当前位置:网站首页>Hcie security Day12: supplement the concept of packet filtering and security policy
Hcie security Day12: supplement the concept of packet filtering and security policy
2022-07-03 20:44:00 【Xiao Liang L】
Packet filtering technology
For packets that need to be forwarded , Get the header information first , Then compare it with the set rules , According to the results of the comparison, the packets are forwarded or discarded . The main technology used is ACL.
State detection mechanism
For only one connection ( A stream ) The first packet of is checked for packet filtering , If the first package passes the inspection , The session table will be established , Subsequent messages are quickly forwarded according to the session table , No longer detected by packet filtering .
Security policy of firewall
According to certain rules ( Packet filtering ) The control device forwards the traffic and integrates the content security of the traffic ( Not only is 5 Tuples detect the legitimacy of messages and analyze the content characteristics of messages to determine whether they are malicious messages such as diseases * Poison, etc ) Detection strategy . It is mainly used to control network mutual access across firewalls or access to the firewall itself .
Firewall security policy principle
[USG6000V1]security-policy [USG6000V1-policy-security]rule name p1 [USG6000V1-policy-security-rule-p1]rule name p2 [USG6000V1-policy-security-rule-p2]rule name p3 [USG6000V1-policy-security]dis this 2022-01-28 15:08:50.000 # security-policy rule name p1 (not configure the action) rule name p2 (not configure the action) rule name p3 (not configure the action) # return

Filter the traffic passing through the firewall according to the defined rules , And determine how to proceed with the next operation of the filtered traffic according to the keywords .
Firewall inter domain forwarding

Query and create session

The position of the session in the forwarding process

1、 Match the firewall session table according to the five tuples of the message , If the match is successful, carry out state detection , And security checks ( If done IPS Configuration ), And refresh the session table , Forward the message .
2、 If no match succeeds , Then conduct status detection to determine whether it is the first package , Check whether there is a route with destination address in the routing table , Some words , According to the message Access interface And the message determined in the routing table Exit interface Determine inter domain traffic Direction , Check the corresponding security policy according to the direction of inter domain traffic , If the match , Create a session , Forward , If it doesn't match , Direct discarding .
View session table information
[USG6000V1]dis firewall session table 2022-01-28 15:48:03.600 Current Total Sessions : 1 bootps VPN: default --> default 192.168.191.1:68 --> 192.168.191.254:67 [USG6000V1]dis firewall session table verbose 2022-01-28 15:48:12.850 Current Total Sessions : 1 bootps VPN: default --> default ID: c487f66beef5cf8231561f40fd8 Zone: trust --> trust TTL: 00:02:00 Left: 00:00:21 Recv Interface: GigabitEthernet0/0/0 Interface: GigabitEthernet0/0/0 NextHop: 192.168.191.254 MAC: 0050-56f6-a752 <--packets: 2 bytes: 656 --> packets: 1 bytes: 344 192.168.191.1:68 --> 192.168.191.254:67 PolicyName: ---
current total sessions: Statistics of current session tables
bootp: Name of agreement
VPN:default-->default:VPN Instance name , The expression is : Source direction --> Goal direction
192.168.191.1:68-->192.168.191.254:67: Session table information
ID: Current session id
zone:trust-->trust: The security zone of the session , The expression is : Source security area --> Objective safe area
TTL: The total lifetime of the session entry
Left: The remaining lifetime of the session table entry
Output-interface: Exit interface
NextHop: Next jump ip Address
MAC: Next jump MAC Address
边栏推荐
- Gee calculated area
- Ruby replaces gem Alibaba image
- jvm jni 及 pvm pybind11 大批量数据传输及优化
- Global and Chinese market of electrolyte analyzers 2022-2028: Research Report on technology, participants, trends, market size and share
- In 2021, the global general crop protection revenue was about $52750 million, and it is expected to reach $64730 million in 2028
- 你真的知道自己多大了吗?
- Viewing Chinese science and technology from the Winter Olympics (II): when snowmaking breakthrough is in progress
- The 29th day of force deduction (DP topic)
- Commands related to files and directories
- 上周内容回顾
猜你喜欢

Research Report on the overall scale, major manufacturers, major regions, products and application segmentation of rotary tablet presses in the global market in 2022

AcWing 1460. Where am i?

Line segment tree blue book explanation + classic example acwing 1275 Maximum number

强基计划 数学相关书籍 推荐

Qt6 QML Book/Qt Quick 3D/基础知识

Reinforcement learning - learning notes 1 | basic concepts

Sightseeing - statistics of the number of shortest paths + state transfer + secondary small paths

TLS environment construction and plaintext analysis

Apprentissage intensif - notes d'apprentissage 1 | concepts de base

强化學習-學習筆記1 | 基礎概念
随机推荐
JS three families
First knowledge of database
MySQL dump - exclude some table data - MySQL dump - exclude some table data
The global industrial design revenue in 2021 was about $44360 million, and it is expected to reach $62720 million in 2028. From 2022 to 2028, the CAGR was 5.5%
"Designer universe" APEC safety and health +: environmental protection Panda "xiaobaobao" Happy Valentine's Day 2022 | ChinaBrand | Asia Pacific Economic media
Global and Chinese markets of lithium chloride 2022-2028: Research Report on technology, participants, trends, market size and share
11-grom-v2-04-advanced query
Global and Chinese market of two in one notebook computers 2022-2028: Research Report on technology, participants, trends, market size and share
Derivation of decision tree theory
Global and Chinese markets for medical temperature sensors 2022-2028: Research Report on technology, participants, trends, market size and share
Global and Chinese market of high purity copper foil 2022-2028: Research Report on technology, participants, trends, market size and share
强基计划 数学相关书籍 推荐
@Transactional注解失效的场景
设计电商秒杀系统
Q&A:Transformer, Bert, ELMO, GPT, VIT
Global and Chinese market of speed limiter 2022-2028: Research Report on technology, participants, trends, market size and share
String and+
jvm jni 及 pvm pybind11 大批量数据传输及优化
11-grom-v2-05-initialization
How to modify the network IP addresses of mobile phones and computers?
