, the Access Rule being defined will allow, by default, access to all of the Screens in the cluster.


  4. Click the down arrow on the Address Object field to display the choice list of addresses.

  5. Click and highlight the address that you want to use.

    Type the authorized user name in the User field.

  6. Click the down arrow on the Encryption field to display the choice list of the versions of SKIP and highlight the version of SKIP that you want to use.

    SKIP_VERSION_1 is used for communicating with an SPF-100.

  7. Click the down arrow on the Certificate Group field to display the choice list of certificate groups and highlight the certificate group that you want to use.

    Specify the Screen's certificate or certificate group (in this case, the Certificate or Certificate Group that includes the Remote Administration Station's certificate) and Administration IP address in the Screen's Administration Certificate field.

  8. Click the down arrow on the Key Algorithm field to display the choice list of key algorithms and highlight the key algorithm that you want to use.

  9. Click the down arrow on the Data Algorithm field to display the choice list of data algorithms and highlight the data algorithm that you want to use.

  10. If you are using SKIP_VERSION_2 only, click the down arrow on the MAC Algorithm field to display the choice list of MAC algorithms and highlight the MAC algorithm that you want to use.

  11. Click the down arrow on the Tunnel field to display the choice list of tunnel addresses and highlight the tunnel address of the Remote Administration Station.

  12. Enter a description in the Description field.

  13. Click the down arrow on the Access Level field to display the choice list of the access levels and highlight the level of access that you want this user to have.

    There are four access levels for remote administrators:

    ALL STATUS READ WRITE NONE (Default)

  14. Click the OK button.

  15. Repeat the previous steps until you have added all the access rules for remote administration through the administration GUI, as required.

  16. Click the Save Changes button.

  17. Add the Screen's certificate MKID in the SKIP database of the Remote Administration Station and configure it to use SKIP to communicate with the Screen.

To Edit an Administrative Access Rule for Remote Administration

If you change the encryption parameters, make a note of them before the changes because they have to match the encryption parameters on the remote Administration Station.

Perform the following steps to make any changes through the administration GUI:

  1. Click the Administrative Access tab in the Policy Rules panel to display the Access Rules page.

  2. Click and highlight the rule that you want to edit in the Access Rules for Remote Administration panel then click the Edit button.

    The Access Rules applet window appears with the values for that rule.

  3. Click the down arrow on the Address field,to display the choice list of addresses and highlight the address you want to use.

  4. Type the Authorized User in the User field.

  5. Click the down arrow on the SKIP Version field to display the choice list of the versions of SKIP and highlight the version of SKIP you want to use.

  6. Click the down arrow on the Certificate Group field to display the choice list of certificate groups and highlight the Certificate Group that you want to use.

    Choose the Certificate Group containing the Remote Administration station's Certificate, not the Group that contains the Screen's certificate.

  7. Click the down arrow on the Key Algorithm field to display the choice list of key algorithms and highlight the algorithm you want to use.

  8. Click the down arrow on the Data Algorithm field to display the choice list of data algorithm and highlight the algorithm you want to use.

  9. Click the Save button

Network Address Translation (NAT) Rules


Note -

You can use NAT with SKIP to provide communication in an encrypted tunnel (secure virtual private network). The encryption at the source tunnel address must take place after the NAT mapping and decryption at the destination tunnel address must take place before the NAT translation.


The following information describes using the administration GUI. Appendix A contains information about the command line interface.

NAT Mapping Overview

You use the NAT tab to set up mapping rules that translate IP addresses according to specific rules. These rules interpret the source and destination address of incoming IP packets, then translate either the apparent source or the intended destination, and send the packets on. You can map hosts, lists of addresses, ranges of addresses, or specific groups, depending on what you have configured in your SunScreen installation.

Rules make up the map that is used during the translation of a packet. In general, you would translate addresses to:

When defining NAT rules, the first rule (lowest number) that matches a packet applies, and no other rules can apply. Therefore, you might define specific rules first, then broader cases later.

You can define the mappings of internal addresses to external addresses. Use the NAT tab in the Policy Rules area of the Policy Rules page to specify the address that is to be translated to a particular address, and to select whether you want static mapping or dynamic mapping. Additional information on NAT is in the SunScreen Reference Manual.

All network address translations happen before a packet is tested against any of the screening rules. In this way, you can define all screening rules using only internal addresses. The four addresses NAT supports are:

NAT Administration Page

The meanings and uses of the specific fields in the NAT page are as follows:

Table 4-1 NAT Page Field Explanations

Field

Use 

No

Use this field to assign a number to a rule. By default, this field displays a number that is one greater than the last rule, which indicates the rule is placed at the end of the list. If you type a specific number, the new rule is inserted into that position in the list, and the rules in the policy are consequently renumbered. 

Screen (Optional)

Use this field to specify the Screen for which you want the rule to apply. Enter a specific Screen name in this field if you use Centralized Management and want a rule to apply to a specific Screen. If a Screen isn't specified, the rule applies for all Screens that are defined. 

If Centralized Management is in place, each NAT rule must be associated explicitly with the Screen to which it applies.

Mapping

  • Static

    Specify static mapping to set up a one-to-one relationship between two addresses. Static mapping could be used to set new apparent IP addresses for hosts on your network without having to reconfigure each host.

  • Dynamic

    Specify dynamic mapping to map source addresses to other addresses in a many-to-one relationship. Dynamic mapping could be used to ensure that all traffic leaving the firewall appears to come from a specific address or group of addresses, or to send traffic intended for several different hosts to the same actual IP access.

Source

Specify the source address to map from an untranslated packet. Source addresses are the actual addresses contained in the packet entering the firewall. 

Destination

Specify the destination address for the untranslated packet. Destination addresses are the actual addresses contained in the packet entering the firewall. 

Translated Source

Specify the translated source address for a packet. The address the packet appears to originate from is the translated source. 

Translated Destination

Specify the translated destination address for a packet. The translated destination is the actual address the packet goes to when it leaves the firewall. 

It is not possible to translate both source and destination addresses. That is, you cannot make packets appear to come from a different IP address and to simultaneously direct the packets to a different destination. 

Description

Use this field to provide a description of the rule. 

All NAT rules are unidirectional. They work precisely as defined and are not interpreted as also applying in the reverse direction. So, if you map an internal source address to an external source address, and you want the mapping to apply in the reverse direction, you must map the external destination address to the internal destination address with a second rule.

Your NAT Scenario

When building security policies using NAT, define the security policy rules in terms of internal addresses. All packets that are destined for external addresses used in NAT must be routed to the Screen.


Note -

If you use static NAT to map a machine's address, a machine on any other network can initiate traffic to that machine, given a properly-defined reverse rule.


Because in routing mode (unlike stealth mode), the Screen does not automatically answer ARP requests for destination address, the Screen must either route to a separate network that has a destination address, or an ARP request must be added manually.

Static NAT is a one-to-one mapping of the internal address to an external address, and dynamic NAT is many-to-one or many-to-few mapping of internal addresses to an external address.

For more information on NAT and the possible set up, see the SunScreen Reference Manual.


Note -

Do not include the address of a remote Administration Station in any of your NAT rules, where NAT will occur between the Administration station and the Screen.



Note -

If Centralized Management is in place, each NAT rule must be associated explicitly with the Screen to which it applies.


To Add ARP Manually on a Screen in Routing Mode

    Type the following if the networks that attach to the Screen on the inside have NAT mappings applied, including any network on which there are addresses to which you want to allow public access:


    # arp -s IP_Address ether_address pub
    


    Note -

    You must add this entry each time that you reboot the Screen, so you may want to modify a Startup script to do this automatically when you reboot. This is not necessary in stealth mode.


To Define NAT Rules

When defining a static NAT mapping, be sure that:

  1. Select the NAT tab in the Policy Rules area of the Policy Rules page to move to the Network Address Translation area.

    Figure 4-9 Network Address Translation Area

    Graphic

  2. Click New... in the Add New... choice list below the Network Address Translation area to display the NAT Definition dialog window.

    Figure 4-10 NAT Definition Dialog Window

    Graphic

  3. Select the Screen that should use NAT mapping.

    Default is NAT available for all Screens.

  4. Select all four addresses in the NAT Definition dialog window.

  5. Click the OK button.

  6. Repeat the previous steps until you have edited all the rules as required.

  7. Click the Save Changes button to save the edited mappings to a file.

    You must click the Activate button for the changes take effect.

    In most cases, when defining a static mapping, the internal address and external address are each a single address.

To Edit the NAT Rules
  1. Select the NAT tab in the Policy Rules area of the Policy Rules page to move to the Network Translation area.

  2. Click the Mapping field to choose the mapping on the table that you want to edit.

  3. Click the Edit button below the Network Address Translation area to display the NAT Definition dialog window for that mapping.

  4. Click the down arrow on the Mapping field to display the list of mappings.

  5. Click and highlight the type of mapping that you want.

    In most cases when defining a static mapping, the Source Address and Destination Address are each a single address.

  6. Click the down arrow on the Source Address field to display the list of addresses.

  7. Click and highlight the address that you want.

    The new source address appears in the Source Address field.

  8. Click the down arrow on the Destination Address field to display the list of addresses.

    1. Click and highlight the address that you want.

    2. Click and highlight the translated source that you want.

    3. Click and highlight the translated destination that you want.

    The new destination address appears in the Destination Address field.

  9. Click the OK button of the NAT Definition dialog window to save your edits.

  10. Repeat the previous steps until you have edited all the mappings as required.

  11. Click the Save Changes button to save the edited mappings to a file.

    You must click the Activate button for the changes take effect.

Example: Static NAT of a Host to a Host

The following example translates the address of laguna to nathost for all destination addresses for all outgoing traffic.

Figure 4-11 Static Translation of a Host To a Host

Graphic

Example: Reverse Rule

The following example translates the address nathost to laguna for all source addresses for all incoming traffic. One-way communication is allowed, so one of these rules may be used without the other.

Figure 4-12 The Reverse Rule

Graphic

Example: Dynamic Translation of a Range Of Addresses to One Host

In the following example, the translation occurs only when the destinations match what is in the internet address group. If the address was not in this group, the source address would not be translated.

Figure 4-13 Dynamic Translation

Graphic

Virtual Private Network (VPN) Rules

When you configure a Screen to use a Virtual Private Network (VPN) between two locations, all packets traveling from one location to another are encrypted and encapsulated before they are sent over the public internetwork. A VPN ensures that the contents of the packets remain private, and conceals the topology of the internal network.

The packet contents remain private because anyone capturing packets between the two locations sees only unreadable, encrypted packets. When these packets arrive at the remote location the Screen decrypts them and forwards them to their final destination in a readable form.

A VPN conceals the details of its network topology by encrypting the original packets (including their IP headers) and creating new IP headers using addresses specified by the VPN Gateways. When these packets arrive at the remote location, the Screen removes the new IP headers, and after decrypting the packets, restores the original headers so the packets can reach their final destination.

A VPN is typically used when companies have offices in more than one location. Such companies often want to use public networks for a secure private network, and avoid the need for dedicated lines or any changes to their user applications.

Before You Begin

Before you configure a VPN, you must complete several preliminary tasks including the following:

Once you successfully complete these tasks, you set up the VPN by defining VPN gateways and creating packet filtering rules as described in the following sections.

Configuring a VPN

You need to create a "VPN Gateway" for each Screen involved in the VPN to define the systems that are taking part in a particular VPN. You create these Gateway definitions are using the VPN tab in the Policy Rules area of the Policy Rules page.

Each VPN Gateway definition associates a particular certificate with a set of hosts that are "protected" by that gateway. The protected hosts will have their traffic encrypted/decrypted by that certificate. In addition, the defined gateways are associated with each other by giving them each the same VPN name.

To Add a VPN Gateway Definition

To Add a VPN Gateway definition, perform the following steps:

  1. Click the VPN tab in the Policy Rules area of the Policy Rules page.

  2. Click the Add New... button in the VPN area.

    The VPN Definition dialog window appears.

  3. In the Name field, type the name of the VPN to which the gateway belongs.

    Type the same name for each gateway included in the VPN.

  4. Click the down arrow in the Address field to select the machine to be included in the VPN.

  5. Click the down arrow in the Certificate field to select the gateway's Certificate ID.

  6. Click the down arrow in the Key Algorithm field to select the key algorithm (or "none") to be used by the VPN.

    All gateways in the same VPN must use the same key algorithm.

  7. Click the down arrow in the Data Algorithm field to select the data algorithm (or "none") to be used by the VPN.

    All gateways in the same VPN must use the same data algorithm.

  8. Click the down arrow in the MAC Algorithm field to select the MAC algorithm (or "none") to be used by the VPN.

    All gateways in the same VPN must use the same MAC algorithm.

  9. Click the down arrow in the Tunnel Address field to select the tunnel address to be used by the VPN.

  10. (Optional) Type a description of the VPN gateway.

  11. Click the OK button.


    Note -

    Repeat steps 2 through 11 to define a VPN Gateway for each Screen in the VPN. Be sure to give each of them the same VPN name to include them all in this particular VPN.


To Create Packet Filter Rules to Use a VPN

Once you define the VPN by creating VPN Gateways, you must add Packet Filtering rules in order to utilize the VPN. To add the VPN rule, perform the following steps:

  1. Click on the Packet Filtering tab of the Policy Rules area of the Policy Rules page.

  2. Click on the "Add New..." button at the bottom of the rules.

    The Rule Definition dialog window appears.

  3. Type the information into the fields as desired.

    The source and destination fields can contain "*". This configuration will check all traffic to see if it is part of the specified VPN. Be sure to select SECURE in the action field. When the Action Details popup window asks you to supply a VPN, select the name of the VPN used when defining the VPN Gateways.

    The one VPN-based rule will then generate all the VPN Gateway pair-wise rules so that the hosts at each site can communicate with each other securely. Any host that cannot be secured (for example, it is not protected by a VPN gateway) will not be allowed to communicate by the VPN-based rule. You can create a separate rule that allows that particular host to communicate, but you must set that up separately.

  4. Click the OK button for both the Action Details and the Add Rule dialog boxes.


    Note -

    If you did not use "*" for source, destination and service, repeat steps 2 through 4 for any additional rules. You must add VPN rules to each Screen that is part of the VPN.