----- Original Message -----
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, September 12, 2001 2:08 PM
Subject: Firewalls digest, Vol 1 #258 - 4 msgs


> Send Firewalls mailing list submissions to
> [EMAIL PROTECTED]
>
> To subscribe or unsubscribe via the World Wide Web, visit
> http://lists.gnac.net/mailman/listinfo/firewalls
> or, via email, send a message with subject or body 'help' to
> [EMAIL PROTECTED]
>
> You can reach the person managing the list at
> [EMAIL PROTECTED]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Firewalls digest..."
>
>
> Today's Topics:
>
>    1. Re: about UDP (Ken Milder)
>    2. RE: AOL probe - "just" Code Red (william.wells)
>    3. Good Mail List for Cisco Router Config? (Harry Whitehouse)
>    4. RE: Reflexive access lists (Scheidel, Greg (Contractor))
>
> --__--__--
>
> Message: 1
> Date: Wed, 12 Sep 2001 13:34:03 -0600
> To: liuhy <[EMAIL PROTECTED]>
> From: Ken Milder <[EMAIL PROTECTED]>
> Subject: Re: about UDP
> Cc: [EMAIL PROTECTED]
>
>
> --=====================_17467857==_.ALT
> Content-Type: text/plain; charset="us-ascii"; format=flowed
>
> I do not know all the details, but have you thought about using TCP
sliding
> windows to get your desired performance improvement?  To my knowledge,
that
> is the more standard approach.
>
>          -Ken
>
> At 9/11/2001 08:53 AM, liuhy wrote:
> >Hello everyone,
> >
> >I am on the subject that designed a communication protocol between
> >firewall and a external server. At the beginning I create a reliable
> >connection between them by using TCP, but in order to increase its
> >performance I want to use UDP, can I complete this job?
> >
> >Any help will be grateful.
> >
> >liuhy
> >
> >2001.9.11
>
> *********************************************************************
> Kenneth H. Milder
> Los Alamos National Laboratory
> Computing, Communications & Networking Division (CCN)
> Network Engineering Group(CCN-5)
> Network Support Team (NST)/X Division Computing Services Team (XCS)
> MS-F645
> Los Alamos, New Mexico 87545-0010
>
> Office:  (505)667-2552
> Fax:       (505)665-3389
> E-mail:    [EMAIL PROTECTED]
> *********************************************************************
> --=====================_17467857==_.ALT
> Content-Type: text/html; charset="us-ascii"
>
> <html>
> I do not know all the details, but have you thought about using TCP
> sliding windows to get your desired performance improvement?&nbsp; To my
> knowledge, that is the more standard approach. <br>
> <br>
> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -Ken<br>
> <br>
> At 9/11/2001 08:53 AM, liuhy wrote:<br>
> <blockquote type=cite class=cite cite><font face="Times New Roman,
Times">Hello
> everyone,</font><br>
> &nbsp;<br>
> <font face="Times New Roman, Times">I am on the subject that designed a
> communication protocol between firewall and a external server. At the
> beginning I create a reliable connection between them by using TCP, but
> in order to increase its performance I want to use UDP, can I complete
> this job?</font><br>
> &nbsp;<br>
> <font face="Times New Roman, Times">Any help will be
> grateful.</font><br>
> &nbsp;<br>
> <font face="Times New Roman, Times">liuhy</font><br>
> &nbsp;<br>
> <font face="Times New Roman, Times">2001.9.11</font></blockquote>
> <x-sigsep><p></x-sigsep>
> <font face="Arial Unicode MS, Helvetica"
size=4>*********************************************************************
<br>
> Kenneth H. Milder<br>
> Los Alamos National Laboratory<br>
> Computing, Communications &amp; Networking Division (CCN)<br>
> Network Engineering Group(CCN-5)<br>
> Network Support Team (NST)/X Division Computing Services Team (XCS)<br>
> MS-F645<br>
> Los Alamos, New Mexico 87545-0010<br>
> <br>
> Office:&nbsp; (505)667-2552<br>
> Fax:<x-tab>&nbsp;&nbsp;&nbsp;&nbsp;</x-tab>&nbsp;&nbsp;
> (505)665-3389<br>
> E-mail:&nbsp;&nbsp;&nbsp; [EMAIL PROTECTED]<br>
>
*********************************************************************</font>
</html>
>
> --=====================_17467857==_.ALT--
>
>
> --__--__--
>
> Message: 2
> From: "william.wells" <[EMAIL PROTECTED]>
> To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>
> Cc: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>
> Subject: RE: AOL probe - "just" Code Red
> Date: Wed, 12 Sep 2001 14:45:43 -0500
>
> AOL is configured to use a LAN(TCP/IP) connection which means its
connecting
> on port 5190 through our firewall and then setting up a virtual network
over
> that. When I get hit on port 80, I do a traceroute back to the port
reported
> by my intrusion detection software on my PC. That traceroute returned via
> their virtual network to named system (server?) in their DNS space.
>
> Our firewall is configured to block inbound port 80 so, up until
yesterday,
> I have literally 0 attempts of connections to port 80 over the past couple
> of years. Our firewall is constantly scanned and blocks things
accordingly.
>
> Hence,
> If one of their servers is attempting to access my PC via port 80 and send
> me a CodeRed URL, then there is something wrong with their servers (my
> opinion).
>
> If one of their customers can attempt to connect to port 80 on my PC
through
> AOL's virtual network connection which AOL establishes, then any company
or
> person which allows AOL's virtual adapter to run is opening up a hole
around
> any network security which they might have; only software resident on the
PC
> might protect them. The implication, if this is true (and the same
mechanism
> is used for dial-up), is that AOL shouldn't be allowed to run on any
system
> unless that system has personal firewall software. AOL, by itself, should
be
> considered unsecure. If that were true and became public, I'd think AOL
> would rapidly be out of business.
>
> I've been approaching this assuming that my connection to them was solely
to
> their servers implying that they can control what "touches" my system. If,
> when I connect, I am just another node in a virtual IP space which
contains
> all other active AOL connections and all systems can freely access my
> system, then I need to seriously rethink AOL. I wouldn't think that my
> system would have a resolvable name in their address space, but maybe so.
> Next time I come up, I'll have to do a DNS lookup of my PC's IP address.
>
> Incidentally, I enabled the AOL proxy this morning, connected to AOL, and
> had another alarm in probably under 1 minute; different IP address but
> everything else is the same.
>
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
> > Sent: Wednesday, September 12, 2001 12:41 PM
> > To: william.wells
> > Cc: [EMAIL PROTECTED]
> > Subject: RE: AOL probe - "just" Code Red
> >
> > William---
> >
> > Are you getting your Internet access from AOL or do you have another
> > Internet provide and connect to AOL through that?
> >
> > I'm no expert on AOL, but my understanding is that it's dial-up access
> > uses
> > it's own proprietary protocol, and it provide winsock-based IP access
> > through it's own virtual network adaptor - at least this is how previous
> > versions in the UK worked.
> >
> > If, however, you have a "proper" Internet connection (ie. broadband or
> > proper PPP dialup), and you access AOL over that, then AOL uses it's own
> > special port over IP to communicate with it's servers, and it's that
port
> > you need to allow through your IP firewall.
> >
> > However, unless you've set your personal firewall rules up correctly,
> > there
> > is no way you can stop ANY box TRYING to communicate with you on port
80,
> > whether from AOL or not.  If you're not running a web server of any kind
> > on
> > your box, then just block port 80, and don't bother configuring your
> > firewall to notify you. There is so much background noise on the
Internet
> > that the value of receiving individual alerts is pretty meaningless
> > (although it's obviously useful to look at longer term trends for the
> > connections made to your box, to identify repeated connection attempts).
> >
> > So, although AOL may block communication via it's own protocol from
other
> > users, you should not rely on them to block anything else, whether from
> > other AOL users of anyone on the Internet. You're being scanned at an IP
> > level, not a proprietary AOL protocol level..
> >
> > If you've never been scanned before, that more due to your luck than
> > anything else....
> >
> > Russell
> >
> >
> >         ----- Forwarded by Russell Donoff/GB/ABNAMRO/NL on 12/09/2001
> > 18:38
> >         -----
> >
> >
> >                     "william.wells"
> >
> >                     <william.wells@pr        To:
> > "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>
> >
> >                     ovell.com>               cc:
> >
> >                                              Subject:     RE: AOL
probe -
> > "just" Code Red
> >                     12/09/2001 18:21
> >
> >
> >
> >
> >
> >
> >
> >
> >
> >         What you are saying implies that other AOL users could access my
> >         system from
> >         their systems while I was logged into AOL. I thought AOL blocked
> >         that -
> >         perhaps not. I'm still talking to AOL. I've never been scanned
> >         while on AOL
> >         previously.
> >
> >
> >
>
> --__--__--
>
> Message: 3
> From: "Harry Whitehouse" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Subject: Good Mail List for Cisco Router Config?
> Date: Wed, 12 Sep 2001 13:31:21 -0700
>
> Hi all!
>
> I need to add an ARP configuration line to my Cisco 2600 router and
> one of the firewall members was kind enough to give me the required
> single line command.
>
> I've got the Cisco ConfigMaker software and am talking to my router,
> but because this is my first time configuring one I'm a tad nervous.
> I've configured my PIX firewall so I have a bit of experience, but
> before I blow my router out of the water, I'd better get some more
> help!
>
> Can anyone recommend an analogous mailing list where I can get some
> help with the Cisco router?
>
> TIA
>
> Harry
>
>
> --__--__--
>
> Message: 4
> From: "Scheidel, Greg (Contractor)" <[EMAIL PROTECTED]>
> To: 'Daniel Mester' <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
> Subject: RE: Reflexive access lists
> Date: Wed, 12 Sep 2001 16:56:14 -0400
>
> This message is in MIME format. Since your mail reader does not understand
> this format, some or all of this message may not be legible.
>
> ------_=_NextPart_001_01C13BCD.5C859F80
> Content-Type: text/plain;
> charset="iso-8859-1"
>
> The key to making this work (reflexive ACLs on a router with more than 2
> interfaces) is that:
>
> - Every interface has a static ACL that creates a reflexive ACL.
> - Every interface has a static ACL for inbound traffic that includes the
> previously created reflexive ACL.
>
> So for your scenario where you have three interfaces local
(192.168.1.1/24),
> DMZ (192.168.2.1/24), and ISP (1.1.1.1/30):
>
> ----- start snippet -----
> ! ---------------------------
> ! Access lists & reflexive access lists.
> ! - Apply an outbound ACL that defines reflexive ACLs
> !   for all traffic.  Use one reflexive ACL for connection-oriented, one
for
> !   connectionless; so that we can specifiy different timeouts.
> ! - Apply an inbound ACL that limits inboud traffic to only that
> !   which is allowed to *originate* sessions or connectionless queries.
> !   End with a reference to the reflexive ACL created by outbound
> !   traffic.
> ! Applying this pair of ACLs to all interfaces means that you are
> ! allowing all of the inbound sessions & connectionless queries that
> ! you specifically want, plus are allowing replies to all sessions &
> ! connectionless queries that went out this interface previously.
> !
> ! Also allows all traffic originating on the router/firewall to go out,
> ! and replies to that traffic allowed back in (via reflexive ACLs).
> ! ---------------------------
> !
> ! default reflexive ACL settings; set stateful timeout to 60 mins
> ip reflexive-list timeout 3600
> !
> !! Local (internal) Networks: Outgoing ACL that creates reflexive ACL for
> !! inbound traffic.
> ip access-list extended local-out
>  !
>  ! connectionless traffic; add lines for each connectionless protocol that
>  ! you deal with and want a timeout separate from session oriented
traffic;
>  ! 5 min timeout
>  permit icmp any any reflect local-in-rflx-connectionless timeout 300
>  permit udp any any reflect local-in-rflx-connectionless timeout 300
>  ! session traffic; everything else; 60 min timeout
>  permit ip any any reflect local-in-rflx-connection timeout 3600
> !
> !! Local (internal) Networks: Incoming ACL, including check against
> !! reflexive ACL
> ip access-list extended local-in
>  !
>  ! evaluate the reflexive ACLs created for traffic outbound from interface
>  evaluate local-in-rflx-connectionless
>  evaluate local-in-rflx-connection
>  !
>  ! allow internal users out for 'web' traffic
>  permit tcp 192.168.1.0 0.0.0.255 any eq 80
>  permit tcp 192.168.1.0 0.0.0.255 any eq 443
>  !
>  deny ip any any
> !
> !
> !! DMZ: Outgoing ACL that creates reflexive ACL for inbound traffic.
> ip access-list extended dmz-out
>  !
>  ! connectionless traffic; add lines for each connectionless protocol that
>  ! you deal with and want a timeout separate from session oriented
traffic;
>  ! 5 min timeout
>  permit icmp any any reflect dmz-in-rflx-connectionless timeout 300
>  permit udp any any reflect dmz-in-rflx-connectionless timeout 300
>  ! session traffic; everything else; 60 min timeout
>  permit ip any any reflect dmz-in-rflx-connection timeout 3600
> !
> !! DMZ: Incoming ACL, including check against reflexive ACL
> ip access-list extended dmz-in
>  !
>  ! evaluate the reflexive ACLs created for traffic outbound from interface
>  evaluate dmz-in-rflx-connectionless
>  evaluate dmz-in-rflx-connection
>  !
>  ! generally speaking, don't allow anything to be initiated from the DMZ
>  ! without good reason
>  !
>  deny ip any any
> !
> !! ISP: Outgoing ACL that creates reflexive ACL for inbound traffic.
> ip access-list extended local-out
>  !
>  ! connectionless traffic; add lines for each connectionless protocol that
>  ! you deal with and want a timeout separate from session oriented
traffic;
>  ! 5 min timeout
>  permit icmp any any reflect isp-in-rflx-connectionless timeout 300
>  permit udp any any reflect isp-in-rflx-connectionless timeout 300
>  ! session traffic; everything else; 60 min timeout
>  permit ip any any reflect isp-in-rflx-connection timeout 3600
> !
> !! ISP: Incoming ACL, including check against reflexive ACL
> ip access-list extended isp-in
>  !
>  ! evaluate the reflexive ACLs created for traffic outbound from interface
>  evaluate isp-in-rflx-connectionless
>  evaluate isp-in-rflx-connection
>  !
>  ! allow the Internet to get to specific hosts on your DMZ on specific
ports
>  permit ip any host 192.168.2.20 80
>  permit ip any host 192.168.2.20 443
>  !
>  deny ip any any
> !
> !! Interface configuration
> !
> int E0
>  desc Local (internal) networks
>  ip address 192.168.1.1 255.255.255.0
>  ip access-group local-in in
>  ip access-group local-out out
> !
> int E1
>  desc DMZ
>  ip address 192.168.2.1 255.255.255.0
>  ip access-group dmz-in in
>  ip access-group dmz-out out
> !
> int S0
>  desc ISP
>  ip address 1.1.1.1 255.255.255.252
>  ip access-group isp-in in
>  ip access-group isp-out out
> ----- end snippet -----
>
> The config snippet is relevant only to reflexive ACLS.  I left out lines
> you'd want to include in a real-world environment such as
> anti-spoofing/land-attack, extra ACL lines to make sure your DMZ is
isolated
> where necessary, etc in the ACLs; disabling transport inputs on VTYs, SNMP
> config, etc.
>
> So, some sample traffic...
>
> 192.168.1.50 (internal user) initiates HTTP to 192.168.2.20 (DMZ web
> server):
> 1) 192.168.1.50 -> 192.168.2.20 allowed by local-in on interface E0
(local)
> 2) 192.168.1.50 -> 192.168.2.20 allowed by dmz-out on interface E1 (DMZ).
> Line added to reflexive ACL dmz-out-connection.
> 3) 192.168.1.50 <- 192.168.2.20 allowed by dmz-in on interface E1 (DMZ) by
> virtue of referenced reflexive ACL dmz-out-connection.
> 4) 192.168.1.50 <- 192.168.2.20 allowed by local-out on interface E0
> (local).  Line added to reflexive ACL local-out-connection.
> 5) ... and so on ...  Note that the reflexive ACL does not continue to
grow
> on each subsequent exchange, as the router is smart enough to not add a
line
> that already exists; the expiratin time (current time + timeout) is
updated
> instead.  And yes you do end up with a line in the local-out-connection
> reflexive ACL that is somewhat extraneous; this is a trade-off, and at
least
> traffic for already existing conversations (I'm avoiding the word session
> since this is for session and connection-oriented traffic) is accepted
> immediately (at the top of the local-in ACL) when the reflexive ACL is
> evaulated instead of having to go through the rest of the ACL to match on
> the line that allowed the initial packet that started the conversation.
>
> 5.5.5.5 (Internet user) initiates HTTP to 192.168.2.20 (DMZ web server):
> 1) 5.5.5.5 -> 192.168.2.20 allowed by isp-in on interface S0 (ISP)
> 2) 5.5.5.5 -> 192.168.2.20 allowed by dmz-out on interface E1 (DMZ).  Line
> added to reflexive ACL dmz-out-connection.
> 3) 5.5.5.5 <- 192.168.2.20 allowed by dmz-in on interface E1 (DMZ) by
virtue
> of referenced reflexive ACL dmz-out-connection.
> 4) 5.5.5.5 <- 192.168.2.20 allowed by isp-out on interface S0 (ISP).  Line
> added to reflexive ACL isp-out-connection.
> 5) ... and so on ...
>
> User consoled on the firewall ping tests to 192.168.1.50 (internal user):
> 1) 192.168.1.1 -> 192.168.1.50 allowed by local-out on interface E0
(local).
> Line added to reflexive ACL local-in-connectionless.
> 2) 192.168.1.1 <- 192.168.1.50 allowed by local-in on interface E0 (local)
> by virtue of referenced reflexive ACL local-out-connectionless.
>
> Make sense?
>
> Greg S.
>
>
> -----Original Message-----
> From: Daniel Mester [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, September 11, 2001 8:17 AM
> To: [EMAIL PROTECTED]
> Subject: Reflexive access lists
>
>
> Hi all,
> i found it pretty weird - but reflexive access list on Cisco (12.1) work
> only for outbound access-list. I have a Cisco with 3 interfaces - local
> (Ethernet 0), dmz (Ethernet 1), isp (Serial 0). I use reflexive access
lists
> for my outbound connections from local to ISP - it works fine because
> "reflect <LISTNAME>" is used for outbound acl and "evaluate <LISTNAME>" is
> used for inbound acl. But what happens if i want to control with reflexive
> lists access from local to dmz? This time connection from local to dmz
will
> be filtered by inbound acl, wouldn't? And otherwise, connection from dmz
to
> local would be in outbound acl, right? And this way reflexive acl on my
> Ethernet0 (local) interface won't work. Example:
>
> ip access-list extended DMZ-IMZ
>  evaluate REFLECTED-DMZ
>  deny   ip <dmz-net> any log
>  permit ip any any
>
> Above, i do not want anything from DMZ to local if it hasn't been created
as
> part of local->DMZ connection. Because i use NAT all the traffic between
> local and ISP interfaces must go on (permit ip any any).
>
> ip access-list extended IMZ-DMZ
>  permit icmp any <dmz-net> reflect REFLECTED-DMZ
>  permit tcp any <dmz-net> reflect REFLECTED-DMZ
>  permit udp any <dmz-net> reflect REFLECTED-DMZ
>  remark ALL OTHER TRAFFIC
>  permit ip any any
>
> All the outbound traffic permitted with opening reflexive acl to DMZ.
>
> Interface ethernet 0
>  . . .
>  ip access-group IMZ-DMZ in
>  ip access-group DMZ-IMZ out
>
> This configuration would never work because all the packets from local to
> dmz wouldn't be reflected - the would be permitted by last rule - "permit
ip
> any any".
> I know i can put usual access lists with "established" - but after
flexible
> IPFilter on BSD it sounds horrible.
> Any ideas?
>   Daniel Mester.
>
> _______________________________________________
> Firewalls mailing list
> [EMAIL PROTECTED]
> http://lists.gnac.net/mailman/listinfo/firewalls
>
> ------_=_NextPart_001_01C13BCD.5C859F80
> Content-Type: text/html;
> charset="iso-8859-1"
> Content-Transfer-Encoding: quoted-printable
>
> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
> <HTML>
> <HEAD>
> <META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
> charset=3Diso-8859-1">
> <META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
> 5.5.2654.45">
> <TITLE>RE: Reflexive access lists</TITLE>
> </HEAD>
> <BODY>
>
> <P><FONT SIZE=3D2>The key to making this work (reflexive ACLs on a =
> router with more than 2 interfaces) is that:</FONT>
> </P>
>
> <P><FONT SIZE=3D2>- Every interface has a static ACL that creates a =
> reflexive ACL.</FONT>
> <BR><FONT SIZE=3D2>- Every interface has a static ACL for inbound =
> traffic that includes the previously created reflexive ACL.</FONT>
> </P>
>
> <P><FONT SIZE=3D2>So for your scenario where you have three interfaces =
> local (192.168.1.1/24), DMZ (192.168.2.1/24), and ISP =
> (1.1.1.1/30):</FONT></P>
>
> <P><FONT SIZE=3D2>----- start snippet -----</FONT>
> <BR><FONT SIZE=3D2>! ---------------------------</FONT>
> <BR><FONT SIZE=3D2>! Access lists &amp; reflexive access lists.</FONT>
> <BR><FONT SIZE=3D2>! - Apply an outbound ACL that defines reflexive =
> ACLs</FONT>
> <BR><FONT SIZE=3D2>!&nbsp;&nbsp; for all traffic.&nbsp; Use one =
> reflexive ACL for connection-oriented, one for</FONT>
> <BR><FONT SIZE=3D2>!&nbsp;&nbsp; connectionless; so that we can =
> specifiy different timeouts.</FONT>
> <BR><FONT SIZE=3D2>! - Apply an inbound ACL that limits inboud traffic =
> to only that</FONT>
> <BR><FONT SIZE=3D2>!&nbsp;&nbsp; which is allowed to *originate* =
> sessions or connectionless queries.</FONT>
> <BR><FONT SIZE=3D2>!&nbsp;&nbsp; End with a reference to the reflexive =
> ACL created by outbound</FONT>
> <BR><FONT SIZE=3D2>!&nbsp;&nbsp; traffic.</FONT>
> <BR><FONT SIZE=3D2>! Applying this pair of ACLs to all interfaces means =
> that you are</FONT>
> <BR><FONT SIZE=3D2>! allowing all of the inbound sessions &amp; =
> connectionless queries that</FONT>
> <BR><FONT SIZE=3D2>! you specifically want, plus are allowing replies =
> to all sessions &amp;</FONT>
> <BR><FONT SIZE=3D2>! connectionless queries that went out this =
> interface previously.</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>! Also allows all traffic originating on the =
> router/firewall to go out,</FONT>
> <BR><FONT SIZE=3D2>! and replies to that traffic allowed back in (via =
> reflexive ACLs).</FONT>
> <BR><FONT SIZE=3D2>! ---------------------------</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>! default reflexive ACL settings; set stateful =
> timeout to 60 mins</FONT>
> <BR><FONT SIZE=3D2>ip reflexive-list timeout 3600</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! Local (internal) Networks: Outgoing ACL that =
> creates reflexive ACL for</FONT>
> <BR><FONT SIZE=3D2>!! inbound traffic.</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended local-out</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! connectionless traffic; add lines for each =
> connectionless protocol that</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! you deal with and want a timeout separate =
> from session oriented traffic;</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! 5 min timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit icmp any any reflect =
> local-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit udp any any reflect =
> local-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! session traffic; everything else; 60 min =
> timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any any reflect =
> local-in-rflx-connection timeout 3600</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! Local (internal) Networks: Incoming ACL, =
> including check against</FONT>
> <BR><FONT SIZE=3D2>!! reflexive ACL</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended local-in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! evaluate the reflexive ACLs created for =
> traffic outbound from interface</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate local-in-rflx-connectionless</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate local-in-rflx-connection</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! allow internal users out for 'web' =
> traffic</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit tcp 192.168.1.0 0.0.0.255 any eq =
> 80</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit tcp 192.168.1.0 0.0.0.255 any eq =
> 443</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;deny ip any any</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! DMZ: Outgoing ACL that creates reflexive ACL for =
> inbound traffic.</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended dmz-out</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! connectionless traffic; add lines for each =
> connectionless protocol that</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! you deal with and want a timeout separate =
> from session oriented traffic;</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! 5 min timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit icmp any any reflect =
> dmz-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit udp any any reflect =
> dmz-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! session traffic; everything else; 60 min =
> timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any any reflect =
> dmz-in-rflx-connection timeout 3600</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! DMZ: Incoming ACL, including check against =
> reflexive ACL</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended dmz-in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! evaluate the reflexive ACLs created for =
> traffic outbound from interface</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate dmz-in-rflx-connectionless</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate dmz-in-rflx-connection</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! generally speaking, don't allow anything to =
> be initiated from the DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! without good reason</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;deny ip any any</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! ISP: Outgoing ACL that creates reflexive ACL for =
> inbound traffic.</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended local-out</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! connectionless traffic; add lines for each =
> connectionless protocol that</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! you deal with and want a timeout separate =
> from session oriented traffic;</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! 5 min timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit icmp any any reflect =
> isp-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit udp any any reflect =
> isp-in-rflx-connectionless timeout 300</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! session traffic; everything else; 60 min =
> timeout</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any any reflect =
> isp-in-rflx-connection timeout 3600</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! ISP: Incoming ACL, including check against =
> reflexive ACL</FONT>
> <BR><FONT SIZE=3D2>ip access-list extended isp-in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! evaluate the reflexive ACLs created for =
> traffic outbound from interface</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate isp-in-rflx-connectionless</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate isp-in-rflx-connection</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;! allow the Internet to get to specific hosts =
> on your DMZ on specific ports</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any host 192.168.2.20 80</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any host 192.168.2.20 443</FONT>
> <BR><FONT SIZE=3D2>&nbsp;!</FONT>
> <BR><FONT SIZE=3D2>&nbsp;deny ip any any</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>!! Interface configuration</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>int E0</FONT>
> <BR><FONT SIZE=3D2>&nbsp;desc Local (internal) networks</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip address 192.168.1.1 255.255.255.0</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group local-in in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group local-out out</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>int E1</FONT>
> <BR><FONT SIZE=3D2>&nbsp;desc DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip address 192.168.2.1 255.255.255.0</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group dmz-in in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group dmz-out out</FONT>
> <BR><FONT SIZE=3D2>!</FONT>
> <BR><FONT SIZE=3D2>int S0</FONT>
> <BR><FONT SIZE=3D2>&nbsp;desc ISP</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip address 1.1.1.1 255.255.255.252</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group isp-in in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group isp-out out</FONT>
> <BR><FONT SIZE=3D2>----- end snippet -----</FONT>
> </P>
>
> <P><FONT SIZE=3D2>The config snippet is relevant only to reflexive =
> ACLS.&nbsp; I left out lines you'd want to include in a real-world =
> environment such as anti-spoofing/land-attack, extra ACL lines to make =
> sure your DMZ is isolated where necessary, etc in the ACLs; disabling =
> transport inputs on VTYs, SNMP config, etc.</FONT></P>
>
> <P><FONT SIZE=3D2>So, some sample traffic...</FONT>
> </P>
>
> <P><FONT SIZE=3D2>192.168.1.50 (internal user) initiates HTTP to =
> 192.168.2.20 (DMZ web server):</FONT>
> <BR><FONT SIZE=3D2>1) 192.168.1.50 -&gt; 192.168.2.20 allowed by =
> local-in on interface E0 (local)</FONT>
> <BR><FONT SIZE=3D2>2) 192.168.1.50 -&gt; 192.168.2.20 allowed by =
> dmz-out on interface E1 (DMZ).&nbsp; Line added to reflexive ACL =
> dmz-out-connection.</FONT></P>
>
> <P><FONT SIZE=3D2>3) 192.168.1.50 &lt;- 192.168.2.20 allowed by dmz-in =
> on interface E1 (DMZ) by virtue of referenced reflexive ACL =
> dmz-out-connection.</FONT></P>
>
> <P><FONT SIZE=3D2>4) 192.168.1.50 &lt;- 192.168.2.20 allowed by =
> local-out on interface E0 (local).&nbsp; Line added to reflexive ACL =
> local-out-connection.</FONT></P>
>
> <P><FONT SIZE=3D2>5) ... and so on ...&nbsp; Note that the reflexive =
> ACL does not continue to grow on each subsequent exchange, as the =
> router is smart enough to not add a line that already exists; the =
> expiratin time (current time + timeout) is updated instead.&nbsp; And =
> yes you do end up with a line in the local-out-connection reflexive ACL =
> that is somewhat extraneous; this is a trade-off, and at least traffic =
> for already existing conversations (I'm avoiding the word session since =
> this is for session and connection-oriented traffic) is accepted =
> immediately (at the top of the local-in ACL) when the reflexive ACL is =
> evaulated instead of having to go through the rest of the ACL to match =
> on the line that allowed the initial packet that started the =
> conversation.</FONT></P>
>
> <P><FONT SIZE=3D2>5.5.5.5 (Internet user) initiates HTTP to =
> 192.168.2.20 (DMZ web server):</FONT>
> <BR><FONT SIZE=3D2>1) 5.5.5.5 -&gt; 192.168.2.20 allowed by isp-in on =
> interface S0 (ISP)</FONT>
> <BR><FONT SIZE=3D2>2) 5.5.5.5 -&gt; 192.168.2.20 allowed by dmz-out on =
> interface E1 (DMZ).&nbsp; Line added to reflexive ACL =
> dmz-out-connection.</FONT>
> <BR><FONT SIZE=3D2>3) 5.5.5.5 &lt;- 192.168.2.20 allowed by dmz-in on =
> interface E1 (DMZ) by virtue of referenced reflexive ACL =
> dmz-out-connection.</FONT></P>
>
> <P><FONT SIZE=3D2>4) 5.5.5.5 &lt;- 192.168.2.20 allowed by isp-out on =
> interface S0 (ISP).&nbsp; Line added to reflexive ACL =
> isp-out-connection.</FONT>
> <BR><FONT SIZE=3D2>5) ... and so on ...</FONT>
> </P>
>
> <P><FONT SIZE=3D2>User consoled on the firewall ping tests to =
> 192.168.1.50 (internal user):</FONT>
> <BR><FONT SIZE=3D2>1) 192.168.1.1 -&gt; 192.168.1.50 allowed by =
> local-out on interface E0 (local).&nbsp; Line added to reflexive ACL =
> local-in-connectionless.</FONT></P>
>
> <P><FONT SIZE=3D2>2) 192.168.1.1 &lt;- 192.168.1.50 allowed by local-in =
> on interface E0 (local) by virtue of referenced reflexive ACL =
> local-out-connectionless.</FONT></P>
>
> <P><FONT SIZE=3D2>Make sense?</FONT>
> </P>
>
> <P><FONT SIZE=3D2>Greg S.</FONT>
> </P>
> <BR>
>
> <P><FONT SIZE=3D2>-----Original Message-----</FONT>
> <BR><FONT SIZE=3D2>From: Daniel Mester [<A =
> HREF=3D"mailto:[EMAIL PROTECTED]";>mailto:[EMAIL PROTECTED]</A>]</FONT>
> <BR><FONT SIZE=3D2>Sent: Tuesday, September 11, 2001 8:17 AM</FONT>
> <BR><FONT SIZE=3D2>To: [EMAIL PROTECTED]</FONT>
> <BR><FONT SIZE=3D2>Subject: Reflexive access lists</FONT>
> </P>
> <BR>
>
> <P><FONT SIZE=3D2>Hi all,</FONT>
> <BR><FONT SIZE=3D2>i found it pretty weird - but reflexive access list =
> on Cisco (12.1) work</FONT>
> <BR><FONT SIZE=3D2>only for outbound access-list. I have a Cisco with 3 =
> interfaces - local</FONT>
> <BR><FONT SIZE=3D2>(Ethernet 0), dmz (Ethernet 1), isp (Serial 0). I =
> use reflexive access lists</FONT>
> <BR><FONT SIZE=3D2>for my outbound connections from local to ISP - it =
> works fine because</FONT>
> <BR><FONT SIZE=3D2>&quot;reflect &lt;LISTNAME&gt;&quot; is used for =
> outbound acl and &quot;evaluate &lt;LISTNAME&gt;&quot; is</FONT>
> <BR><FONT SIZE=3D2>used for inbound acl. But what happens if i want to =
> control with reflexive</FONT>
> <BR><FONT SIZE=3D2>lists access from local to dmz? This time connection =
> from local to dmz will</FONT>
> <BR><FONT SIZE=3D2>be filtered by inbound acl, wouldn't? And otherwise, =
> connection from dmz to</FONT>
> <BR><FONT SIZE=3D2>local would be in outbound acl, right? And this way =
> reflexive acl on my</FONT>
> <BR><FONT SIZE=3D2>Ethernet0 (local) interface won't work. =
> Example:</FONT>
> </P>
>
> <P><FONT SIZE=3D2>ip access-list extended DMZ-IMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;evaluate REFLECTED-DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;deny&nbsp;&nbsp; ip &lt;dmz-net&gt; any =
> log</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any any</FONT>
> </P>
>
> <P><FONT SIZE=3D2>Above, i do not want anything from DMZ to local if it =
> hasn't been created as</FONT>
> <BR><FONT SIZE=3D2>part of local-&gt;DMZ connection. Because i use NAT =
> all the traffic between</FONT>
> <BR><FONT SIZE=3D2>local and ISP interfaces must go on (permit ip any =
> any).</FONT>
> </P>
>
> <P><FONT SIZE=3D2>ip access-list extended IMZ-DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit icmp any &lt;dmz-net&gt; reflect =
> REFLECTED-DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit tcp any &lt;dmz-net&gt; reflect =
> REFLECTED-DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit udp any &lt;dmz-net&gt; reflect =
> REFLECTED-DMZ</FONT>
> <BR><FONT SIZE=3D2>&nbsp;remark ALL OTHER TRAFFIC</FONT>
> <BR><FONT SIZE=3D2>&nbsp;permit ip any any</FONT>
> </P>
>
> <P><FONT SIZE=3D2>All the outbound traffic permitted with opening =
> reflexive acl to DMZ.</FONT>
> </P>
>
> <P><FONT SIZE=3D2>Interface ethernet 0</FONT>
> <BR><FONT SIZE=3D2>&nbsp;. . .</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group IMZ-DMZ in</FONT>
> <BR><FONT SIZE=3D2>&nbsp;ip access-group DMZ-IMZ out</FONT>
> </P>
>
> <P><FONT SIZE=3D2>This configuration would never work because all the =
> packets from local to</FONT>
> <BR><FONT SIZE=3D2>dmz wouldn't be reflected - the would be permitted =
> by last rule - &quot;permit ip</FONT>
> <BR><FONT SIZE=3D2>any any&quot;.</FONT>
> <BR><FONT SIZE=3D2>I know i can put usual access lists with =
> &quot;established&quot; - but after flexible</FONT>
> <BR><FONT SIZE=3D2>IPFilter on BSD it sounds horrible.</FONT>
> <BR><FONT SIZE=3D2>Any ideas?</FONT>
> <BR><FONT SIZE=3D2>&nbsp; Daniel Mester.</FONT>
> </P>
>
> <P><FONT =
> SIZE=3D2>_______________________________________________</FONT>
> <BR><FONT SIZE=3D2>Firewalls mailing list</FONT>
> <BR><FONT SIZE=3D2>[EMAIL PROTECTED]</FONT>
> <BR><FONT SIZE=3D2><A =
> HREF=3D"http://lists.gnac.net/mailman/listinfo/firewalls"; =
> TARGET=3D"_blank">http://lists.gnac.net/mailman/listinfo/firewalls</A></=
> FONT>
> </P>
>
> </BODY>
> </HTML>
> ------_=_NextPart_001_01C13BCD.5C859F80--
>
>
> --__--__--
>
> _______________________________________________
> Firewalls mailing list
> [EMAIL PROTECTED]
> http://lists.gnac.net/mailman/listinfo/firewalls
>
>
> End of Firewalls Digest

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to