User's Manual

Table Of Contents
Chapter 14 Firewall 166
1 D
oes this rule stop LAN users from accessing critical resources on the Internet? For example, if IRC is
blocked, are there users that require this service?
2 Is
it possible to modify the rule to be more specific? For example, if IRC is blocked for all users, will a
rule that blocks just certain users be more effective?
3 D
oes a rule that allows Internet users access to resources on the LAN create a security vulnerability?
For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may
be able to connect to computers with running FTP servers.
4 D
oes this rule conflict with any existing rules?
Once these questions have been answered, adding rules is simply a matter of entering the
information into the corr
ect fields in the web configurator screens.
14.6.4 Triangle Route
When the firewall is on, your Device acts as a secure gateway between your LAN and the Internet. In
an ideal network topology, all incoming and outgoing network traffic passes through the Device to
protect your LAN against attacks.
Figure 108 Ide
al Firewall Setup
1
2
WAN
LAN
14.6.4.1 The “Triangle Route” Problem
A traffic route is a path for sending or receiving data packets between two Ethernet devices. You
may have more than one connection to the Internet (through one or more ISPs). If an alternate
gateway is on the LAN (and its IP address is in the same subnet as the Device’s LAN IP address), the
“triangle route” (also called asymmetrical route) problem may occur. The steps below describe the
“triangle route” problem.
1 A
computer on the LAN initiates a connection by sending out a SYN packet to a receiving server on
the WAN.
2 T
he Device reroutes the SYN packet through Gateway A on the LAN to the WAN.
3 The
reply from the WAN goes directly to the computer on the LAN without going through the
Device.