Inbound Tunnels

The Inbound Tunnels facility allows a host on an external network to be able to initiate a protocol from the Protocol List, e.g., TCP, UDP, ICMP, IGMP, ESP or AH session, with an otherwise inaccessible host, for a specific service. Tunnels can be defined for both the External Network and the PSN; tunnels are only associated with inbound connections, so they are not normally used on a Protected Network interface. See product guides for the number of tunnels available on a specific GTA Firewall.

Tunnels can be created for these inbound connections:

Creating Inbound Tunnels

Tunnels are defined by an Interface object/port and a destination IP address/port. (See Appendix D ñ GNAT Box Terms for more information about using interface objects.) The source and destination port of the tunnel definition need not be the same: it is possible to provide access to multiple hosts for the same service using a single IP address. For example, telnet operates on port 23, but a tunnel could be defined with a source port of 99 and a destination port of 23.

Only the source side of a tunnel is visible. Since GTA Firewall tunnels use Network Address Translation, a user on the source network side will never see the ultimate destination of the tunnel. The tunnel appears to be a service operating on a server with the tunnelís source IP address.

If a tunnel originates from an IP alias address, you may need to map the destination host to the IP alias using Static Address Mapping so that secondary connections appear to originate from the same address as the tunnel.

To create a new tunnel, first select the protocol the tunnel will use from the dropdown list. In the INTERFACE field, select the Interface Object that represents the source of the tunnel, and in the Port field, enter the number of the port through which this tunnel will operate on the source side.

For the destination of the tunnel, enter the IP address of the selected destination and then select the port through which the tunnel will operate on the destination side. See Appendix A ñ Ports and Services, for some of the common ports.

Allowing Access to an Inbound Tunnel

A tunnel is a mapping from one IP address/port to another IP address/port. The tunnel source will not be usable unless an appropriate filter allows access. There are two methods to allow access to an inbound tunnel: selecting AUTOMATIC ACCEPT ALL FILTERS on the tunnel or setting Remote Access Filters.

Automatic Accept All Filters

Unless further restriction is desired on a tunnel, selecting AUTOMATIC ACCEPT ALL FILTERS will allow traffic between the designated interfaces and addresses. If logging for these filters is desired, activate logging for automatic filters in Filter Preferences. When activated, automatic filters will be recorded in the Active Filters table of the System Activity section.

Remote Access Filters

A Remote Access Filter can also be created to allow traffic between the designated interfaces and addresses. These filters can be activated and logged individually, if close observation of tunnel use it required. The DEFAULT button on the Remote Access Filter set screen will auto-configure filters for all defined tunnels. The filters generated by this method are broad in scope and may require modification to meet your security policy.

Disable Disable the defined inbound tunnel.

Description Description of the inbound tunnel.

Protocol Select from the Protocol List: ALL, TCP, UDP, ICMP, IGMP, ESP, AH, etc.  

From Interface Interface object representing a network interface, an IP alias or a H2A (high availability) group for the source side of the tunnel.

From Port Port value which users will access. See a list of common services and their port numbers in Appendix A ñ Ports & Services. For an exhaustive and up-to-date list, see IANAís list at www.iana.org/assignments/port-numbers.

To IP address  IP address of the target host. The host may reside on either the PSN or the Protected Network (including subnets routed behind either network).

To Port Port value of the service being offered on the target host, which will be the destination of the tunnel.

Automatic Accept All Filter Make the inbound tunnel connection ignore conflicting filters. When activated, the Automatic filters will appear under System Activity/Active Filters.

Hide Source Hide the source of the inbound tunnel connection. Useful when the GTA Firewall is used on an intranet.

Authentication Required Authentication allows the administrator to require users required to authenticate to the firewall using GBAuth before initiating a connection. By default, user authentication is served on TCP port 76.

Traffic Shaping Object that defines the pipe to apply to this filter. The Default Traffic Shaping object allows unlimited access to the available bandwidth.

Weight Priority when accessing the pipeís allocated bandwidth. Weights of 10 have the highest priority, and 1, the lowest.

¨ Caution

A tunnel with a source and destination port of zero means "tunnel all ports for the specified protocol."  It is possible to totally expose a host by creating a zero tunnel with the protocol type set to ALL. It is not recommended to expose a host in this way, especially a host on a Protected Network.

Return to NAT Overview