[120879] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: I don't need no stinking firewall!

daemon@ATHENA.MIT.EDU (Henry Yen)
Tue Jan 5 16:56:31 2010

Date: Tue, 5 Jan 2010 16:55:22 -0500
From: Henry Yen <henry@AegisInfoSys.com>
To: nanog@nanog.org
Mail-Followup-To: nanog@nanog.org
In-Reply-To: <4B43ACB7.6040603@west.net>;
	from Jay Hennigan on Tue, Jan 05, 2010 at 13:18:47PM -0800
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, Jan 05, 2010 at 13:18:47PM -0800, Jay Hennigan wrote:
> Jason Shearer wrote:
> > Doesn't using the established allow any packet with ACK/RST set 
> 
> Yes, as would be expected for legitimate return traffic for a TCP 
> connection initiated from a browser inside the firewall.
> 
> > and wouldn't you have to allow all high ports?
> 
> That's what the ">" is for.  Cisco syntax "gt" (greater than).

One could also use reflexive access lists, which are much better
than static lists, although that takes you back to stateful.

It is possible to combine them both to achieve a mostly stateless
setup while still having better overall security.

> The point is that either of these will deny unsolicited new connection 
> attempts from the outside to TCP 22 (and 445, 135, etc.)

-- 
Henry Yen                                       Aegis Information Systems, Inc.
Senior Systems Programmer                       Hicksville, New York
                                                (800) 234-4700


home help back first fref pref prev next nref lref last post