IP security filter configuration
Filtering can be set up to be simple, using mostly autogenerated filter rules, or can be customized by defining very specific filter functions based on the properties of the IP packets.
Each line in a filter table is known as a rule. A collection of rules determine what packets are accepted in and out of the machine and how they are directed. Matches to filter rules on incoming packets are done by comparing the source address and SPI value to those listed in the filter table. Therefore, this pair must be unique. Filter rules can control many aspects of communications, including source and destination addresses and masks, protocol, port number, direction, fragment control, source routing, tunnel, and interface type.
- Static filter rules are created in the filter table to be used for the general filtering of traffic or for associating with manual tunnels. They can be added, deleted, modified, and moved. An optional description text field can be added to identify a specific rule.
- Autogenerated filter rules and user-specified filter rules (also called autogenerated filter rules) are a specific set of rules created for use of IKE tunnels. Both static and dynamic filter rules are created based on data management tunnel information and on data management tunnel negotiation.
- Predefined filter rules are generic filter rules
that cannot be modified, moved, or deleted, such as the
all traffic
rule, theah
rule, and theesp
rule. They pertain to all traffic.
- On host A – src addr set to
A
, dest addr toB
, direction to outbound - On host B – src addr set to
A
, dest addr toB
, direction to inbound
- src addr set to
A
, dest addr toB
, direction to outbound - src addr set to
A
, dest addr toB
, direction to inbound
A
, dest addr to B
and direction
to both. Therefore, the value of both for direction is typically
used in gateways that have the ipforwarding option set to no
. The above configuration is only for the packets travelling
from host A to host B through the gateway G. If you want the packets
to travel in the reverse direction (from host B to host A through
the gateway G), then you need another rule for that.Associated with these filter rules are Subnet masks, which group IDs that are associated with a filter rule, and the host-firewall-host configuration option. The following sections describe the different types of filter rules and their associated features.