Beruflich Dokumente
Kultur Dokumente
Introduction........................................................................................................................................................... 1
Schedule .............................................................................................................................................................. 14
Routing ................................................................................................................................................................ 20
What is Routing?......................................................................................................................................................20
Algorithm types .......................................................................................................................................................20
Static V/S Dynamic ...............................................................................................................................................20
Single-path V/S Multipath ...................................................................................................................................21
Link-State V/S Distance-Vector ............................................................................................................................21
Routing in Cyberoam ...............................................................................................................................................21
Static Routing.......................................................................................................................................................21
Multicast Forwarding ...........................................................................................................................................23
Policy based routing ............................................................................................................................................23
Summary ............................................................................................................................................................. 25
Firewall Cyberoam Certified Network & Security Professional
Introduction
After deploying Cyberoam in the network as a bridge or a gateway, this module highlights in depth
features of Cyberoam as a firewall. From previous learning, we know what a firewall is, and the types
of firewalls. We have seen the evolution of firewalls, starting from packet filters, application proxies,
stateful inspection firewall, UTM, and Cyberoam - Next Generation UTM. We know that adding a
firewall to the network will allow the network administrator to control the access to network resources.
Cyberoam Layer 8 Firewall controls the packets in network by adding identity to each packet and
hence has a better understanding to each packet, than to apply only ACLs. Cyberoam Layer 8 not
only replaces the traditional firewalls functionalities, but also adds zone based firewalling mechanisms
to the network. To summarize, we now see the Cyberoam Layer 8 as a Zone and identity based
firewall.
Alternatively, appliance access can also be configured from the zone configuration page. In GUI,
navigate to Network -> Interface -> Zone.
1
Cyberoam Certified Network & Security Professional Firewall
After securing the appliance from each zone, it also becomes equally important to manage the zones
at each port of the security appliance. We shall now see how the IP address management can be
done with an example.
Select Network Interface to view port wise network (physical interface) and zone details. If virtual
sub-interfaces are configured for VLAN implementation, they are also nested and displayed beneath
the physical interface.
Interface - Physical interfaces/ports available on Cyberoam appliance. If virtual sub-interface is
configured for the physical interface, it also displayed beneath the physical interface. Virtual sub-
interface configuration can be updated or deleted.
The IP addresses assigned to each port on the appliance can be static or dynamically obtained from
DHCP server. The appliance also functions as a DHCP server. The IP addresses can be edited and
virtual interfaces can be added by adding aliases and VLANs. An alias associates more than one IP
address to a single network interface. The advantage of using an alias is that a single interface can
have multiple connections to a network. A VLAN is a group of nodes with common requirements. In
VLAN the hosts communicate as if they are attached to same broadcast domain, regardless of their
physical connectivity.
2
Firewall Cyberoam Certified Network & Security Professional
3
Cyberoam Certified Network & Security Professional Firewall
To add a bridge interface (IP for pair) go to Network -> Interface -> Interface -> Add bridge-Pair
Zone Management
Default Zones
(1) LAN Depending on the appliance in use and on your network design, Cyberoam appliance allows
to group one to six physical ports in this zone. Group multiple interfaces with different network subnets
to manage them as a single entity. Group all the LAN networks under this zone. By default the traffic to
and from this zone is blocked and hence the highest secured zone. However, traffic between the ports
belonging to the same zone is always allowed.
(2) DMZ (De-Militarised Zone) - This zone is normally used for publicly accessible servers. Depending
4
Firewall Cyberoam Certified Network & Security Professional
on the appliance in use and on your network design, appliance like Cyberoam allows to group one to
five physical ports in this zone.
(3) WAN Zone used for Internet services. It can also be referred as Internet zone.
(4) VPN - This zone is used for simplifying secure, remote connectivity. It is the only zone that
does not have an assigned physical port/interface. Whenever the VPN connection is
established, port/interface used by the connection is automatically added to this zone and on
disconnection; port is automatically removed from the zone.
(5) Local - Entire set of physical ports available on the appliance including their configured aliases are
grouped in LOCAL zone. In other words, IP addresses assigned to all the ports fall under the LOCAL
zone.
5
Cyberoam Certified Network & Security Professional Firewall
6
Firewall Cyberoam Certified Network & Security Professional
Rule Management
Select FirewallRule to display the list of rules.
ON/OFF rule icon - Click to activate/deactivate the rule. If you do not want to apply the firewall rule
temporarily, disable rule instead of deleting.
Select rule type: IPv4 or IPv6.
Cyberoam creates two Default Firewall Rules when it is first deployed in any of the two operational
modes
These rules depend on the operational mode and the Default Internet Access Policy selected while
running the network configuration wizard.
The default rules can be edited by the administrator but cannot be deleted.
At the time of deployment, Cyberoam allows to define one of the following Internet Access policies
using Network Configuration Wizard:
Monitor only
General Internet policy
Strict Internet policy
7
Cyberoam Certified Network & Security Professional Firewall
Masquerade and Allow entire LAN to WAN traffic for all the authenticated users after applying
following policies:
8
Firewall Cyberoam Certified Network & Security Professional
Masquerade and allow entire LAN to WAN traffic for all the users. Without scanning SMTP, POP3,
IMAP and HTTP traffic
Masquerade and Allow entire LAN to WAN traffic for all the authenticated users after applying
following policies:
Web Filter & Application Filter User specific
QoS policy User specific
Anti Virus & Anti Spam policy - Scan SMTP, POP3, IMAP and HTTP traffic
Masquerade and Allow entire LAN to WAN traffic for all the users after applying following
policies:
Web Filter Applies General Corporate Policy to block Porn, Nudity, AdultContent, URL
TranslationSites, Drugs, CrimeandSuicide, Gambling, MilitancyandExtremist, PhishingandFraud,
Violence, Weapons categories
IPS Policy General policy
Anti Virus & Anti Spam policy - Scan SMTP, POP3, IMAP and HTTP traffic
9
Cyberoam Certified Network & Security Professional Firewall
Masquerade and Allow entire LAN to WAN traffic for all the authenticated users after applying
following policies:
Web Filter & Application Filter User specific
QoS policy User specific
IPS policy General policy
Anti Virus & Anti Spam policy - Scan SMTP, POP3, IMAP and HTTP traffic
Note: Default Firewall rules can be modified as per the requirement but cannot be deleted. IPS
policy will not be effective until the Intrusion Prevention System (IPS) module is subscribed. Virus
and Spam policy will not be effective until the Gateway Anti Virus and Gateway Anti-spam
modules are subscribed respectively.
If Internet Access Policy is not set through Network Configuration Wizard at the time of
deployment, the entire traffic is dropped.
There are no IPv6 rules created by default on the appliance. As required by the network, the user needs
to create IPv6 firewall rules.
Managing Objects
Objects represent types of Internet data transmitted via particular protocols or applications.
Protect your network by configuring firewall rules to
Block services for specific zone
Limit some or all users from accessing certain services
Allow only specific user to communicate using specific service
Cyberoam provides several standard objects and allows creating:
Customized object definitions
Firewall rule for Customized service definitions
10
Firewall Cyberoam Certified Network & Security Professional
IP Host
To add a new IP Host to the list, go to Objects -> Hosts -> IP Host -> Add
Adding a host, allows to add IP, Network, IP Range & IP List
MAC host
In Cyberoam MAC address (Machine Address) is a decision parameter along with identity and ip
address for the firewall policies.
All normal firewall policies like Web filter, Application filter, AV, IPS, QoS policy etc can be applied on
the MAC firewall rule.
Eg: For any server running on dynamic IP Address, we can create a firewall rule to allow that server
through firewall using MAC
To Add a MAC Based host go to Objects -> Hosts -> MAC Host -> Add
11
Cyberoam Certified Network & Security Professional Firewall
MAC address can be added directly on the firewall rule (at the time of creation of firewall rule)
12
Firewall Cyberoam Certified Network & Security Professional
FQDN Host
FQDN (Fully Qualified Domain Name) host can be added to Cyberoam appliance. The necessity for
adding this host also makes it possible that a firewall rule can be made to a particular FQDN.
To add a FQDN host go to Object -> Hosts -> FQDN Host
To apply a FQDN based firewall rule, create a firewall rule and on the source and destination network,
you can find the FQDN host (basic settings)
Country Host
Cyberoam allows adding country based host to filter the traffic at the country level. A country host can
be defined at the firewall rule itself.
To add a new country host go to Objects -> Host -> Country Host -> Add
13
Cyberoam Certified Network & Security Professional Firewall
To apply a country host based firewall rule, create a firewall rule and on the source and destination
network, you can find the country host (basic settings)
Schedule
Schedule defines a time schedule for applying Firewall Rule or Web & Application Filter policy. It is
used to control when Firewall Rules or Internet Access policies are active or inactive.
Schedule also defines the system triggered scan for Rogue AP Scan.
Types of Schedules:
Recurring use to create policies that are effective only at specified times of the day or on
specified days of the week.
One time - use to create Firewall Rules that are effective once for the period of time specified in
the schedule. One time schedule can be implemented through firewall only.
Select Firewall -> Rule -> Add to open the create page (Basic Settings)
14
Firewall Cyberoam Certified Network & Security Professional
Note: Cyberoam supports multiple ports forwarding by forwarding a Port Range/Port List. Port
Range includes all the ports between two given numbers, whereas Port List is for particular ports.
Virtual Host (Inbound NAT) can be created with load balancing the gateways. This means that all
traffic coming through a single gateway can be forwarded to virtual host, or in other case, connections
to the virtual host can be shared amongst the gateway.
15
Cyberoam Certified Network & Security Professional Firewall
16
Firewall Cyberoam Certified Network & Security Professional
Create firewall rules to allow external host (from the Internet) to access a virtual host that maps to
internal servers. You must add the virtual host to a firewall policy to actually implement the mapping
configured in the virtual host i.e. create firewall rule that allows or denies inbound traffic to virtual host.
Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule
for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in
virtual host. If port forwarding is not enabled in virtual host then firewall rule with All Services is
created. Loopback rules allow internal users to access the internal resources using its public IP
(external IP) or FQDN.
In general scenario when any traffic is initiated from DMZ to WAN, there is a need for reflexive rule.
For an example, in case of an email server, the private IP of the email server is mapped with the public
IP on the Internet. When an email is received (inbound) the virtual host rule for inbound works, but
when an email is sent (outbound) there is a requirement to create a reflexive rule. By Default,
Cyberoam prompts for this rule while creating the virtual host.
17
Cyberoam Certified Network & Security Professional Firewall
All inbound traffic can be load balanced with the help of Virtual Host and DNS. Let us understand the
scenario below in which a webserver is published using 2 Public IP Addresses. When one of the
gateway fails, Cyberoam will remove the DNS records for the failed link and hence give failover. When
both links are active, Cyberoam will do Load Balancing.
Go to Firewall Virtual Host to create Virtual hosts
Go to network DNS Add DNS host entry to add DNS host entry
18
Firewall Cyberoam Certified Network & Security Professional
On creating any firewall rule, Cyberoam allows load balance (in case of multiple gateways) and
failover (in case of failure of gateway) on the rule page itself.
Cyberoams unified firewall control provides with a single page configuration. One can attach all the
policies including IPS, Internet access policy, Bandwidth policy, AV/AS scanning and routing policy
from a single firewall page.
Select Firewall ->Rule -> (Click on a particular rule)
19
Cyberoam Certified Network & Security Professional Firewall
Routing
What is Routing?
Routing is a way to get packets from source to destination. Routers or software in a computer
determines the next network point to which a packet should be forwarded toward its final destination.
The router is connected to at least two networks and makes a decision which way to send each data
packet based on its current state of the networks it is connected to. A router is located at any point of
networks or gateway, including each Internet POP. A router creates or maintains a table of the
available routes and their conditions and uses this information along with distance and cost algorithms
to determine the best route for a given packet. Typically, a packet may travel through a number of
network points with routers before arriving at its destination.
Algorithm types
Static routing algorithms are hardly algorithms at all, but are table mappings established by the
network administrator prior to the beginning of routing. These mappings do not change unless the
network administrator alters them. Algorithms that use static routes are simple to design and work well
in environments where network traffic is relatively predictable and where network design is relatively
simple.
Because static routing systems cannot react to network changes, they generally are considered
unsuitable for today's large, changing networks. Most of the dominant routing algorithms in the 1990s
20
Firewall Cyberoam Certified Network & Security Professional
are dynamic routing algorithms, which adjust to changing network circumstances by analyzing
incoming routing update messages. If the message indicates that a network change has occurred, the
routing software recalculates routes and sends out new routing update messages. These messages
permeate the network, stimulating routers to rerun their algorithms and change their routing tables
accordingly.
Dynamic routing algorithms can be supplemented with static routes where appropriate. A router of last
resort (a router to which all un-routable packets are sent), for example, can be designated to act as a
repository for all un-routable packets, ensuring that all messages are at least handled in some way.
Some sophisticated routing protocols support multiple paths to the same destination. Unlike single-
path algorithms, these multipath algorithms permit traffic multiplexing over multiple lines. The
advantages of multipath algorithms are obvious: They can provide substantially better throughput and
reliability.
Link-state algorithms (also known as shortest path first algorithms) flood routing information to all
nodes in the inter-network. Each router, however, sends only the portion of the routing table that
describes the state of its own links. Distance- vector algorithms (also known as Bellman-Ford
algorithms) call for each router to send all or some portion of its routing table, but only to its neighbors.
In essence, link- state algorithms send small updates everywhere, while distance- vector algorithms
send larger updates only to neighboring routers.
Because they converge more quickly, link- state algorithms are somewhat less prone to routing loops
than distance- vector algorithms. On the other hand, link- state algorithms require more CPU power
and memory than distance- vector algorithms. Link-state algorithms, therefore, can be more expensive
to implement and support. Despite their differences, both algorithm types perform well in most
circumstances.
Routing in Cyberoam
Static Routing
Static routing can be configured by adding static routes when you want to route traffic destined for
specific network/host via a different next hope instead of a default route. To add static route it is
required to know Destination Network/Host, Netmask for destination network & Next hop IP address.
The gateway address specifies the next-hop router to which traffic will be routed.
A static route causes packets to be forwarded to a different next hope other than the configured default
gateway. By specifying through which interface/gateway the packet will leave and to which device the
packet should be routed, static routes control the traffic exiting Cyberoam.
Example: All the traffic to 4.2.2.2 should always be routed via ISP1 (1.1.1.1) this traffic will be
dropped in case the interface is down.
To add the static route, in GUI, go to Network -> Static Route -> Unicast -> Add
For Eg. Cyberoam is deployed in Gateway mode and L3 switch is configured for VLAN routing
21
Cyberoam Certified Network & Security Professional Firewall
22
Firewall Cyberoam Certified Network & Security Professional
Multicast Forwarding
By default, Cyberoam understands the multicast traffic and can forward the same. To forward the
multicast traffic, multicast traffic forwarding should be enabled and a multicast route needs to be
added.
Example: If multicast traffic is being sent from source 1.1.1.2 to the 10.10.1.0 /24 network with
multicast address 224.0.0.1 then the following route will be added to Cyberoam.
Go to Network -> Static Route -> Multicast
Static routing method satisfies most of the requirements, but is limited to forwarding based on
destination address only.
23
Cyberoam Certified Network & Security Professional Firewall
Policy based routing is extended static routes which provide more flexible traffic handling capabilities.
It allows for matching based upon source address, service/application, and gateway weight for load
balancing. Hence, it offers granular control for forwarding packets based upon a number of user
defined variables like:
Destination
Source
Application
Combination of all of the above
Example: All HTTP traffic is routed through any available gateway via load balance
24
Firewall Cyberoam Certified Network & Security Professional
Summary
In this module we have learnt about the firewall. A firewall secures the network in different ways by
analyzing the data packets and determining whether to allow to or to reject. Along with firewall we
have also seen
Access control
Zone management
Base firewall rules
Creating objects
NAT (Outbound & Inbound)
Fusion Firewall
Routing
Unified Threat Control
Managing several parameters from a single firewall rule
25