beautypg.com

Firewall configuration, Firewall overview, Introduction to packet-filter firewall – H3C Technologies H3C SecPath F1000-E User Manual

Page 124: Support for fragment filtering

background image

1

Firewall configuration

NOTE:

The packet filter function supports only the IPv6 packet filtering configurations at the CLI.

Firewall overview

A firewall can block unauthorized accesses from the Internet to a protected network while allowing

internal network users to access the Internet through, for example, WWW, or to send/receive E-mails. A

firewall can also be used to control access to the Internet, for example, to permit only specific hosts within

the organization to access the Internet. Many of today’s firewalls offer some other features, such as

identity authentication and security processing (encryption) of information.
Another application of firewall is to protect mainframes and important resources (such as data) on the
internal network. Any access to protected data must be first filtered by the firewall, even if such an access

is initiated by a user within the internal network.
The firewall mainly implements the firewall functions: Packet-filter firewall, which performs access control

list (ACL) based packet filtering

Introduction to packet-filter firewall

A packet-filter firewall implements IPv6 packet specific filtering. For each IPv6 packet to be forwarded,

the firewall first obtains the header information of the packet, including the number of the upper layer

protocol carried by the IP layer, the source address, destination address, source port number, and

destination port number of the packet. Then, it compares the obtained header information against the

preset ACL rules and processes the packet according to the comparison result.

Support for fragment filtering

The packet-filter firewall supports fragment inspection and filtering. It checks:

Packet type, which can be non-fragmented packet, first fragment, or non-first fragment.

Layer 3 information of the packet, for matching against basic ACL rules and advanced ACL rules
without information above Layer 3.

Upper layer Information, for matching against advanced ACL rules containing information above
Layer 3.

A session is created upon receiving the first fragment of a datagram, and is used to forward subsequent

fragments. If the first received fragment is not the first fragment, the device uses the Layer-3 information in

the fragment to match against the ACL for packet filtering. If the ACL contains information above Layer-3,
the match operation fails.