?
Solved

Firewall Question

Posted on 2002-03-08
4
Medium Priority
?
196 Views
Last Modified: 2013-11-16
I have a quick question re: port issues on a Stateful Inspection firewall. Ie fw-1

(for simplistic reasons i am assuming no NAT!)
Ok i am on my companys LAN and want to connect to for eg www.bbc.com, I understand that I make a connection to their web server on TCP port 80. And their web server connects back to my machine on a random high end port.

My question is how do FW rules apply... to this.. ie let out traffic for port 80 and anything back in????????? (ie to connect to my machine on the high range port) therefore do the rules apply goingout/coming in? or does the firewall dynamically open the port coming back in?

Thanks
0
Comment
Question by:dbrannigan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
scraig84 earned 400 total points
ID: 6850389
Your last statement is correct.  The firewall will see that a TCP SYN packet has gone out from a particular source port on the inside to a particular destination port on the outside.  When the ACK packet comes back with the ports and addresses reversed (source now destination and vice-versa), the firewall will let that information flow.  It is statefull as it will watch the state of the connection - it will not allow a server on the outside to just randomly send packets with a source of 80 to any inside port.  Also, once the TCP session is completed, the firewall re-blocks the ports.  This way, somebody watching the session can't come in later spoofing the original destination IP address and ports and establish a connection with the inside.  The firewall will know that the session is over and not allow the communication.

Even filters on routers can do this to some degree, for example using the "established" keyword on a Cisco ACL.

Hope this helps and made some sense!
0
 
LVL 16

Expert Comment

by:SteveJ
ID: 6850419
What scraig84 is correct. I would add that some "stateful" inspection engines will incorrectly allow a packet through just because an ACK bit is set on the assumption that it is a response packet. I believe this was a problem with the "established" keyword in Cisco ACLs. I could be wrong. I'm CERTAIN someone will correct me.

Good luck.
Steve
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6850436
You are wrong wrong wrong wrong!!! :)

Actually, I do think Cisco had some problems with that.  They did create a new way to create this scenario that was supposed to be better, but I forget what its called (dynamic ACL?) or how to do it.  It was much messier and had a lot more config lines is all I can remember.  In my opinion if you are pretending that a router ACL is good enough for security, you're asking for a world of hurt anyway, so why care?
0
 

Author Comment

by:dbrannigan
ID: 6850479
excellent as always scraig84! Cheers
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This program is used to assist in finding and resolving common problems with wireless connections.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses
Course of the Month14 days, 16 hours left to enroll

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question