Filters

Filters control access to and through the GTA Firewall. Outbound and Remote Access Filters are created in functions under the Filters section, while IP Pass Through Filters are created in the first IP Pass Through section. Most Automatic Filter options are not directly defined by the user. However, Inbound Tunnels can be configured using an Automatic Accept All filters option, and Stealth mode can be turned on or off in Filter Preferences.

Outbound, Remote Access and IP Pass Through Filters are defined using the same screen layout and process. Use the information on filter management and fields at the beginning of this section to create Outbound, Remote Access and IP Pass Through Filters.

Outbound

Preferences

Protocols

Remote Access

Time Groups

¨ Note

Changes to filters will not be effective until the section is saved.

Managing Filters

Outbound, Remote Access and IP Pass Through Filters use the same mechanisms for filter management, so this section is the same for all three kinds of filters.

Filter Sets

A filter set is all the filters for a specific filter type. The order of the set is important. Each packet is compared to the appropriate set (Remote Access, Outbound or IP Pass Through) starting at filter one (Index 1) in the set. A comparison is performed sequentially against each filter until one of two events occurs:

  1. A filter is matched. The packet is either Accepted or Denied based on the filter definition, and the actions associated with the filter are performed.

  2. No filters are matched and the filter list is exhausted. In this case the packet is rejected.

  3. Filters will be color-coded: for Accept, Green; Deny, Red; Enabled, Black on background color; or Disabled, White or Gray on background color.

Filter Types

Outbound Filters

Remote Access Filters

IP Pass Through Filters

Automatic Filters

Automatic filters are the filters generated by the firewall in the course of allowing events such as the arrival of expected response packets from DNS queries and mail servers.

Automatic filters can now be deactivated; this action will prevent the creation of filters required to use the firewall, so GTA recommends using this option for troubleshooting only.

Automatic Filters can now be logged, an option used for configuration testing. See Remote Logging for examples of Automatic Filter logs.

Tips for Using Filters

Description Enter a description of the filter for reference. Any filters generated by the system will have descriptions with a label tag such as: Email Proxy, No RIP (RIP is disabled), and Stealth (Stealth mode is enabled).

Disable Check to disable the selected filter.

Type Accept or Deny the packet A sequence of data and control characters (binary digits) in a specified format that is switched/transferred as a whole. type.

Interface Logical interfaces. The specified interface is matched against the interface on which the IP packet arrived. <ANY> will match any interface.

Protocol TCP, UDP, ICMP, IGMP, ESP, AH, ALL, or any other protocol The procedures that are used by two or more computer systems so they can communicate with each other. defined in IP Protocols can be selected to match against the packet. If ALL is selected, no destination or source ports may be specified. Using NAT, only TCP, UDP, ICMP can be used with a Deny filter. Using IP Pass Through, all protocols can be used with either filter.

Priority Notice sent with the alarm event. Defined by the user.

Authentication Required Authentication allows the administrator to require users required to authenticate to the firewall using GBAuth before initiating a connection. By default, user authentication is served on TCP port 76 and the encryption level is high.

Actions Select one or more events to notify the administrator about a filter event. Alarm, Email, ICMP, Pager, SNMP, Stop Interface.
 

Log Yes, No, and Default. "Yes" logs all events for this filter, including accepts . "Default" logs the filter event as defined Filter Preferences section. "No" does not log any filter events for this filter. Selecting "yes" will create many log events, and so is used mostly for configuration testing.
 

Coalesce Coalescing blends similar data into a single log event: Source address/ports, Destination address/ports. Enabled by default in new and auto-configured filters.
INTERVAL in Filter Preferences is a global option for all coalescing. Set the interval to zero (0) to turn off all coalescing. Coalescing selected in Filter Preferences applies only to Automatic Filters.

Time based Time parameters for the filter. ì???î means no time group has been selected.

Time group Select the previously created time parameters from the dropdown box.
 

Traffic shaping Object that defines the pipe to apply to this filter. The Default Traffic Shaping object allows unlimited access to the available bandwidth. (Traffic shaping must be enabled under Objects/Traffic Shaping.)

Weight Priority when accessing the pipeís allocated bandwidth. Weights of 10 have the highest priority, and 1, the lowest.

Source Address  IP address of the packet. The selected IP address or object will be matched against the source IP address of the packet.

Range Choose a range of ports to which this filter will apply.

Source Ports Single or multiple ports, or a range of ports. Leave blank to allow any source port to be accepted. The source port for most client protocols is a random value above 1024. Specified Source Ports are matched against the source port of the IP packet. For Ports, see the Appendix, Ports and Services section.

Destination Address Destination IP address of the packet. The selected IP address or  Address object will be matched against the destination IP address of the packet.

Range Choose a range of ports to which this filter will apply.

Broadcast Select Broadcast In network terms, to send a datagram to an entire subnetwork. if this is a Broadcast Destination.
 

Destination Ports Destination Ports Often called services. Well-known service were assigned dedicated port numbers ranging from 1 to 1024, but other services have since been assigned outside this range. See Source Ports, above, for more information.

Return to Filters