Firewall Guide
Introduction
When connecting a network to the Internet or any non-trusted network a router with Firewall functionality can be used to protect against undesired access to your local network and devices. This is done by applying rules to different parts/hooks of the path which the packets flow. These hooks are pre routing, input, forward, and post routing and can be seen in Figure 2. Figure 1 shows an example of a basic network using a Firewall to protect its local devices.
.--.-.
( ( )__
(_, \ ) ,_) Internet/Intranet
'-'--`--'
| WAN (vlan4) ^
.---+----. |
| | Public
+-----+ GW/FW +-----+ ------
| .99| |.99 | Private
LAN (vlan1) | '----+---' | LAN (vlan2) |
192.168.1.0/24 | |.99 | 192.168.2.0/24 V
----+----+ | +----+----
|.1 | |.1
.-+--. | .-+--.
| H2 | | | H3 |
'----' | '----'
|
----+---- WEB (vlan3)
|.1 192.168.3.0/24
.-+--.
| H1 |
'----'
Tip
A real configuration of the example in Figure 1 can be seen on the Firewall HowTo page.
Overview
The WeOS Firewall includes support for five related types of functionality. Note that for products of software level Extended, all of these are available. For products of software level Standard, input filtering is available.
-
Input Filtering: The input filtering support is primarily used to control accessibility to services on the device itself. Input rules are checked after the routing decision (see Figure 2) and applies to packets that are directed to the local device and processes running on the device itself. An input filtering rule is configured to either drop or accept a packet.
-
Forward Filtering: The forward filtering support is primarily used to control what traffic is allowed to be routed to connected devices. Forwarding rules are checked after the routing decision (see Figure 2) and applies to packets that are not directed to the local device. A forward filtering rule is configured to either drop or accept a packet.
-
NAT (Network Address Translation): NAPT (Network address Port Translation) is the most common NAT form. It allows a common (public) IP address to be shared by a set of hosts on a private network. NAT rules are checked during the postrouting as seen in Figure 2. This form of NAT is sometimes referred to as IP Masquerading or PAT (port address translation).
-
Port Forwarding: Port forwarding allows a service (such as a Web server) located on a private network to be made accessible from another public network. This is done by mapping a public IP address and public port-number to a private IP address and a corresponding private port-number. Traffic designated for the public IP and the specified public port will be redirected to the private IP and its specified port. Port forwarding rules are checked during the pre routing as shown in Figure 2.
prerouting ---Port Forwarding---
|
v
.-----------------.
| Routing decision|
'---+---------+---'
| |
v v
input forward
| |
<--' |
local device |
---. |
| |
v |
.----------------. |
|Routing decision| |
'----------------' |
| |
'---. .---'
|
v
postrouting ---NAT---
- ALG Helpers: The WeOS firewall utilises connection tracking; a filter rule allowing traffic to pass through the firewall in one direction, will implicitly allow traffic of established connections (and traffic of related connections) to also pass in the reverse direction. Connection tracking can be configured to handle more complex protocols by enabling ALG helpers a.k.a. Application Level Gateway helpers. Some network protocols are more complex and therefore more difficult than others to be handle by the connection tracking function in a firewall or NAT device. An example is FTP, which utilises a control connection to exchange information on TCP port numbers for data connections for the actual file transfers – to enable a PC to download files through a firewall from an FTP server on the Internet, the firewall must inspect the FTP control connection to learn which connections to let through. To make the firewall handle such protocols correctly, protocol specific ALG helpers can be enabled. ALG helpers have some impact on the unit’s routing performance, thus are by default disabled.
Order of Firewall Rules
Configured Firewall rules have an order. Packets are evaluated against the filter rules and the first matching rule in the order will decide how to treat the packet (accept or drop).
Configuration
The Firewall configuration is a sub-context to the IP configuration context in the CLI:
example:/#> configure example:/config/#> ip example:/config/ip/#> firewall example:/config/ip/firewall#>
By default the firewall is disabled. The command enable can be used to enable the firewall.
NOTE: It’s vitally important to configure the firewall correctly before enabling it. Failing to do so can get you permanently locked out. For example, if you are managing the firewall through ssh, http or https, you will not be able to reach the device if you enable the firewall without first explicitly allowing the management traffic in question.
To prevent lockout you have to specify an input rule for your management interface. The following example enables http on vlan1:
example:/config/ip/firewall#> input accept in vlan1 dport http proto tcp
In Figure 1, this rule would enable devices on the LAN to access the web of the Gateway on http. More examples can be seen in the Firewall HowTo page.
NOTE: Offloaded traffic is not subject to firewall processing.
Syntax
[no] input accept|drop [pos POSITION] [in IFACE] [saddr ADDR[/LEN]] [sport PORT|RANGE] [daddr ADDR[/LEN]] [dport PORT|RANGE] [proto PROTO] [bind-counter COUNTER] [counter] [comment COMMENT] [log]
-
Manage input rules.
Create or delete an input rule. Input rules are checked after the routing decision and applies to packets that are directed to the local device and processes running on the device itself.
no
- Delete specified rule.
accept|drop
- Accept or drop traffic matching the specified rule.
pos POSITION
- The position in the list of rules you want to apply your command to.
in IFACE
- Inbound Interface: The interface where the packet comes in.
saddr
- Source IP Address/Subnet: The source IP address of the packet.
sport
- Source Port: The source port of the packet.
daddr
- Destination IP Address/Subnet: The destination address of the packet.
dport
- Destination Port: The destination port of the packet.
ADDR[/LEN]
- IP address specified as either a single IP address, or a whole IP subnet.
PORT|RANGE
- Port specified as either a single port, or a range of ports.
proto PROTO
- Protocol: The protocol type of the IP payload. Typically TCP or UDP, but the filtering can also be made to match other protocols such as ICMP and ESP.
bind-counter COUNTER
- Assigns the rule to COUNTER.
counter
- Add a counter that only shows in the raw output. This counter is reset any time the firewall configuration is changed.
comment COMMENT
- Add a comment to the rule.
log
- Log traffic matching this rule.
[no] forward accept|drop [pos POSITION] [in IFACE] [out IFACE] [saddr ADDR[/LEN]] [sport PORT|RANGE] [daddr ADDR[/LEN]] [dport PORT|RANGE] [proto PROTO] [bind-counter COUNTER] [counter] [comment COMMENT] [log]
-
Manage forward rules.
Create or delete an forwarding rule. Forward rules are checked after the routing decision and applies to packets that are not directed to the local device.
no
- Delete specified rule.
accept|drop
- Accept or drop traffic matching the specified rule.
pos POSITION
- The position in the list of rules you want to apply your command to.
in IFACE
- Inbound Interface: The interface where the packet comes in.
out IFACE
- Outbound Interface: The interface where the packet is sent out.
saddr
- Source IP Address/Subnet: The source IP address of the packet.
sport
- Source Port: The source port of the packet.
daddr
- Destination IP Address/Subnet: The destination address of the packet.
dport
- Destination Port: The destination port of the packet.
ADDR[/LEN]
- IP address specified as either a single IP address, or a whole IP subnet.
PORT|RANGE
- Port specified as either a single port, or a range of ports.
proto PROTO
- Protocol: The protocol type of the IP payload. Typically TCP pr UDP, but the filtering can also be made to match other protocols soch as ICMP and ESP.
bind-counter COUNTER
- Assigns the rule to COUNTER.
counter
- Add a counter that only shows in the raw output. This counter is reset any time the firewall configuration is changed.
comment COMMENT
- Add a comment to the rule.
log
- Log traffic matching this rule.
[no] nat [pos POSITION] out IFACE [saddr ADDR[/LEN]] [comment COMMENT] [log]
-
Manage Network Address Translation rules.
Create or delete a NAT rule of NAPT type. NAPT is also known as IP masquerading, NAT overload and many-to-one NAT.
NAT can be used to hide private subnets behind a single public IP.
no
- Delete specified rule.
pos POSITION
- The position in the list of rules you want to apply your command to.
IFACE
- The outbound interface used for NAPT. Outgoing packets handled by this rule will appear to originate from the IP number configured (the primary address) or acquired (DHCP) for this interface.
ADDR[/LEN]
- Specify that packets must originate from a specific subnet for this rule to apply.
comment COMMENT
- Add a comment to the rule.
log
- Log traffic matching this rule.
[no] port-forward [pos POSITION] [in IFACE] [daddr ADDR[/LEN]] dport PORT|RANGE [to-dport PORT] to-daddr ADDR proto PROTO [comment COMMENT] [log]
-
Manage port forwarding rules.
Create or delete a Port Forwardng rule. Port Forwarding can be used to expose an internal device to the internet.
no
- Delete specified rule.
pos POSITION
- The position in the list of rules you want to apply your command to.
in IFACE
- Inbound Interface: The interface where the packet comes in.
daddr
- Destination IP Address/Subnet: The destination IP address of the packet.
dport
- Destination Port: The destination port of the packet.
to-daddr
- Forward Destination IP Address/Subnet: The destination address where the packets are to be forwarded.
to-dport
- Forward Destination Port: The destination port where the packets are to be forwarded.
ADDR[/LEN]
- IP address specified as either a single IP address, or a whole IP subnet.
PORT|RANGE
- Port specified as either a single port, or a range of ports.
proto PROTO
- Protocol: The protocol type of the IP payload.
comment COMMENT
- Add a comment to the rule.
log
- Log traffic matching this rule.
policy forward|input drop|accept
-
Set default filter policy.
forward|input
- Specify which hook to apply the policy to.
drop|accept
- Specify which policy to apply.
move input|forward|nat|port-forward id ID pos NEW-ID
-
Reorder rules.
Change the order of existing rules.
input|forward|nat|port-forward
- Specify from which rule set to move.
ID
- ID of the rule to move.
NEW-ID
- New ID of the rule to move.
counter NAME [reset]
-
Show or modify counters.
NAME
- Create a new named counter called NAME.
reset
- Reset the counter NAME.
[no] log [limit none | ENTRIES/second|minute|hour|day ]
-
Handle logging for the firewall.
This command is used to globally enable or disable firewall logging and set limitation on the maximum rate of entries that will be stored. Note that you need to add the “log” flag on individual rules as well.
no
- Globally disable logging.
none
- No rate limitation for logging. Be warned that no limit may open up for denial-of-service attacks!
ENTRIES
- Number of entries to be logged in the specified time unit. Should be in the range 1-10000.
second|minute|hour|day
- Time unit for the rate limit. The lowest possible rate is 2/day.
[no] log input|forward|nat|port-forward NUM
-
Toggle logging flag on an existing firewall rule.
no
- Disable logging for the specified rule.
input|forward|nat|port-forward
- The type of the specified rule.
NUM
- The specified rule number.
[no] alg ftp|tftp
-
Application Level Gateway (NAT) helpers.
ftp|tftp
- Specify what helper should be enabled.
show
- Show all rules.
Status overview
In order to see the current rules for the Firewall the following command can be used:
example:/config/ip/firewall/#> show Firewall is enabled. Logging is Enabled, limited to 99 entries/hour ____________________________________________________________________ Input Rules ID Rule 001 input accept in vlan1 saddr 192.168.1.1/32 daddr 192.168.1.99/32 N/A drop ____________________________________________________________________ Forward Rules ID Rule 001 forward accept in vlan1 out vlan2 daddr 10.0.0.1/32 N/A drop ____________________________________________________________________ NAT Rules (NAPT/masquerading) ID Rule 001 nat out vlan1 saddr 192.168.1.1/32 ____________________________________________________________________ Port-Forward Rules ID Rule 001 port-forward dport 80-90 to-daddr 192.168.1.1 proto udp ____________________________________________________________________ Application Level Gateway Alg Helper FTP ENABLED TFTP ENABLED
Advanced: The command “show ip firewall raw” can be used in admin-exec mode to show the complete Linux nftables (nft) ruleset, which contains the rules added in the WeOS firewall.
Counters
There are two types of counters available. Temporary inline counters and named counters.
Temporary inline counters
Temporary inline couters are mainly intended for temporary debug, see section on named counters for more info about runtime persistent counters. The inline counters are only visible in the raw firewall output and are reset every time the firewall configuration changes.
example:/config/ip/firewall/#> input accept dport 22 proto tcp counter example:/#> show ip firewall raw ... tcp dport ssh counter packets 10 bytes 443 accept comment "cli-input-009" ...
Named counters
A named counter can be created and bound to one or more firewall rules. A named counter can be bound to input or forward rules. A named counter is persistent during runtime.
Example of a counter that counts all inbound web interface traffic:
example:/config/ip/firewall/#> counter web example:/config/ip/firewall/#> input accept dport 80 proto tcp bind-counter web example:/config/ip/firewall/#> input accept dport 443 proto tcp bind-counter web example:/#> show ip firewall counter web Users 001 input accept dport 80 proto tcp bind-counter web 002 input accept dport 443 proto tcp bind-counter web Value packets 26 bytes 1560