Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 Jul 2012 21:21:14 +0430
From:      Hooman Fazaeli <hoomanfazaeli@gmail.com>
To:        "Tonix (Antonio Nati)" <tonix@interazioni.it>
Cc:        freebsd-pf@freebsd.org
Subject:   Re: Question on packet filter using in and out interfaces
Message-ID:  <50083B02.6080707@gmail.com>
In-Reply-To: <500826BD.3070602@interazioni.it>
References:  <500826BD.3070602@interazioni.it>

next in thread | previous in thread | raw e-mail | index | archive | help


On 7/19/2012 7:54 PM, Tonix (Antonio Nati) wrote:
>
> Which is the real situation? Does really Packet Filter has any security advantage having only 'in' rules, or there is no difference on using out interface instead of in interface?
>
> All start from consideration that using out interfaces would semplify a lot management of complex environments, with interfaces dedicated to different customers (one OUT rule on specific interface 
> instead of several IN rules on all other interfaces).
>
>

- Regardless of type, a firewall must be able to perform filtering on both IN and OUT directions.
For instance, consider a firewall acting as IPSec gateway. The traffic comes IN encrypted. Here, you
have the chance to filter traffic based on external tunnel addresses. Then the firewall
decrypts the traffic, and forward it to the Internet. Here you have the opportunity
to filter based on internal packet headers and plain text content.

- IN may be preferred if a specific set of packets can be blocked on both IN and OUT.
All the CPU cycles allocated to forwarding is wasted if you postpone blocking
until packets reach to OUT level. This, for instance, makes firewall less
tolerant to DoS attacks.






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50083B02.6080707>