当前位置:网站首页>Firewall working principle and detailed conversation table
Firewall working principle and detailed conversation table
2022-06-24 22:31:00 【Zhuge iron and steel cloud】
How firewall works
How firewall works :
It's essentially looking at the conversation table .
Packets arrive at the firewall , First, check whether there will be any session table matching .
If there is a session table matching , Then match the session table forwarding .
If there is no matching session table , See if you can create a session table .
The premise is that the session table can be created only after the first package .
A. Match the routing table first .B. Then match the security policy .
TCP: SYN --------- First package
SYN+ACK
ACK
ICMP echo-request---- First package
echo-reply
UDP There is no first package concept
State detection mechanism :
When the state prick mechanism is on , The session table can be established only when the first packet passes through the device , Subsequent packets are forwarded directly by matching session table entries .
When the condition monitoring mechanism is closed , Even if the first packet does not pass through the firewall , Subsequent packages can also generate session table entries as long as they pass through the firewall .
Open command :firewall session link-state check ------- On by default
Command to turn off status detection :undo firewall session link-state check tcp/icmp
The first package establishes a session ------- Use state detection .
Status detection is mainly aimed at TCP and ICMP message
What conditions need to turn off status detection :
( scene ) Inconsistent path back and forth (SACG).
Explain the conversation table
Look at the conversation table :
View session profile
[FW1]display firewall session table --------------- View the session table profile
Current Total Sessions : 5
https VPN:public --> public 192.168.0.100:49363-->192.168.0.10:8443
agreement Virtual firewalls work source address : Source port Destination address : Target port
https VPN:public --> public 192.168.0.100:49350-->192.168.0.10:8443
tcp VPN:public --> public 10.1.1.1:49395-->192.168.1.100:17889
ftp-data VPN:public --> public 192.168.1.1:20-->10.1.1.1:49396
ftp VPN:public --> public 10.1.1.1:49393+->192.168.1.1:21
1
2
3
4
5
6
7
8
Filter sessions :
[FW1]display firewall session table servic ftp --------- Filter sessions
Current Total Sessions : 1
ftp VPN:public --> public 10.1.1.1:49393+->192.168.1.1:21
1
2
3
View session table details :
[FW1]display firewall session table verbose -------------------- View session details
ftp/ agreement VPN:public --> public/ Virtual firewalls work ID: a58f362c468281b1855c0cfa4b / The only conversation
Zone: trust--> dmz/ The safety area TTL: 00:20:00/ Aging time Left: 00:19:02/ The rest of the time
Output-interface: GigabitEthernet0/0/2 / Exit interface NextHop: 192.168.1.1/ Next jump MAC: 00-50-56-9e-ea-06/ Next jump MAC
<--packets:0 bytes:0/ Reverse flow -->packets:24 bytes:1180/ Forward flow
10.1.1.1:49393+->192.168.1.1:21/ source address Source port Destination address Target port PolicyName: trust_dmz / Match policy
+-> --------- Representative opens ASPF function
--> meaningless , Normal message
icmp VPN:public --> public ID: a58f362c6bca01d8e15c0d2721
Zone: trust--> dmz TTL: 00:00:20 Left: 00:00:19
Output-interface: GigabitEthernet0/0/2 NextHop: 192.168.1.1 MAC: 00-50-56-9e-ea-06
<--packets:4 bytes:240 -->packets:4 bytes:240
10.1.1.1:1-->192.168.1.1:2048 PolicyName: trust_dmz
10.1.1.1 :1-->192.168.1.1 :2048
Source port Destination port
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
The detailed conversation table contains 13 Item parameters .
agreement , Indicates the protocol of the session
VPN, Use in the virtual firewall
ID, Marks a unique session
ZONE( Area ), Indicate the regional trend of flow .
TTL, Aging time of the session .
Left: Session time remaining
output-interface: Exit interface
nextHop: Next jump
MAC:mac Address ,
MAC The address is full 0 The situation of :
Interface to firewall
Virtual firewall MAC It's the whole thing 0
When ARP When the request fails
Reverse flow statistics
Forward traffic statistics
Quintuples , source address : Source port –> Destination address : Destination port
Be careful :ICMP Port calculation method :
ICMP In the message Identifier Field 16 Base to zero 10 Base number , As a source port
take Type Fields and Code The value of the field does and operation , As the destination port .
for example :Type=8,Code =0; Then the target port =1000 0000 0000 & 0 = 2048
ICMP Reason with port : because ICMP State detection is required , All five tuples are required .ICMP Ports make no sense .
The port number is 0 The situation of :
When the flow is OSPF,ESP,AH Wait for the agreement , Port is 0.
PolicyName: Matching policy name
Aging time (TTL) The problem of :
The default aging time of each protocol session :
Protocol aging time agreement
20s icmp
30s dns
120s 2min qq/tftp/l2tp/udp/rip/ntp/snmp/syslog/h323
240s 4min ftp-data/GRE/AH
600s 10min SIP/HTTPS/ESP
1200s 20min HTTP/FTP/Telnet/SMTP/sqlnet/ssh/tcp/pop3/BGP
14400s 4hours sqlnet-data
summary :
TCP 20min SYN 5s SYN+ACK 5s ACK 20Min frist-fin 900s finrst 5s
UDP 2min
ICMP 20s
Be careful : When the network management firewall traffic , When web Online ,https Ageing 10min, When off web when , Show https Aging time 10s.
namely :HTTPS( Flow rate )----10min(TTL)
HTTPS( No flow )-----10s
What happens to the session table :
Aging time is up
When a virus is detected , The conversation table ages immediately , And join the blacklist
send out FIN, For the first time (frist-fin), Aging time becomes 900s( Default ), Second receipt fin(finrst ), Aging time becomes 10s.
Modification of aging time :
Well known protocol modification aging time [FW1]firewall session aging-time service-set http 2000·---- Note that the unit is S
Modification time of non well-known agreement
First step : Custom protocol
ip service-set abc type object
service 0 protocol 200
firewall session aging-time service-set abc 200
There is a problem with the session time :
Download too large FTP file , There will be an interrupt .
Access database , The operation time is longer than TCP Aging time .
Solution :
Long conversation : Default aging time 168 Hours . Be careful : Only aim at TCP.
The default session time for long sessions can be modified .
[FW1]display firewall long-link aging-time
Long-link aging-time is 168 hours
Modify the default time for long sessions
firewall long-link aging-time 20
1
2
3
4
Configure long reply steps :
To configure ACL Define the agreement
acl number 3000 rule 5 permit tcp source 10.1.1.0 0.0.0.255 destination 192.168.1.0 0.0.0.255 destination-port eq ftp
call ACL
interzone trust dmz long-link 3000 inbound
————————————————
Copyright notice : This paper is about CSDN Blogger 「 Cao Shihong's blog 」 The original article of , follow CC 4.0 BY-SA Copyright agreement , For reprint, please attach the original source link and this statement .
Link to the original text :https://blog.csdn.net/qq_38265137/article/details/88548511
边栏推荐
- DX 的 HLSL 和 GL 的 GLSL的 矩阵构建的行列区别
- How to extract dates from web pages?
- KT6368A蓝牙双模透传芯片软件版本选型说明
- “阿里健康”们的逻辑早就变了
- Redis-跳表
- 60 个神级 VS Code 插件!!
- Notes on writing questions (18) -- binary tree: common ancestor problem
- Publicity of the second batch of shortlisted enterprises! Annual Top100 smart network supplier selection
- 磁盘的结构
- CA Zhouji - the first lesson in 2022 rust
猜你喜欢
随机推荐
leetcode:45. Jumping game II [classic greed]
堆內存分配的並發問題
In the multi network card environment, the service IP registered by Nacos is incorrect, resulting in inaccessible services
The logic of "Ali health" has long changed
磁盘的结构
DP problem set
Online filing process
产业互联网时代,并不存在传统意义上的互联网
网上立案流程
Reduce the pip to the specified version (upgrade the PIP through CMP and reduce it to the original version)
04A中断的配置
SAP interface debug setting external breakpoints
Cross border e-commerce, early entry and early benefit
PostMan工具介绍及安装使用
LINQ query collection class introductory cases Wulin expert class
Rotate the square array of two-dimensional array clockwise by 90 °
The leader of ERP software in printing industry
Description of transparent transmission function before master and slave of kt6368a Bluetooth chip, 2.4G frequency hopping automatic connection
虚拟人的产业发展现状
Unable to use the bean introduced into the jar package








