Firewall Regeln! |
||
---|---|---|
#0
| ||
20.12.2005, 19:28
...neu hier
Beiträge: 2 |
||
|
||
20.12.2005, 22:01
Moderator
Beiträge: 2312 |
#2
jede firewall fängt wohl damit an:
deny all from (internet) allow all from (LAN) somit ist jeder verkehr nach außen erlaubt, nach innen aber nicht. dann kannst du ausgewählte Ports für z.B. Webserver etc freigeben. __________ Woher soll ich wissen was ich denke, bevor ich höre was ich sage?? Sag NEIN zu HD+/CI+ - boykottiert die Etablierung von HD+/CI+! |
|
|
||
20.12.2005, 22:07
...neu hier
Themenstarter Beiträge: 2 |
#3
Zitat sub_zero posteteich hab foldende Aufgabe bekommen: Die Angabe: The figure below shows a network diagram of a company’s network. The external IP address range of the company is 128.131.95.0/28. Your task is to write the rules for the two firewalls. The exact syntax isn’t important but it has to be clear what you mean. Use first-match rules which include: • the action (deny; or ;allow) • the interface(s) the packet is coming in (A, B or C) • the packet type (tcp, udp, tcp/udp) • the source IP address or range or any • for tcp+udp: the source port(s) (if missing implying all ports) • the destination IP address or range or any • for tcp+udp: the destination port(s) (if missing implying all ports) Notes: • Use first-match rules. • Only write rules for incoming packets; outgoing rules are not needed. (“Incoming packets” are seen from the perspective of the firewalls. There won’t be any packets originating from the firewalls, so all packets going out of the firewall will have to go in on some interface first.) • The default rule (if none matches) is “deny all”. • You don’t have to care about ICMP. • You don’t have to care about TCP flags. • You don’t have to care about the firewall being stateful; just write rules for the initial packets of a communication (the TCP-SYN packets or the first packet of a UDP communication) • Firewall 2 is a NAT device, firewall 1 is a “normal” firewall • The NAT device masquerades all IPs from to internal network to the IP address 128.131.95.4 • The servers between the two firewalls are in a DMZ • If you want to specify a single IP address you can leave out the “/32”. • Clearly separate the rules for firewall 1 and 2. • The interface (A, B or C) is required for each rule. • Don’t write unnecessary rules. (The default action is deny all) • “128.131.195.1” is just the gateway. There will be no direct traffic from/to it’s IP address. Requirements: • All ports on the DMZ servers that are reachable from the Internet should also be reachable from the internal hosts • The SSH ports on the DMZ servers should only be reachable from the internal network • The SMTP, SMTPS, “submission” and IMAPS ports should be reachable from the Internet • The IMAP port should only be reachable from the internal network • The DNS servers should be reachable by UDP from the Internet; TCP will only be used for DNS updates between the two servers and should therefore not be reachable from the internal network nor the Internet • The FTP server should be reachable from the internal network (you don’t have to care about the additional ports required; just write rules for port 21) • The HTTP and HTTPS ports should be reachable from the Internet • The Postgresql server should not be reachable from the internal network nor the Internet (it is only used by the web server) • All IP addresses and ports on the Internet should be reachable by all PCs on the internal network • The HTTP server on IP address 128.131.167.5 has to be reachable by the web server. • The internal network should be easily expandable (a new host shouldn’t require a firewall rule change) • Ports on the DMZ servers that are not needed shouldn’t be reachable from the Internet nor the internal network • The wireless network (192.168.1.0/24) should be able to access the Internet and all the ports on the DMZ servers the other internal network is able to access; it should not be able to access the internal network. • The internal network shouldn’t be able to access the wireless network and vice versa. Das Bild: siehe Anhang Was meisnt du? Wie ist sie zu lösen? Anhang: DMZ.jpg Dieser Beitrag wurde am 20.12.2005 um 22:13 Uhr von sub_zero editiert.
|
|
|
Kennt sich hier jemand mit den Firewall Regeln unter Linux gut aus?
Ich soll nämlich eine Regel für ein DMZ (geschütztes Computernetz) schreiben! Kenn mich aber leider nicht so gut aus!
Example rules (they don’t make much sense):
allow tcp on B from 10.0.0.120 to 192.168.1.0/24 ports 10-20
deny udp on B from any to 192.168.1.5 ports 7
Falls sich jemand meldet, werde ich das Bild hier posten!
LG
Sub_zero