Firewall
264
8.3
 
The BAT Firewall
BAT54-Rail/F..
Release
 
7.54
 
06/08
U TCP connections
TCP connections cannot be tracked only by examination of the ports. With 
some protocols (e.g. FTP, PPTP or H.323) examinations of the utilizable data 
are necessary to open all later negotiated connections, and to accept only 
those packets belonging really to the connections. This corresponds to a sim-
plified version of IP masquerading, but without addresses or ports to be re-
mapped here. It is sufficient to pursue the negotiation to open appropriate 
ports, and link them with the main connection, so that these ports are closed 
likewise with the closing of the main connection, and traffic on the secondary 
connection keeping open also the main connection.
U ICMP connections
For ICMP two cases must be differentiated: The ICMP request/reply connec-
tions, like to be used with "ping", and the ICMP error messages, which can 
be received as an answer to any IP packet.
ICMP request/reply connections can be clearly assigned to the identifier 
used by the initiator, i.e. in the status database an entry will be provided with 
the sending of an ICMP request, which lets through only ICMP replies with 
the correct identifier. All other ICMP replies will get discarded silently.
In ICMP error messages, the IP header and the first 8 bytes of the IP packet 
(on behalf UDP or TCP headers) can be found within the ICMP packet. With 
the help of this information, the receipt of an ICMP error message triggers au-
tomatically the search for the accessory entry in the status database. The 
packet passes only if such an entry exists, otherwise it is discarded silently. 
Additionally, potentially dangerous ICMP error messages (redirect route) are 
filtered out.
U Connections of other protocols
For all other protocols no related connections can be followed up, i.e. with 
them only a connection between involved hosts can occur in the status data-
base. These can be initiated also only from one side, unless, in the port filter 
Firewall exists a dedicated entry for the "opposite direction". 
8.3.3 General settings of the Firewall
Apart from individual Firewall rules, which ensure the entries in the filter, con-
nection and block lists, some settings apply generally to the Firewall:
D Firewall/QoS enabled
D Administrator email (→ Page 265)
D Fragments (→ Page 265)