SunScreen 3.1 Reference Manual

Policy Rules Panel

Policy rules govern data communication between systems--either another host, a network, or a remote computer and your network. You write and edit the rules that govern this communication in the Policy Rules panel. SunScreen uses ordered sets of rules to implement the security policies. Ordered set of rules means that, when a Screen receives a packet, it matches the packet against each rule in its active policy until it finds one that applies, and then takes the actions associated with that rule. Once a Screen finds an applicable rule for a packet, it ignores subsequent rules in its active policies.

Rules do not take effect until you save and activate the policy to which they belong by clicking the Save Changes button located above the Common Objects area, and the Activate button in the bottom area of the Policies List page. SunScreen sets up the basic security policy for name service lookups, Routing Information Protocol (RIP) packets, and SunScreen SKIP certificate discovery during installation. You can change these setting for each Screen by changing them in the screen object. You can use the Rules area on the Policy Rules page to specify how your Screen should filter other types of packets.


Note -

If the specified filtering rule fails to detect any issued certificate (key) encryption algorithms, it may display the following error message: An error occurred in detecting the Encryption algorithms. Please check if skipd process is running. If this occurs, restart the skipd process using the command skipd_restart.


Use the Policy Rules panel to add or modify a rule in a SunScreen policy. Clicking the Add New button (or selecting a policy and clicking the Edit button) opens the Policy Rules panel of the Policy List page.

To display the controls on a tab, click the tab header. TABLE 5-34 describes the tabs that are available from the Policy Rules panel.

Table 5-34 Policy Rules Panel Tabs

Tab 

Description 

Packet Filtering  

Shows the packet filtering rule or rules. 

Administration Access  

Defines access rules for local administration and remote Administration Stations through the administration GUI or the command line (seeAppendix B, Command-Line Reference ).

NAT (Network Address Translation) 

Maps private network addresses to public network addresses. 

VPN (Virtual Private Network)  

Maps name, address, certificate, issued certificate (key) algorithm, data algorithm, MAC algorithm, tunnel address, and description. 

Packet Filtering Tab

The Packet Filtering tab displays a panel, shown in FIGURE 5-34, for configuring packet-filtering rules. Use packet filtering to control traffic using a particular service, traffic intended for a particular service, or traffic coming from a particular address.

Figure 5-34 Packet Filtering Tab

Graphic

SunScreen uses ordered packet filtering. The Screen assumes that the first rule that matches a packet is the rule that governs the disposition of the packet.

If the packet does not match any rule, the Screen uses its default action to determine the disposition of the packet.


Note -

The default action is set when defining the interfaces. A default action can be set for each interface, but not for the entire Screen. Typically, the default action is to only drop the packet. Other options are available. See "Interface".


TABLE 5-35 describes the available fields in the Packet Filtering tab.

Table 5-35 fields on the Packet Filtering Tab

Field 

Description 

Rule Index 

(Optional) Assigns a number to a rule. When editing or adding a new rule, by default, this field displays a number one greater than the last rule (indicating this rule will be placed at the bottom of the list). If you type a lower number, the new rule is inserted into the specified position in the list, and the rules currently in the configuration are renumbered. 

Screen 

(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. 

Service 

Identifies the network service or service group to which this rule applies. Network services and service groups are described in Appendix C, Services and State Engines.

Source 

The value to which the source address of a packet is compared. If an asterisk (*) appears, any source address meets the criteria of the rule. 

Destination 

The value to which the destination address of a packet is compared to determine whether the rule should apply. If an asterisk (*) appears, any destination address meets the criteria of the rule. 

Action 

Displays the action for the rule and permits setting the logging behavior. The options are: 

  • ALLOW

  • DENY

  • ENCRYPT

  • SECURE

Time 

Specifies the time of day for the rule. 

Description 

(Optional) Provides a brief description of the Administrative Access rule.  

To edit every field, except the Rule Index field, on the Packet Filtering tab, click it to display the choice list. The changes in the fields for a rule are reflected in the Common Objects panel, except for the Action field, which displays a dialog box for that rule and policy. Set the logging options for the action in the dialog box for that action. The particular dialog box that appears depends on the action selected.

ALLOW Action

FIGURE 5-35 shows the Policy Rule Index dialog box for the ALLOW action.

Figure 5-35 Policy Rule Index Dialog Box for ALLOW action

Graphic

TABLE 5-36 describes the controls in Policy Rule Index dialog box for ALLOW action.

Table 5-36 Controls for ALLOW Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

  • LOG_SESSION - Record information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

PROXY 

Specifies the proxy the Screen should use, if any, when a packet meets the selection criteria of the rule. The options are: 

  • NONE

  • PROXY_HTTP

  • PROXY_FTP

  • PROXY_SMTP

  • PROXY_telnet

If you choose a proxy, another dialog box, according to the proxy chosen, is displayed. 

Figure 5-36 PROXY_HTTP Dialog Box for ALLOW action

Graphic

TABLE 5-37 lists the flags for the HTTP proxy.

Table 5-37 HTTP Proxy Flags

Flag 

Function 

Cookies 

Permits the use of cookies. The options are: 

  • ALLOW

  • DENY

ActiveX 

Permits the use of ActiveX. The options are: 

  • ALLOW

  • DENY

Java 

Allow or disallow use of Java applets. The options are: 

  • Allow JAVA

  • Block JAVA

  • JAR Signature

  • JAR Hash

  • JAR Signature and Hash

SSL 

Permits the use of SSL encryption. The options are: 

  • ALLOW

  • DENY

Figure 5-37 PROXY_FTP Dialog Box for ALLOW action

Graphic

TABLE 5-38 lists the settings available for the flags for the FTP proxy.

Table 5-38 FTP Proxy Flags

Flag 

Function 

GET 

Allow or disallow use of the FTP get command 

PUT 

Allow or disallow use of the FTP put command 

CHDIR 

Allow or disallow use of the FTP chdir command 

MKDIR 

Allow or disallow use of the FTP mkdir command 

RENAME 

Allow or disallow use of the FTP rename command 

REMOVE 

Allow or disallow use of the FTP remove_dir command 

DELETE 

Allow or disallow use of the FTP delete command 

PROXY USERS 

Choose the proxy user or the group of proxy users that you want for this rule. You can have only one proxy user or one group of proxy users in this field. You define these proxy users in the proxy user common object. 

Figure 5-38 PROXY_SMTP Dialog Box for ALLOW action

Graphic

The only flag for the SMTP proxy is to allow or disallow relayed mail.

Figure 5-39 PROXY_Telnet Dialog Box for ALLOW action

Graphic

For the PROXY USER field, type the proxy user or the group of proxy users that you want for this rule from the choice list. Specify only one proxy user or one group of proxy users in this field. Define these proxy users in the proxy user common object.

DENY Action

FIGURE 5-40 shows the Policy Rule Index dialog box for DENY action

Figure 5-40 Policy Rule Index Dialog Box for DENY Action

Graphic

TABLE 5-39 describes the controls in Policy Rule Index dialog box for DENY action.

Table 5-39 Controls for DENY Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

ICMP Reject 

Identifies the ICMP rejection message issued when the rule is applied. In most cases, the Screen rejects packets by sending an ICMP Destination Unreachable packet with the reject code set as specified in the ICMP action in the rule. 

The one exception is the PORT_UNREACHABLE ICMP action. In this case, the Screen rejects TCP packets by sending a TCP RESET packet and other packets by sending an ICMP Destination Unreachable (Port Unreachable) message. 

The options for the actions are: 

  • NONE

  • NET_UNREACHABLE

  • HOST_UNREACHABLE

  • PORT_UNREACHABLE

  • NET_FORBIDDEN

  • HOST_FORBIDDEN

PROXY 

Specifies the proxy you want to use, if any. The options are: 

  • NONE

  • PROXY_HTTP

  • PROXY_FTP

  • PROXY_SMTP

  • PROXY_telnet

If you choose a proxy, another dialog box, according to the proxy chosen, is displayed. 

PROXY USERS 

You must type the name or names of the proxy users in this field. You find the proxy users by selecting proxy user as the type of object and searching for them in Common Objects panel of the Policy Rules page. 

Figure 5-41 PROXY_FTP Dialog Box for DENY action

Graphic

Figure 5-42 PROXY_Telnet Dialog Box for DENY action

Graphic

ENCRYPT Action

FIGURE 5-43 shows the Policy Rule Index dialog box for ENCRYPT action.

Figure 5-43 Policy Rule Index Dialog Box for ENCRYPT Action

Graphic

TABLE 5-40 describes the controls in Policy Rule Index dialog box for ENCRYPT action.

Table 5-40 Controls For ENCRYPT Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Records the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Records the complete packet in the log.

  • LOG_SESSION - Records information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

Encryption 

Specifies the version of SKIP. The options are: 

  • SKIP_VERSION_1 - Use old-style SKIP to encrypt or decrypt packets.

  • SKIP_VERSION_2 - Use new-style SKIP to encrypt or decrypt packets.

Source Tunnel 

Specifies the tunnel address of the from encryptor.

Destination Tunnel 

Specifies the tunnel address of the to encryptor.

From Encryptor 

Specifies the certificate name for the SKIP host that is encrypting the data. This can be either a Screen or an end-system SKIP host. Either the From Encryptor or the To Encryptor must identify a SKIP certificate on the local Screen 

To Encryptor 

Specifies the certificate name for the SKIP host that is decrypting the data. This machine can be the local Screen or a remote host. 

Key Algorithm 

Specifies the type of encryption you want to use for traffic. The options available depend on the strength of encryption that you are using. 

Data Algorithm 

Specifies the type of encryption you want to use for data. The options available depend on the strength of encryption that you are using. 

MAC Algorithm 

Specifies the type of authentication that you want to use for packets that meet the criteria of this rule. The MAC algorithm is supported in SKIP version 2. The options are: 

  • none

  • MD5

  • MD5-NAT

SECURE Action

FIGURE 5-44 shows the Policy Rule Index dialog box for SECURE action

Figure 5-44 Policy Rule Index Dialog Box for SECURE Action

Graphic

TABLE 5-41 describes the controls in Policy Rule Index dialog box for SECURE action.

Table 5-41 Controls for SECURE Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

  • LOG_SESSION - Record information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

VPN 

Specifies the name of the VPN to which the rule applies. 

Administrative Access Tab

The Administrative Access rules tab shows access and encryption settings for local and remote administration. FIGURE 5-45 shows the Administrative Access tab. You set the values reflected on the two panels of this tab through the dialog box for each panel.

Figure 5-45 Administrative Access Tab

Graphic

Access Rules for GUI Local Administration

Use the Access Rules for GUI Local Administration dialog box, shown in FIGURE 5-46, to add or modify administrative access rules for local Administration Stations.

Figure 5-46 Local Access Rules Dialog Box

Graphic

TABLE 5-42 describes the controls for the Local Access Rules dialog box.

Table 5-42 Controls for the Local Access Rules Dialog Box

Control 

Description 

Rule Index 

Assigns a number to a rule. By default, this field displays a number one greater than the last rule (indicating this rule will be placed bottom of the list). If you type a lower number, the new rule is inserted into the specified position in the list, and the rules currently in the configuration are renumbered.  

Screen 

(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. The default All applies to all Screens.

User 

Lists the user names of SunScreen administrators. Use the names that you defined for the Administrative User object.  

Access Level 

Specifies what actions the designated user can perform. 

  1. ALL - Allows the administrator to display and modify all setting for the Screen.

  2. WRITE - The administrator can perform all operations except modifying the Administration Access rules for any Policy.

  3. READ - The administrator can view both the Information and Policy. This level also allows the user to save and clear logs on the information page. With this access level users cannot modify any Policy data.

  4. STATUS - The administrator can display status information (logs, statistics, status information) but cannot display or modify management settings.

  5. NONE - The administrator no longer has any access. This switch prevents an administrator who had access from logging in without having to remove that administrator from the database.

Description 

(Optional) Provides a brief description of the Administrative Access rule.  

Move 

Allows you to assign a new rule index number for the rule that you highlighted in the Access Rules for GUI Local Administration panel of the Administrative Access tab. 

Delete 

Deletes the access rule that you highlighted in the Access Rules for GUI Local Administration panel of the Administrative Access tab. 

Help 

Displays the online help. 

The Access Rules for Remote Administration

Use the Remote Access Rules dialog box, shown in FIGURE 5-47, to add or modify administrative access rules for remote administration stations. The certificates used here must be of the same strength and type as those defined in the screen object. The entries here determine what type of remote Administration Station the Screen will accept. The Screen only uses the administration certificate field of the Screen object here.

Figure 5-47 Remote Access Rules Dialog Box

Graphic

TABLE 5-43 describes the controls for the Remote Access Rules dialog box.

Table 5-43 Controls for the Remote Access Rules Dialog Box

Control 

Description 

Rule Index 

(Optional) Assigns a number to a rule. By default, this field displays a number one greater than the last rule (indicating this rule will be placed bottom of the list). If you type a lower number, the new rule is inserted into the specified position in the list, and the rules currently in the configuration are renumbered.  

Screen 

(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. The default All applies to all Screens.

Address Object 

Specifies from where users may initiate a connection. 

User 

Lists the user names of SunScreen administrators. Use the names that you defined for the Administrative User object.  

Encryption 

Specifies the version of SunScreen SKIP being used to encrypt traffic between the Screen and the Administration Station.  

Certificate Group 

Specifies the name of the certificate group, which can correspond to a single certificate or a certificate group, allowed over this interface. 

Key Algorithm 

Identifies the algorithm used to encrypt traffic-encrypting keys. The algorithms available depend on the strength of encryption (128 bit, or 56 bit) that you are using with SunScreen.  

Data Algorithm 

Identifies the algorithm used to encrypt message traffic between the Screen and the Administration Station. The algorithms available depend on the strength of encryption (128 bit or 56 bit) that you are using with SunScreen.  

MAC Algorithm 

Identifies the algorithm used to authenticate traffic.  

Tunnel 

Identifies the tunnel address used for the communication between the remote Administration Station and the Screen.  

Access Level 

Specifies what actions the designated user can perform: 

  1. ALL - The administrator can display and modify all settings for the Screen.

  2. WRITE - The administrator can perform all operations except modifying the Administration Access rules for any Policy.

  3. READ - The administrator can view both the Information and Policy. This level also allows the user to save and clear logs on the information page. With this access level users cannot modify any Policy data.

  4. STATUS - The administrator can display status information (logs, statistics, status) but cannot display or modify management settings.

  5. NONE - The administrator does not have access.

Description 

(Optional) Provides a brief description of the remote administrative access rule.  

Move 

Enables you to assign a new rule index number for the rule that you highlighted in the Access Rules for Remote Administration panel of the Administrative Access tab. 

Delete 

Deletes the access rule that you highlighted in the Access Rules for Remote Administration panel of the Administrative Access tab. 

Help 

Displays the online help. 

NAT Tab

Use the Network Address Translation (NAT) tab, shown in FIGURE 5-48, to set up mapping rules to translate IP addresses according to specific rules. These rules interpret the source and destination of incoming IP packets, then translate either the apparent source or the intended destination, and send the packets on. You can map hosts, lists of addresses, ranges of addresses, or specific groups, depending on what you have configured in your SunScreen installation. See "Address" for information on defining addresses, ranges, or groups of addresses.

Figure 5-48 NAT Tab

Graphic

In general, you map addresses to:

Translating both source and destination addresses is not possible--that is, making packets appear to come from a different IP address and directing the packets to a different destination simultaneously is not possible.

When defining NAT rules, the first rule (lowest number) that matches a packet is the one that applies, and no other rules can apply; define specific rules first, then broader cases later.

FIGURE 5-49 shows the NAT Definition dialog box.

Figure 5-49 NAT Definition Dialog Box

Graphic

TABLE 5-44 describes the controls for the NAT Definition dialog box.

Table 5-44 Controls for the NAT Dialog Box

Control 

Description 

Rule Index 

Assigns a number to a rule. By default, this field displays a number one greater than the last rule (indicating this rule will be placed at the end of the list). If you type a specific number, the new rule is inserted into that position in the list, and the rules currently in the configuration are renumbered.  

Screen 

(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. The default All applies to all Screens.

Mapping

  • Static - Specify static mapping to set up a one-to-one relationship between two addresses. You could use this to set new apparent IP addresses for hosts on your network without having to reconfigure each host, for example.

  • Dynamic - Specify dynamic mapping to map source addresses to other addresses in a many-to-few relationship. You could use dynamic mapping to ensure that all traffic leaving the firewall appears to come from a specific address or group of addresses, or to send traffic intended for several different hosts to the same actual IP access.

Source 

Specify the source address to map from an untranslated packet. Source addresses are the actual addresses contained in the packet entering the firewall.  

Destination 

Specify the untranslated destination address for the source packet. Destination addresses are the actual addresses contained in the packet entering the firewall.  

Translated Source 

Specify the translated source address for a packet. The translated source is the address the packet appears to originate from. 

Translated Destination 

Specify the translated destination packet address. The translated destination is the actual address the packet goes to after it leaves the firewall.  

Description 

Used to provide a description of the mapping defined in this rule.  

Add New 

Allows adding a new NAT rule. 

Edit 

Allows you to edit the NAT rule that you highlighted in the NAT tab. 

Move 

Allows you assign a new rule index number for the rule that you highlighted in the NAT tab. 

Delete 

Deletes the access rule that you highlighted in the NAT tab. 

Help 

Displays the online help. 

When defining rules, remember that translating both source and destination addresses is not possible. Either translate packets so they appear to come from a different source, or translate packets so they go to a specific destination, but not both.

All static NAT rules are unidirectional--that is, they work precisely as defined, and are not interpreted as also applying in the reverse direction. For rules to apply in both directions, specify two different rules. For example, if you map the source address internalname.com to the destination publicip.com, you will also have to map the source publicip.com to the destination internalname.com to translate traffic in both directions.

VPN Tab

The VPN tab, shown in FIGURE 5-50, allows you to define VPN gateways. Defining VPN gateways using this mechanism simplifies the creation of VPNs that include more than two gateways and are managed in a centralized management group.


Note -

Each gateway in this type of configuration must be able to connect to the other ones directly--without going through another gateway.


Figure 5-50 VPN Tab

Graphic

Setting up a VPN requires:

  1. Choosing a name for the VPN.

  2. Defining the VPN gateway.

  3. Adding a rule for the VPN.

Defining VPN Gateways

Use the VPN Definition box, shown in FIGURE 5-51, to define and edit VPN gateways.

Figure 5-51 VPN Definition Dialog Box

Graphic

TABLE 5-45 describes the controls in the VPN Definition dialog box for defining VPN gateways.

Table 5-45 Controls in the VPN Definition Dialog Box

Control 

Descriptions 

Rule Index 

(Optional) Assigns a number to a rule. By default, this field displays a number one greater than the last rule (indicating this rule will be placed the end of the list). Typing a lower number inserts the new rule into the specified position in the list and renumbers the rules currently in the configuration. Rules take effect in order. 

Name 

Specifies the Name of the VPN to which this gateway belongs. Type the same name in the Name field for each gateway that is in the VPN.  

Address 

Specifies the machine to be included in the VPN.  

Certificate 

Specifies the name of the certificate for this VPN gateway. 

Key Algorithm 

Specifies the secret (key) algorithm the VPN uses. All gateways in the same VPN must use the same (key) algorithm.  

Data Algorithm 

Specifies the data algorithm the VPN uses. All gateways in the same VPN must use the same data algorithm.  

MAC Algorithm 

Specifies the MAC algorithm the VPN uses. All gateways in the same VPN must use the same MAC algorithm.  

Tunnel Address 

Specifies the destination address on the outer (unencrypted) IP packet to which tunnel packets are sent.  

Description 

(Optional) Provides a short description of the VPN gateway.  

Add New 

Allows adding a new VPN rule. 

Edit 

Allows you to edit the VPN rule that you highlighted in the NAT tab. 

Move 

Allows assigning a new rule index number for the rule highlighted in the NAT tab. 

Delete 

Deletes the access rule highlighted in the VPN tab. 

Help 

Displays the online help. 

Adding a VPN Rule

After defining the gateways in a VPN, add a packet-filtering rule for this VPN. Add the packet-filtering rule using the Packet Filter tab.

When adding a packet-filtering rule for a VPN, leave the Screen field empty.