Using TrafMeter as firewall
Although TrafMeter, promoted as traffic monitoring software, is
typically used in conjunction with a separate firewall, it has the capability to deny
network packets, because it was built on a firewall engine.
Let's consider a typical case for building a firewall solution, using
TrafMeter. For example, we have an office network whose gateway runs
Windows Server 2003, with Routing enabled and Remote Access Service (RRAS) playing
the NAT-router role. What packets should be denied to defend the gateway
against hackers? A solution would be to restrict access to all network
services, on the gateway, from any untrusted networks.
Incoming TCP-connections
According to the TCP protocol, the client initiates a connection with the server and sends the first TCP packet with the SYN flag. To restrict incoming TCP connections, it is necessary to create a rule which blocks TCP packets with a SYN flag from an untrusted network. This will defend all network services on the gateway, based on the TCP protocol.
Incoming UDP-connections
The UDP protocol is designed as connectionless, thus causing problems trying to detect the client and server sides, via packet header analysis. As rule, network services, based on the UDP protocol, use ports ranging from 1 to 1024. If you deny UDP packets where the destination address is the same as the gateway, and the destination port is in the range of 1 to 1024, this will restrict most of the incoming UDP connections. If any services use ports over 1024, you should create additional rules to handle them.
ICMP-packets
Typically, ICMP packets don't carry the same risks for intrusion, however, most firewalls like to block incoming ICMP echo request packets to prevent detecting the gateway by network scanners. TrafMeter can extract and deny ICMP echo request packets, when required.
Summary
In order to use TrafMeter as a firewall, the creation of a single filter (must be the first in the filterset) is required, using the following rules:
Filter 1. firewall | ||||||||
N | Type of IP protocol |
Source address |
Source port |
Destination address |
Destination port |
Both directions |
Action | Additional options or conditions |
1 | TCP | IP addresses of WAN | Any | My computer | Any | No | Deny | SYN |
2 | UDP | IP addresses of WAN | Any | My computer | 1-1024 | Yes | Deny | |
3 | ICMP | IP addresses of WAN | My computer | No | Deny | Echo request |
Note