SunScreen 3.1 Reference Manual

Packet Filtering Tab

The Packet Filtering tab displays a panel, shown in FIGURE 5-34, for configuring packet-filtering rules. Use packet filtering to control traffic using a particular service, traffic intended for a particular service, or traffic coming from a particular address.

Figure 5-34 Packet Filtering Tab

Graphic

SunScreen uses ordered packet filtering. The Screen assumes that the first rule that matches a packet is the rule that governs the disposition of the packet.

If the packet does not match any rule, the Screen uses its default action to determine the disposition of the packet.


Note -

The default action is set when defining the interfaces. A default action can be set for each interface, but not for the entire Screen. Typically, the default action is to only drop the packet. Other options are available. See "Interface".


TABLE 5-35 describes the available fields in the Packet Filtering tab.

Table 5-35 fields on the Packet Filtering Tab

Field 

Description 

Rule Index 

(Optional) Assigns a number to a rule. When editing or adding a new rule, by default, this field displays a number one greater than the last rule (indicating this rule will be placed at the bottom of the list). If you type a lower number, the new rule is inserted into the specified position in the list, and the rules currently in the configuration are renumbered. 

Screen 

(Optional) Specifies the Screen for which you want the rule to apply. Type a specific Screen name in this field if you use centralized management and want a rule to apply to a specific Screen. 

Service 

Identifies the network service or service group to which this rule applies. Network services and service groups are described in Appendix C, Services and State Engines.

Source 

The value to which the source address of a packet is compared. If an asterisk (*) appears, any source address meets the criteria of the rule. 

Destination 

The value to which the destination address of a packet is compared to determine whether the rule should apply. If an asterisk (*) appears, any destination address meets the criteria of the rule. 

Action 

Displays the action for the rule and permits setting the logging behavior. The options are: 

  • ALLOW

  • DENY

  • ENCRYPT

  • SECURE

Time 

Specifies the time of day for the rule. 

Description 

(Optional) Provides a brief description of the Administrative Access rule.  

To edit every field, except the Rule Index field, on the Packet Filtering tab, click it to display the choice list. The changes in the fields for a rule are reflected in the Common Objects panel, except for the Action field, which displays a dialog box for that rule and policy. Set the logging options for the action in the dialog box for that action. The particular dialog box that appears depends on the action selected.

ALLOW Action

FIGURE 5-35 shows the Policy Rule Index dialog box for the ALLOW action.

Figure 5-35 Policy Rule Index Dialog Box for ALLOW action

Graphic

TABLE 5-36 describes the controls in Policy Rule Index dialog box for ALLOW action.

Table 5-36 Controls for ALLOW Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

  • LOG_SESSION - Record information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

PROXY 

Specifies the proxy the Screen should use, if any, when a packet meets the selection criteria of the rule. The options are: 

  • NONE

  • PROXY_HTTP

  • PROXY_FTP

  • PROXY_SMTP

  • PROXY_telnet

If you choose a proxy, another dialog box, according to the proxy chosen, is displayed. 

Figure 5-36 PROXY_HTTP Dialog Box for ALLOW action

Graphic

TABLE 5-37 lists the flags for the HTTP proxy.

Table 5-37 HTTP Proxy Flags

Flag 

Function 

Cookies 

Permits the use of cookies. The options are: 

  • ALLOW

  • DENY

ActiveX 

Permits the use of ActiveX. The options are: 

  • ALLOW

  • DENY

Java 

Allow or disallow use of Java applets. The options are: 

  • Allow JAVA

  • Block JAVA

  • JAR Signature

  • JAR Hash

  • JAR Signature and Hash

SSL 

Permits the use of SSL encryption. The options are: 

  • ALLOW

  • DENY

Figure 5-37 PROXY_FTP Dialog Box for ALLOW action

Graphic

TABLE 5-38 lists the settings available for the flags for the FTP proxy.

Table 5-38 FTP Proxy Flags

Flag 

Function 

GET 

Allow or disallow use of the FTP get command 

PUT 

Allow or disallow use of the FTP put command 

CHDIR 

Allow or disallow use of the FTP chdir command 

MKDIR 

Allow or disallow use of the FTP mkdir command 

RENAME 

Allow or disallow use of the FTP rename command 

REMOVE 

Allow or disallow use of the FTP remove_dir command 

DELETE 

Allow or disallow use of the FTP delete command 

PROXY USERS 

Choose the proxy user or the group of proxy users that you want for this rule. You can have only one proxy user or one group of proxy users in this field. You define these proxy users in the proxy user common object. 

Figure 5-38 PROXY_SMTP Dialog Box for ALLOW action

Graphic

The only flag for the SMTP proxy is to allow or disallow relayed mail.

Figure 5-39 PROXY_Telnet Dialog Box for ALLOW action

Graphic

For the PROXY USER field, type the proxy user or the group of proxy users that you want for this rule from the choice list. Specify only one proxy user or one group of proxy users in this field. Define these proxy users in the proxy user common object.

DENY Action

FIGURE 5-40 shows the Policy Rule Index dialog box for DENY action

Figure 5-40 Policy Rule Index Dialog Box for DENY Action

Graphic

TABLE 5-39 describes the controls in Policy Rule Index dialog box for DENY action.

Table 5-39 Controls for DENY Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

ICMP Reject 

Identifies the ICMP rejection message issued when the rule is applied. In most cases, the Screen rejects packets by sending an ICMP Destination Unreachable packet with the reject code set as specified in the ICMP action in the rule. 

The one exception is the PORT_UNREACHABLE ICMP action. In this case, the Screen rejects TCP packets by sending a TCP RESET packet and other packets by sending an ICMP Destination Unreachable (Port Unreachable) message. 

The options for the actions are: 

  • NONE

  • NET_UNREACHABLE

  • HOST_UNREACHABLE

  • PORT_UNREACHABLE

  • NET_FORBIDDEN

  • HOST_FORBIDDEN

PROXY 

Specifies the proxy you want to use, if any. The options are: 

  • NONE

  • PROXY_HTTP

  • PROXY_FTP

  • PROXY_SMTP

  • PROXY_telnet

If you choose a proxy, another dialog box, according to the proxy chosen, is displayed. 

PROXY USERS 

You must type the name or names of the proxy users in this field. You find the proxy users by selecting proxy user as the type of object and searching for them in Common Objects panel of the Policy Rules page. 

Figure 5-41 PROXY_FTP Dialog Box for DENY action

Graphic

Figure 5-42 PROXY_Telnet Dialog Box for DENY action

Graphic

ENCRYPT Action

FIGURE 5-43 shows the Policy Rule Index dialog box for ENCRYPT action.

Figure 5-43 Policy Rule Index Dialog Box for ENCRYPT Action

Graphic

TABLE 5-40 describes the controls in Policy Rule Index dialog box for ENCRYPT action.

Table 5-40 Controls For ENCRYPT Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Records the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Records the complete packet in the log.

  • LOG_SESSION - Records information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

Encryption 

Specifies the version of SKIP. The options are: 

  • SKIP_VERSION_1 - Use old-style SKIP to encrypt or decrypt packets.

  • SKIP_VERSION_2 - Use new-style SKIP to encrypt or decrypt packets.

Source Tunnel 

Specifies the tunnel address of the from encryptor.

Destination Tunnel 

Specifies the tunnel address of the to encryptor.

From Encryptor 

Specifies the certificate name for the SKIP host that is encrypting the data. This can be either a Screen or an end-system SKIP host. Either the From Encryptor or the To Encryptor must identify a SKIP certificate on the local Screen 

To Encryptor 

Specifies the certificate name for the SKIP host that is decrypting the data. This machine can be the local Screen or a remote host. 

Key Algorithm 

Specifies the type of encryption you want to use for traffic. The options available depend on the strength of encryption that you are using. 

Data Algorithm 

Specifies the type of encryption you want to use for data. The options available depend on the strength of encryption that you are using. 

MAC Algorithm 

Specifies the type of authentication that you want to use for packets that meet the criteria of this rule. The MAC algorithm is supported in SKIP version 2. The options are: 

  • none

  • MD5

  • MD5-NAT

SECURE Action

FIGURE 5-44 shows the Policy Rule Index dialog box for SECURE action

Figure 5-44 Policy Rule Index Dialog Box for SECURE Action

Graphic

TABLE 5-41 describes the controls in Policy Rule Index dialog box for SECURE action.

Table 5-41 Controls for SECURE Action

Control 

Description 

Log 

Sets logging behavior. The options are: 

  • LOG_NONE - Do not log packets.

  • LOG_SUMMARY - Record the first 40 bytes of the packet in the log.

  • LOG_DETAIL - Record the complete packet in the log.

  • LOG_SESSION - Record information about the session in the log. The information saved consists of the source and destination addresses and ports (if applicable), the amount of data being sent in each direction, and the length of the session. Not used for stateless services such as ip all.

SNMP 

Specifies whether the Screen should issue an SNMP trap message when the rule is applied. The options are: 

  • SNMP_NONE - Do not send an SNMP alert message when a packet matches the criteria of this rule.

  • SNMP - Send an SNMP alert message when a packet matches the criteria of this rule.

VPN 

Specifies the name of the VPN to which the rule applies.