当前位置:网站首页>Hcie security Day12: supplement the concept of packet filtering and security policy
Hcie security Day12: supplement the concept of packet filtering and security policy
2022-07-03 20:44:00 【Xiao Liang L】
Packet filtering technology
For packets that need to be forwarded , Get the header information first , Then compare it with the set rules , According to the results of the comparison, the packets are forwarded or discarded . The main technology used is ACL.
State detection mechanism
For only one connection ( A stream ) The first packet of is checked for packet filtering , If the first package passes the inspection , The session table will be established , Subsequent messages are quickly forwarded according to the session table , No longer detected by packet filtering .
Security policy of firewall
According to certain rules ( Packet filtering ) The control device forwards the traffic and integrates the content security of the traffic ( Not only is 5 Tuples detect the legitimacy of messages and analyze the content characteristics of messages to determine whether they are malicious messages such as diseases * Poison, etc ) Detection strategy . It is mainly used to control network mutual access across firewalls or access to the firewall itself .
Firewall security policy principle
[USG6000V1]security-policy [USG6000V1-policy-security]rule name p1 [USG6000V1-policy-security-rule-p1]rule name p2 [USG6000V1-policy-security-rule-p2]rule name p3 [USG6000V1-policy-security]dis this 2022-01-28 15:08:50.000 # security-policy rule name p1 (not configure the action) rule name p2 (not configure the action) rule name p3 (not configure the action) # return

Filter the traffic passing through the firewall according to the defined rules , And determine how to proceed with the next operation of the filtered traffic according to the keywords .
Firewall inter domain forwarding

Query and create session

The position of the session in the forwarding process

1、 Match the firewall session table according to the five tuples of the message , If the match is successful, carry out state detection , And security checks ( If done IPS Configuration ), And refresh the session table , Forward the message .
2、 If no match succeeds , Then conduct status detection to determine whether it is the first package , Check whether there is a route with destination address in the routing table , Some words , According to the message Access interface And the message determined in the routing table Exit interface Determine inter domain traffic Direction , Check the corresponding security policy according to the direction of inter domain traffic , If the match , Create a session , Forward , If it doesn't match , Direct discarding .
View session table information
[USG6000V1]dis firewall session table 2022-01-28 15:48:03.600 Current Total Sessions : 1 bootps VPN: default --> default 192.168.191.1:68 --> 192.168.191.254:67 [USG6000V1]dis firewall session table verbose 2022-01-28 15:48:12.850 Current Total Sessions : 1 bootps VPN: default --> default ID: c487f66beef5cf8231561f40fd8 Zone: trust --> trust TTL: 00:02:00 Left: 00:00:21 Recv Interface: GigabitEthernet0/0/0 Interface: GigabitEthernet0/0/0 NextHop: 192.168.191.254 MAC: 0050-56f6-a752 <--packets: 2 bytes: 656 --> packets: 1 bytes: 344 192.168.191.1:68 --> 192.168.191.254:67 PolicyName: ---
current total sessions: Statistics of current session tables
bootp: Name of agreement
VPN:default-->default:VPN Instance name , The expression is : Source direction --> Goal direction
192.168.191.1:68-->192.168.191.254:67: Session table information
ID: Current session id
zone:trust-->trust: The security zone of the session , The expression is : Source security area --> Objective safe area
TTL: The total lifetime of the session entry
Left: The remaining lifetime of the session table entry
Output-interface: Exit interface
NextHop: Next jump ip Address
MAC: Next jump MAC Address
边栏推荐
- "Actbert" Baidu & Sydney University of technology proposed actbert to learn the global and local video text representation, which is effective in five video text tasks
- An old programmer gave it to college students
- QT6 QML book/qt quick 3d/ Basics
- 1.4 learn more about functions
- 4. Data splitting of Flink real-time project
- Pytorch sets the weight and bias of the model to zero
- Golang type assertion and conversion (and strconv package)
- 9 pyqt5 qscrollarea scroll area and qscrollbar scroll bar
- 《ActBERT》百度&悉尼科技大学提出ActBERT,学习全局局部视频文本表示,在五个视频-文本任务中有效!...
- Thread, thread stack, method stack, the difference of creating thread
猜你喜欢

Operate BOM objects (key)

Qt6 QML Book/Qt Quick 3D/基础知识

Gee calculated area

如临现场的视觉感染力,NBA决赛直播还能这样看?

It is discussed that the success of Vit lies not in attention. Shiftvit uses the precision of swing transformer to outperform the speed of RESNET

44. Concurrent programming theory

From the behind the scenes arena of the ice and snow event, see how digital builders can ensure large-scale events

Shortest path problem of graph theory (acwing template)

Haven't expressed the artifact yet? Valentine's Day is coming. Please send her a special gift~

Virtual machine installation deepin system
随机推荐
Pytorch sets the weight and bias of the model to zero
Global and Chinese market of full authority digital engine control (FADEC) 2022-2028: Research Report on technology, participants, trends, market size and share
How can the outside world get values when using nodejs to link MySQL
Gauss elimination solves linear equations (floating-point Gauss elimination template)
@Transactional注解失效的场景
In 2021, the global revenue of syphilis rapid detection kits was about US $608.1 million, and it is expected to reach US $712.9 million in 2028
[Yugong series] go teaching course 002 go language environment installation in July 2022
《ActBERT》百度&悉尼科技大学提出ActBERT,学习全局局部视频文本表示,在五个视频-文本任务中有效!...
一台服务器最大并发 tcp 连接数多少?65535?
MySQL dump - exclude some table data - MySQL dump - exclude some table data
Rhcsa third day operation
How to handle wechat circle of friends marketing activities and share production and release skills
2.6 formula calculation
Operate BOM objects (key)
[postgresql]postgresql custom function returns an instance of table type
不同业务场景该如何选择缓存的读写策略?
2.3 other data types
设计电商秒杀系统
Virtual machine installation deepin system
Set, weakset, map, weakmap in ES6
