Intel 9535, 9525, 9515 User Manual

DMZ Firewall Solution
Intel Express Routers 9515, 9525 an d 9535
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTELS TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. INTEL PRODUCTS ARE NOT INTENDED FOR USE IN MEDICAL, LIFE SAVING, OR LIFE SUSTAINING APPLICATIONS. INTEL MAY MAKE CHANGES TO SPECIFICATIONS AND PRODUCT DESCRIPTIONS AT ANY TIME, WITHOUT NOTICE.
INTEL CORPORATION ASSUMES NO RESPONSIBILITY FOR ERRORS OR OMISSIONS IN THIS DOCUMENT. NOR DOES INTEL MAKE ANY COMMITMENT TO UPDATE THE INFORMATION CONTAINED HEREIN.
Year 2000 capable
An Intel product, when used in accordance with associated documentation, is “Year 2000 Capable” when, upon installation, it accurately stores, displays, processes, provides, and/or receives data from, into, and between 1999 and 2000, and the twentieth and twenty-first centuries, including leap year calculations, provided that all other technology used in combination with said product properly exchanges date data with it. Intel makes no representation about individual components within the product should they be used independently from the product as a whole.
Copyright * Other product and corporate names may be trademarks of other companies and are used only
 1999, Intel Corporation. All rights reserved.
for explanation and to owners' benefit, without intent to infringe.
DMZ Firewall Solution for the Express Router
Table of Contents
1 Introduction............................................................................................................................3
1.1 About This Document..........................................................................................................3
1.2 References............................................................................................................................3
1.3 What is a DMZ.....................................................................................................................3
1.4 IP Filters in the Express Router............................................................................................4
2 General Setup and Considerations.......................................................................................4
2.1 IP Address Selection............................................................................................................4
2.2 Routing Setup.......................................................................................................................5
2.3 DNS Setup............................................................................................................................5
2.4 E-mail (SMTP) Setup...........................................................................................................5
2.5 FTP Setup.............................................................................................................................5
2.6 HTTP Setup..........................................................................................................................5
2.7 News (NNTP) Setup ............................................................................................................5
2.8 Management Access Setup...................................................................................................5
3 DMZ Single IP Address Solution..........................................................................................6
3.1 Static Routing Setup.............................................................................................................6
3.2 Network Address Translation (NAT) Setup.........................................................................6
3.3 IP Filters Setup.....................................................................................................................7
3.3.1 LAN1 Filters ................................................................................................................7
3.3.1.1 Receive (Rx) Filters on LAN1.............................................................................7
3.3.1.2 Transmit (Tx) Filters on LAN1............................................................................8
3.3.2 LAN2 Filters ..............................................................................................................10
3.3.2.1 Receive (Rx) Filters on LAN2...........................................................................10
3.3.2.2 Transmit (Tx) filters on LAN2...........................................................................12
3.3.3 Internet Connection Filters.........................................................................................13
3.3.3.1 Receive (Rx) Filters on the connection to the Internet.......................................13
3.3.3.2 Transmit (Tx) Filters on the Connection to the Internet.....................................16
4 DMZ Multiple IP Address Solution....................................................................................17
4.1 IP Address Assignment......................................................................................................17
4.2 Static Routing Setup...........................................................................................................17
4.3 Network Address Translation (NAT).................................................................................18
4.4 IP Filters Setup...................................................................................................................18
4.4.1 LAN1 Filters ..............................................................................................................18
4.4.1.1 Receive (Rx) Filters on LAN1...........................................................................18
4.4.1.2 Transmit (Tx) Filters on LAN1..........................................................................19
4.4.2 LAN2 Filters ..............................................................................................................21
4.4.2.1 Receive (Rx) Filters on LAN2...........................................................................21
4.4.2.2 Transmit (Tx) filters on LAN2...........................................................................24
4.4.3 Internet Connection Filters.........................................................................................24
4.4.3.1 Receive (Rx) Filters on the Connection to the Internet......................................24
4.4.3.2 Transmit (Tx) Filters on the Connection to the Internet.....................................27
07-12-99 Version 1.0 2
DMZ Firewall Solution for the Express Router
1 Introduction
1.1 About This Document
This document explains how to configure a secure Internet solution using the second LAN interface of the Intel
two example solutions, a Single IP Address Solution and Multiple IP Address. It assumed that you have a solid understanding of networking concepts and experience in using
the Express Router.
1.2 References
[1] Intel Express Router User Guide
The user guide for your router explains in detail the basic configuration procedures used in the set up of the DMZ.
[2] Brent Chapman, Elizabeth D. Zwicky, “ Building Internet Firewalls”, 1995 O’Reilly &
Associates. ISBN: 1-56592-124-0
Express router as a DMZ. The DMZ setup is explained through the use of
1.3 What is a DMZ
For an Intel Express Router having two LAN ports, you can setup a DMZ (DeMilitarized Zone) to increase security on your private network. A DMZ is a network off one of the LAN ports that acts as a kind of buffer between the external (public Internet) network and your secure network on the other LAN interface. The DMZ gives access to services required from both the external network and the secure network. The services are typically HTTP/FTP (Web) servers for public access, an HTTP/FTP proxy server, an SMTP server and a News (proxy) server. Mail servers and News servers for internal use are placed on the secure network. Through the use of IP filters, you prohibit access from the Internet to your secure network while still providing access to services on the DMZ.
192.168.151.0
Demilitarized Zone
Http/FTP
(Web) server
Internet users are allowed
to access your Web
and FTP servers
Http/FTP
10/100
proxy
server
LAN2 port
News proxy server
SMTP server
192.168.152.0 Main LAN
File server
Mail server
10/100
PC
PC
Internet
Intel Express
LAN1 port
router
IP filters on the router
block unwanted traffic
destined to the main LAN
07-12-99 Version 1.0 3
DMZ Firewall Solution for the Express Router
The purpose of this setup is to prohibit any direct data transmission between the Internet and the secure network. All data must go through proxy servers on the DMZ.
We recommend that you set up the DMZ on the LAN2 (10 Mbps) port and your secure network on the LAN1 (100/10 Mbps) port.
This document provides two DMZ solutions when connecting to the Internet, one using a single external IP address and the other using a number of IP addresses (at least four IP addresses are needed, including network identification and broadcast address).
Note: Solutions using dynamic address assignment by the ISP are not supported.
1.4 IP Filters in the Express Router
IP filters in the Express Router are defined on a link basis. Separate filters are configured for received data (data packets from a link to the router) and transmitted data (data packets from the router to a link). Use the diagram below to help determine the direction of data with respect to the router and the types of filter required (Rx or Tx).
LAN2
Internet
Rx
Tx
Rx
Tx - transmitted data Rx - received data
Intel Express
Router
Tx
Tx
Rx
LAN1
2 General Setup and Considerations
2.1 IP Address Selection
The IP addresses on the secure network and the DMZ network can be any valid IP addresses, but we recommend that you use designated private IP addresses or registered IP addresses. Private IP addresses are those addresses included under Class A network 10, Class B networks 172.16 through 172.31, and Class C networks 192.168.0 through 192.168.255. Registered public IP addresses are provided by your Internet service provider (ISP). Using registered IP addresses on the DMZ network avoids conflicts with duplicate addresses on the Internet. On the secure network it is preferable to use designated private IP addresses. However, if you already have unregistered public IP addresses on your private network (for example 89.20.0.0 and 90.2.0.0), you must use Network Address Translation (NAT) to translate these addresses to private IP addresses.
For the single IP address solution, NAT is needed to map the network services from one public IP address to one or more private IP addresses on the DMZ network. This makes it possible to have several public servers on DMZ using the same public IP address.
07-12-99 Version 1.0 4
DMZ Firewall Solution for the Express Router
2.2 Routing Setup
Do not use RIP on the WAN interface or the DMZ interface. This prevents intruders from corrupting the routing table.
If there is more than one internal network, the router must not be used as primary gateway because the router configuration only allows the router to forward packets to the DMZ network .
2.3 DNS Setup
Some of the services on the DMZ network require external DNS queries. The most common mail solution is to have a domain with an "MX" record and an "A" record pointing to the SMTP server on the DMZ network. The DNS server is normally maintained and hosted by the ISP. The solutions provided in this document do not support a DNS server on the DMZ network.
For more details about DNS please refer to [2].
2.4 E -mail (SMTP) Setup
Locate an SMTP server on the DMZ network to communicate with any host on the Internet and an internal E-mail server on the secure network. Configure the SMTP server to use an MX record in order to send the mail direct to the destination SMTP server.
2.5 FTP Setup
An HTTP/FTP proxy server on the DMZ network must use passive FTP for connections to the Internet. Otherwise the filters will block the FTP data channel running on port 20. Because the HTTP/FTP is an application proxy, support for DNS is required to resolve fully qualified domain names into IP addresses.
2.6 HTTP Setup
An HTTP/FTP proxy normally runs on port 80 or 8080. However, the filter settings for the following setups are based on port 80. Because the HTTP/FTP is an application proxy, support for DNS is required to resolve fully qualified domain names into IP addresses.
2.7 News (NNTP) Setup
If you are using a News (NNTP) server on your secure network, it is required that you locate a News (proxy) server on the DMZ. With this setup, the News server on the secure network communicates with the News (proxy) server on the DMZ which, in turn, communicates with an external News server on the Internet. The advantage of this setup is that all private news groups are placed on the internal server, protected from the Internet.
2.8 Management Access Setup
To ensure security, you must disable management access (SNMP, Telnet, and TFTP) on the WAN (Internet) link and the LAN2 (DMZ) link. For additional security, disable management access on the LAN1 link also. With this setup, all management tasks can only be performed from the console port.
07-12-99 Version 1.0 5
DMZ Firewall Solution for the Express Router
3 DMZ Single IP Address Solution
This solution explains how to set up a DMZ solution when the Internet service provider (ISP) has assigned a single IP address to your network.
News
(proxy)
server
10.2.0.4
LAN1 port
10.5.0.10
Secure LAN
10.5.0.0
Mail server
10.5.0.1
News server
10.5.0.2
Users
DNS
server
194.25.6.4
News
(NNTP)
server
196.24.5.8
Internet
HTTP/FTP
DMZ
10.2.0.0
(Web) server
10.2.0.1
HTTP/FTP
proxy server
10.2.0.2
Intel Express
Router
SMTP server
10.2.0.3
LAN2 port
10.2.0.10
In the example, the DMZ network connects to the LAN2 port and is on the 10.2.0.0/16 subnet. The LAN2 port has been assigned an IP address of 10.2.0.10. The secure private network connects to the LAN1 port and is on the 10.5.0.0/16 subnet. The LAN1 port has been assigned an IP address of 10.5.0.10.
Note: The services available on the DMZ can be placed on a single server. If this is done, you must configure NAT entries and filters accordingly.
3.1 Static Routing Setup
Configure static routing as follows:
Configure static routing on the Internet connection, LAN1, and LAN2. This is done in
Advanced Setup by setting the Routing Protocol parameter to None/Static.
Define a static route on the WAN interface to the Internet. Use the default static route setting
(network address of 0.0.0.0 and netmask 0.0.0.0) as shown in the example below.
3.2 Network Address Translation (NAT) Setup
The devices on the DMZ have been assigned private IP addresses. You must set up NAT to translate the private IP addresses on the DMZ to the external IP address assigned by the ISP. This will map services (i.e. port numbers) on the external IP address to servers on the DMZ.
07-12-99 Version 1.0 6
DMZ Firewall Solution for the Express Router
Note The order of the NAT entries is important.
NAT entries are defined as follows:
Entry Function Settings
1 Directs all incoming HTTP
requests to the Web server.
2 Directs all incoming FTP
requests to the Web server.
3 Directs all incoming SMTP
requests to the SMTP server
4 Directs all incoming NNTP
requests to the News server.
5 Directs all other incoming
traffic to the DMZ.
Mapping type: Static Port (Single IP) Internal address: 10.2.0.1 Internal port: 80 External IP address: <IP address from ISP> External port: 80 Mapping type: Static Port (Single IP) Internal address: 10.2.0.1 Internal port: 21 External IP address: <IP address from ISP> External port: 21 Mapping type: Static Port (Single IP) Internal address: 10.2.0.3 Internal port: 25 External address: <IP address from ISP>
External port 25 Type: Static Port (Single IP) Internal address: 10.2.0.4 Internal port: 119 External IP address: <IP address from ISP> External port: 119 Type: Network to single IP Internal address: 10.2.0.0 External IP address: <IP address from ISP>
3.3 IP Filters Setup
This section describes the required IP filters for the LAN1, LAN2 and connection to the Internet.
3.3.1 LAN1 Filters
3.3.1.1 Receive (Rx) Filters on LAN1
Configure these receive filters for the LAN1 port, shown as they appear in Advanced Setup.
07-12-99 Version 1.0 7
DMZ Firewall Solution for the Express Router
Filters are defined as follows:
Filter Function Settings
Prohibit users on the secure network
Default Action: Discard
access to the Internet
1 Allows access to the HTTP /FTP
proxy server on the DMZ.
Action: Pass Protocol: All Dest. address type: Host Dest. address: 10.2.0.2 Src. address type: All
2 Allows access to the SMTP server on
the DMZ.
Action: Pass Protocol: All Dest. address type: Host Dest. address: 10.2.0.3 Src. address type: All
3 Allows access to News (pr oxy ) server
on the DMZ.
Action: Pass Protocol: All Dest. address type: Host Dest. address: 10.2.0.4 Src. address type: All
4 Allows access to the rout er from the
private LAN.
Action: Pass Protocol: All Dest. port address: Host Dest. address: <LAN1 IP address> Scr. address type: All
3.3.1.2 Transmit (Tx) Filters on LAN1
Configure these transmit filters for the LAN1 port, shown as they appear in Advanced Setup.
Filters are defined as follows:
Filter Function Settings
Prohibit users on the secure network
Default Action: Discard
access to the Internet
1 Allows HTTP and FTP (read only using
HTTP) from secure LAN to HTTP/FTP proxy server on the DMZ.
Action: Pass Protocol: TCP TCP flags: ACK Dest. address type: All Dest. port: >1023 Src. address type: Host
07-12-99 Version 1.0 8
Loading...
+ 19 hidden pages