beautypg.com

The importance of sat rule ordering – Amer Networks E5Web GUI User Manual

Page 507

background image

interface of the SAT rule must be set to any. The correct second rule for the external or internal
traffic is then selected based on the source interface. In this example, the internal clients are
allowed any type of access to the DMZ, not just HTTP access.

# Action

Src Iface

Src Net

Dest Iface Dest Net

Service

SAT Action

1 SAT

any

all-nets

core

wan_ip

all_services Destination IP: 10.10.10.5

2 Allow

wan

all-nets

core

wan_ip

http

3 NAT

lan

lan_net

any

all-nets

all_services

Here, only one SAT rule is needed and once it triggers it will be used with whichever rule is
triggered next. The ordering of the Allow and NAT rules don't matter but they must be found
after the SAT rule.

The Importance of SAT Rule Ordering

To demonstrate how IP rules are processed for SAT, consider another simple case of a web server
with a private IPv4 address located on an internal network that will be accessed by both external
and internal users.

Assume the following IPv4 addresses:

wan_ip (195.55.66.77): the security gateway's public IPv4 address

lan_ip (10.0.0.1): the local network's private IPv4 address

wwwsrv_ip (10.0.0.2): the web server's private IPv4 address

client_ip (10.0.0.3): the local client's private IPv4 address

The IP rules that are needed for external and internal access to the web server could be specified
as follows:

# Action

Src Iface

Src Net

Dest Iface Dest Net

Service

SAT Action

1 SAT

any

all-nets

core

wan_ip

all_services Destination IP: wwwsrv_ip Port: 80

2 Allow

any

all-nets

core

wan_ip

http

3 NAT

lan

lan_net

core

wan_ip

all_services

With the above rules, the following will happen to traffic:

The local client sends a packet to wan_ip to reach the web server.

10.0.0.3:1038 => 195.55.66.77:80

cOS Core translates the address in accordance with SAT rule 1 and forwards the packet in
accordance with Allow rule 2:

10.0.0.3:1038 => 10.0.0.2:80

The server at wwwsrv_ip processes the packet and replies:

10.0.0.2:80 => 10.0.0.3:1038

This reply arrives directly to the local client without passing through the Clavister Security
Gateway and this causes problems because the client expects a reply from 195.55.66.77:80 and
not 10.0.0.2:80. The unexpected reply is therefore discarded and the client continues to wait for a
response from 195.55.66.77:80 which will never arrive.

Chapter 7: Address Translation

507

This manual is related to the following products: