Enterasys Networks XSR CLI Router User Manual


 
Firewall Feature Set Commands
XSR CLI Reference Guide 16-123
objectssuchasANY_EXTERNALanduserdefinedobjectnamesarecasesensitive.Refertotheip
firewall policy
commandforapplicablepolicyandgatingrulelimits.
Syntax
ip firewall network-group name name1 ... name10
Syntax of the “no” Form
Thenoformofthiscommanddisablesthenetworkgroup:
no ip firewall network-group name
Mode
Globalconfiguration:XSR(config)#
Example
Thefollowingexampledefinesnetworkobjectssalesandremoteaccessandaddsthemtothe
networkgroupsprivatenetandsalesremoteaccess:
XSR(config)#ip firewall network sales 192.168.100.0 ma 255.255.255.0 i
XSR(config)#ip fi network remote-access 10.1.1.0 m 255.255.255.0 i
XSR(config)#ip firewall network-group private-net sales remote-access
ip firewall policy
Thiscommandconfiguresafirewallpolicycomprisedofpolicyobjects.Eachobject/ruleistagged
withanamewhichplacesthepoliciesinorderusingabeforeandafterkeyword.Thispermitsyou
toenterpoliciesinanorderdifferentthanwhichtheywillbeapplied.
TheXSRfirewallenforcesadeny
allpolicybydefault.So,unlessthereisapolicyobjectconfigured
toallowtrafficinaparticulardirection,packetswillnotpassthroughthefirewall.Thiseliminates
theneedtodefinecatchallrejectpoliciesineachdirection.
Policiesapplytotrafficdirectedattherouter,aswell.So,policy
objectsmustbedefinedtoallow
managementtrafficintotherouter.Beawarethattheconsoleportisalwaysavailablefor
managementpurposes.
Anameforanyfirewallobjectmustusethesealphanumericcharactersonly:
A‐Z(upperorlower
case),
0‐9,-(dash),or _(underscore).Also,allfirewallobjectnamesincludingpredefined
objectssuchasANY_EXTERNALanduserdefinedobjectnamesarecasesensitive.
name
Networkgroupobjectname.Limit:16characters.
name1 to name10
Nameofthenetworkornetworkgroupobjects.
Notes: Citing a policy’s intent in the name is useful if its function is not apparent from the definition.
Internal XSR gating rules, which order traffic filtering, are stored in a temporary file in Flash.
Because there is one gating rule for each network source/destination expansion, a potentially
enormous number of gating rules can be generated by just a single firewall policy. For example,
when a large network that has an ANY_INTERNAL group with 200 network addresses is used as
the source address, and another group of 10 network addresses is used as the destination address,
2000 gating rules are defined for the policy. Accordingly, a limit is applied to their total, depending on
the amount of installed RAM.