ADTRAN 5000 Series User Manual

Page 366

Advertising
background image

Command Reference Guide

Global Configuration Mode Command Set

61200990L1-35E

Copyright © 2005 ADTRAN

366

Functional Notes

This command enables firewall processing for all interfaces with a configured policy class. Firewall
processing consists of the following functions:

Attack Protection: Detects and discards traffic that matches profiles of known networking exploits or
attacks.

Session Initiation Control: Allows only sessions that match traffic patterns permitted by access-control
policies to be initiated through the router.

Ongoing Session Monitoring and Processing: Each session that has been allowed through the router is
monitored for any irregularities that match patterns of known attacks or exploits. This traffic will be
dropped. Also, if NAT is configured, the firewall modifies all traffic associated with the session according to
the translation rules defined in NAT access policies. Finally, if sessions are inactive for a user-specified
amount of time, the session will be closed by the firewall.

Application Specific Processing: Certain applications need special handling to work correctly in the
presence of a firewall. AOS uses application-level gateways (ALGs) for these applications.

The AOS includes several security features to provide controlled access to your network. The following
features are available when security is enabled (using the ip firewall command):

1. Stateful Inspection Firewall

The AOS (and your unit) act as an ALG and employ a stateful inspection firewall that protects an
organization's network from common cyber attacks including TCP syn-flooding, IP spoofing, ICMP redirect,
land attacks, ping-of-death, and IP reassembly problems. In addition, further security is added with use of
Network Address Translation (NAT) and Port Address Translation (PAT) capability.

2. Access Policies

AOS access control policies (ACPs) are used to allow, discard, or manipulate (using NAT) data for each
physical interface. Each ACP consists of a selector (access list) and an action (allow, discard, NAT).
When packets are received on an interface, the configured ACPs are applied to determine whether the
data will be processed or discarded.

3. Access Lists

Access control lists (ACLs) are used as packet selectors by ACPs; by themselves they do nothing. ACLs
are composed of an ordered list of entries. Each entry contains two parts: an action (permit or deny) and
a packet pattern. A permit ACL is used to permit packets (meeting the specified pattern) to enter the router
system. A deny ACL advances the AOS to the next access policy entry. The AOS provides two types of
ACLs: standard and extended. Standard ACLs allow source IP address packet patterns only. Extended
ACLs may specify patterns using most fields in the IP header and the TCP or UDP header.

Usage Examples

The following example enables the AOS security features:

(config)#ip firewall

Advertising