Contents 1. Preface... 7 About This Document ... 8 Document Conventions ... 8 Command Line Interface (CLI) Conventions ... 8 Illustration Conventions ... 8 Frequently Used Acronyms ... 9 2. Scenarios... 11 NAT Scenarios ... 12 Source NAT from a DIP Pool with PAT ... 12 Source NAT from the Egress Interface IP Address ...
This guide contains supplemental information for network administrators who install and maintain the freeGuard Blaze 2100 in a network. This document should be used with the User Guide and the Command Line Interface Reference Manual. It addresses the most commonly used network scenarios where the freeGuard Blaze 2100 is used.
Frequently Used Acronyms This guide assumes familiarity with the following acronyms. See the User Guide glossary for fur- ther details about these terms. NAT: Network Address Translation DIP: Dynamic IP Address PAT: Port Address Translation LAN: Local Area Network VLAN: Virtual Local Area Network VPN: Virtual Private Network ESP: Encapsulating Security Payload 3DES: Triple Data Encryption Standard...
CENARIOS This chapter lists and describes the following scenarios: • NAT Scenarios on page 12 • Policy Scenarios on page 22 • VPN Scenarios on page 27 • Defending Against DoS and DDoS Attacks on page 32 • Additional Attack Detection and Prevention on page 35 Scenarios Guide...
S C E N A R I O S NAT Scenarios There are many ways that source and destination NAT can be applied to packets as they traverse through the appliance. The following source and destination NAT examples are included in this section: •...
Configure the default route to use eth1 and the gateway address: 4.4.4.254. CLI Commands The following commands apply to the source NAT with PAT scenario described in this section. Interfaces set interface eth0 zone trust set interface eth0 ip 10.0.0.200/24 set interface eth0 nat set interface eth1 zone untrust set interface eth1 ip 4.4.4.1/24...
S C E N A R I O S [NOTE] In this example, the DIP pool has six entries. The IP addresses in the DIP pool are used as a source IP address for the outgoing packet based on a round-robin mechanism. It is also possible to have a DIP pool with only one entry.
Page 15
CLI Commands The following commands apply to the source NAT scenario described in this section. Interfaces set interface eth0 zone trust set interface eth0 ip 10.0.0.200/24 set interface eth0 nat set interface eth1 zone untrust set interface eth1 ip 4.4.4.1/24 Policy set policy from trust to untrust any any any permit Route...
S C E N A R I O S Destination NAT to a Single IP Address Using Port Mapping This section describes a scenario where a web server is behind a firewall and a client on the In- ternet needs to get access to the web server. Since the web server does not have a public IP ad- dress, HTTP traffic directed to the public IP address needs to be translated to the private IP address of the server.
Page 17
Figure 3. Destination NAT with Port Mapping CLI Commands The following commands apply to the destination NAT with port mapping scenario described in this section. Interfaces set interface eth1 zone untrust set interface eth1 ip 4.4.4.1/24 set interface eth0 zone trust set interface eth0 ip 10.0.0.1/24 Addresses set address trust MTT1 4.4.4.200/32...
S C E N A R I O S Route set route 0.0.0.0/0 interface eth1 gateway 4.4.4.254 set route 4.4.4.200/32 interface eth0 save Destination NAT to a Single IP Address without Port Mapping The section describes an example of a network with the following requirements: •...
CLI Commands The following commands apply to the destination NAT without port mapping scenario described in this section. Interfaces set interface eth1 zone untrust set interface eth1 ip 4.4.4.1/24 set interface eth0 zone trust set interface eth0 ip 10.0.0.1/24 Addresses set address trust MTT1 4.4.4.200/32 Policy set policy from untrust to trust any MTT1 http nat dst 10.0.0.200 permit...
Page 20
S C E N A R I O S Create a host route for the MTT1 object on interface eth0 Figure 5. Destination NAT with Port Mapping CLI Commands The following commands apply to the destination NAT with port mapping scenario described in this section.
Page 21
Addresses set address trust MTT1 4.4.4.200/32 Policy set policy from untrust to trust any MTT1 http nat dst 10.0.0.200 port 80 permit set policy from untrust to trust any MTT1 ftp nat dst 10.0.0.210 port 21 permit Route set route 0.0.0.0/0 interface eth1 gateway 4.4.4.254 set route 4.4.4.200/32 interface eth0 gateway 0.0.0.0 save S C E N A R I O S...
S C E N A R I O S Policy Scenarios This section describes different policy scenarios you can configure for the freeGuard Blaze 2100. The following policy samples are included in this section: • Interzone Policies • Intrazone Policies •...
Page 23
• Everyone can access the mail and web server located in the DMZ. Figure 6. Example of Network for Interzone Policies CLI Commands The following commands apply to the interzone policy scenario described in this section: Interfaces set interface eth0 ip 10.0.0.1/32 set interface eth0 zone trust set interface eth1 ip 4.4.4.1/32 set interface eth1 zone untrust...
S C E N A R I O S set address trust office 10.0.100.0/24 Services set group service snetservices add http set group service snetservices add dns set group service snetservices add ftp set group service snetservices add ssl set group service snetservices add smtp Policies set policy from trust to untrust snet any snetservices permit set policy from trust to untrust office any any permit...
Page 25
Figure 7. Example of Network for Intrazone Policy CLI Commands The following commands apply to the intrazone policy scenario described in this section. Interfaces set interface eth1.100 zone trust set interface eth1.100 ip 192.168.100.1/32 set interface eth1.100 nat set interface eth1.200 zone trust set interface eth1.200 ip 192.168.200.1/32 tag 200 set interface eth1.200 nat Zones...
Global Policies This section describes an example where the freeGuard Blaze 2100 is configured to allow all hosts in every zone the ability to hit a company website with the domain name “www.123Systems.com.” Global policies are better used if there are many zones.
VPN Scenarios This section describes examples of VPN scenarios you can configure for the freeGuard Blaze 2100. The following sample scenarios are included in this section: • Site-to-site VPN with Autokey • Site-to-site VPN with Manual Keying Site-to-site VPN with AutoKey...
Page 28
S C E N A R I O S Amsterdam Interfaces set interface eth0 zone trust set interface eth0 ip 10.1.1.1/24 set interface eth0 nat set interface eth1 zone untrust set interface eth1 ip 1.1.1.1/24 Addresses set address trust local_lan 10.1.1.0/24 set address vpn paris_lan 10.2.2.0/24 VPN Pre-shared Key set ike gateway to_sanjose address 2.2.2.2 main outgoing-interface eth0...
set vpn sanjose_amster gateway to_amsterdam proposal g2-esp-des-md5 Route set route 0.0.0.0/0 interface eth1 gateway 2.2.2.250 Policies set policy from trust to untrust local_lan amsterdam_lan any tunnel vpn sanjose_amster set policy from untrust to trust amsterdam_lan local_lan any tunnel vpn sanjose_amster save Site-to-Site VPN with Manual Keying In this example, a manual key tunnel provides a secure communication channel between offices...
Page 30
S C E N A R I O S CLI Commands The following commands apply to the site-to-site VPN scenario described in this section. The com- mands are divided into Amsterdam and San Jose categories, corresponding to the fictional offices specified in the example above.
Network Attack Prevention This section describes examples of various network attack prevention scenarios you can configure for the freeGuard Blaze 2100 The following sample scenarios are included in this section: • Preventing Network Port Attacks • Defending Against DOS and DDOS Attacks...
S C E N A R I O S Defending Against DoS and DDoS Attacks Rate limiting is the most common way to defend against DoS and DDoS attacks. You can configure options on the appliance to apply various rate limits to ICMP, TCP and UDP traffic. Rate limiting is a function in which a network interface limits the number of packets sent or re- ceived allowing traffic that is less than or equal to the rate to be sent, any traffic that exceeds the limit may be dropped or delayed.
allowed through the zone to a specific host per second. The maximum threshold for the udp- flood attack-threshold is 64,000. set zone {zone name} screen udp-flood threshold {number} Example: Set the UDP threshold Set the UDP threshold to 1,000 on the zone untrust: set zone untrust screen udp-flood threshold 1000 save SYN Flood Prevention...
S C E N A R I O S Example: Set the IP fragment threshold Set the ip-frag threshold to 1,000 on the untrust zone: set zone untrust screen ip-frag threshold 1000 save TCP-FIN-no-ACK To filter packets that have a TCP-FIN bit set, but no ACK, use the set zone command: set zone {zone name} screen fin-no-ack Example: TCP-FIN-no-ACK To filter packets that have a TCP-FIN bit set, but no ACK for the zone untrust:...
Additional Attack Detection and Prevention In addition to the configurable attack settings the appliance will detect and prevent the network and DoS attacks listed in Figure Land Attack IRDP Ping of Death Unknown IP Protocol Figure 12. Additional Attack Prevention Viewing Attack Settings To view the current attack settings per zone, use the get zone command with the screen and zone name to view the current settings:...
Need help?
Do you have a question about the freeGuard Blaze 2100 and is the answer not in the manual?
Questions and answers