Rule Base

Security Policy

  1. Default Inbound
  2. Outbound
  3. Eitherbound

The effective security settings are a combination of settings found in the Security Policy Properties and the Rule Base. Packets are matched in the following order:


Sample Rule Base

Note: Rule Base Order is very important. The Firewall will implement rules in a Top Down order.

Verify the Rule Base to ensure the rule base settings are usable.

Install the Rule Base so that Firewall-1 will compile them, generate the corresponding script, and make it run in the enforcement point.

The Security Policy Tab (Rule 0)

Applying Gateway Rules to Interface Direction

TCP Session Timeout – Specify time in seconds after which TCP session times out.

Accept UDP Replies – Check to accept reply data in a two-way UDP communication.

UDP Virtual Session Timeout – Specify time in seconds a UDP reply channel remains open without packets being returned.

Enable Decryption on Accept – Check to decrypt incoming, accepted packets even when the rule does not include encryption.

Implied Rules: Implied rules are generated in the Rule Base for global properties. Check the properties enforced in the Security Policy and then choose a position in the Rule base for the implied rule.

First – place first in the Rule Base

Before last – place before the last rule in the Rule Base

Last – place as the last rule in the Rule Base

Accept VPN/Firewall-1 Control Connection Used by Firewall-1 for communication between Firewall daemons on different machines and for connecting to external servers such as RADIUS and TACACS.

Accept RIP – Check to accept RIP used by routed daemon.

Accept Domain Name Over UDP (Queries) – Check to accept DNS queries used by named.

Resolves names by associating them with their IP address. If named does not know the IP address of a host name, it issues a query to the name server on the Internet. UDP replies must therefore be enabled to receive the replies.

Accept Domain Name Over TCP (Zone Transfer) – Check to allow upload of Domain Name resolving tables.

Accept ICMP – Check to accept Internet Control Messages. This protocol is used to ensure proper and efficient operation of IP.

Accept Outgoing Packets Originating From Gateway – Check to accept all outgoing packets from Firewall-1 not from the internal network. Gateway rules are usually enforced in the inbound direction. When packets passing through the Gateway leave, it will be allowed to pass only if one of the following conditions is true:

Log Implied Rules – Implied rules are generated in the Rule Base from the properties defined in this window. If this is checked Firewall-1 generates log records for communications matching the implied rules.

Install Security Policy only if it can be successfully installed on ALL selected targets – The Security Policy will either be installed on all or none of the selected targets. Allows Administrator to ensure the same Security Policy is being enforced at all enforcement points.

Rule Base

Possible Rule Base actions include


Rule Base Actions

System Status Tool

Content Security

Anti - Spoofing

  1. Any - the default choice, no anti-spoof config in place
  2. No Security Policy - nothing at all
  3. Others - all packets are allowed except those with source IP addresses from networks listed under Valid Addresses for this object's other interfaces
  4. Others+ - same as Others, but packets from addresses listed under the Others+ section are allowed
  5. This Net - only packets from network attached to this interface are allowed
  6. Specific - only packets from a specifically defined object we define are allowed

                                                                                   Back     Home