网络安全参考 | UNIX参考 | GPS参考 | 无线参考 | 在线手册 | OSBUG.ORG | SUNNY-NETWORK.COM
网站地图 RSS订阅
高级搜索 收藏本站
Home | 业界动态 | 防火墙 | IDS/IPS | VPN | PKI | Honeypot | Hacker/Intruder | 黑客技术 | 破解技术 | 加密技术 | 病毒防护 | 木马 | 反垃圾邮件 | 反流氓软件 | 漏洞 | 无线安全 | UNIX | Windows | 安全编程 | 安全软件 | TPM/TCG | 数据恢复 | 企业信息安全 | 个人信息安全
 当前位置: Home > 防火墙 > 文章  
状态检测工作机制
文章来源: Internet 文章作者: 未知 发布时间: 2002-04-24   字体: [ ]
 
  

  #define ICMP_DEST_UNREACH 3 /* Destination Unreachable */
  
  Some Sub Types are needed in and out, see below
  
  #define ICMP_SOURCE_QUENCH 4 /* Source Quench */
  
  Allow it outbound anyway, inbound is less likely to be a problem, unless
  you
  are doing some streaming or multicast feeding to the internet.
  
  #define ICMP_REDIRECT 5 /* Redirect (change route) */
  
  block!
  
  #define ICMP_ECHO 8 /* Echo Request */
  
  you might allow it incoming for trusted addresses (note some NICs will
  require you to make your primary DNS Server pingable!)
  
  #define ICMP_TIME_EXCEEDED 11 /* Time Exceeded */
  
  helpfull if you allow it incoming, could allow exploring your network if you allow it outbound.
  
  #define ICMP_PARAMETERPROB 12 /* Parameter Problem */
  
  helpfull if you allow it incoming, could allow exploring your network if you allow it outbound.
  
  #define ICMP_TIMESTAMP 13 /* Timestamp Request */
  #define ICMP_TIMESTAMPREPLY 14 /* Timestamp Reply */
  #define ICMP_INFO_REQUEST 15 /* Information Request */
  #define ICMP_INFO_REPLY 16 /* Information Reply */
  #define ICMP_ADDRESS 17 /* Address Mask Request */
  #define ICMP_ADDRESSREPLY 18 /* Address Mask Reply */
  
  Block those on the external interface
  
  /* Codes for UNREACH. */
  #define ICMP_NET_UNREACH 0 /* Network Unreachable */
  
  ignored, so block it
  
  #define ICMP_HOST_UNREACH 1 /* Host Unreachable */
  
  allow it at least inbound, best would be if you can do that stateful
  
  #define ICMP_PROT_UNREACH 2 /* Protocol Unreachable */

  you can block that
  
  #define ICMP_PORT_UNREACH 3 /* Port Unreachable */
  
  you should allow that at least inbound. Be aware that some filter rules should send PORT_UNREACH on connection request (at least 137,139 and auth), so make sure not to block those ICMP packetes
  which are generated by your reject rule.

 
推荐文章
·怎么样给企业级防火墙“体检”
·构建Linux系统下U盘路由器、防火
·安全基础:防火墙功能指标详解
·没有防火墙是可行的 但是并不理
·2005年度千兆防火墙公开比较评测
·没有防火墙的安全:明智还是愚蠢?
·使用防火墙封阻应用攻击的八项技
·防火墙与路由器的安全性比较
·防火牆安全管理
·netfilter: Linux 防火墙在内核
·再谈防火墙及防火墙的渗透
·一种新的穿透防火墙的数据传输技
 

 
共3页: 上一页 [1] 2 [3] 下一页
↑返回顶部   打印本页   关闭窗口↓  

Google
 
Web oldhand.org unixreference.net meshmea.org
热点文章
·网络安全保护神——免费
·浴火坚“墙”——12款防
·防火墙技术综述
·教你命令行下配置Window
·2005年度千兆防火墙公开
·构建Linux系统下U盘路由
·Windows Vista系统防火
·Win XP SP2自带防火墙设
相关分类
相关文章
·防火墙功能指标详解
·基于NAT的混合型防火墙
·Check Point防火墙简介
·防火墙技术综述
·怎样用ipchains构建防火
·IPCHAINS参数介绍
·怎么样给企业级防火墙“
·全面透视防火墙
更多...
 
 

Copyright(c) 2001-2008 OLDHAND ORGANIZATION, All Rights reserved.
Power by DedeCms 织梦内容管理系统
$Id: article_article.html,v 1.3 2007/02/10 12:00:37 yjs Exp $