Access Rules

From Edge Threat Management Wiki - Arista
Revision as of 23:21, 28 July 2015 by Dmorris (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

Filter Rules

Filter rules are kernel-level iptables "filter" rules. There are two sections: Forward Filter Rules and Input Filter Rules.

Filter Rules
Filter Rules


Forward Filter Rules

Forward Filter rules apply to sessions transiting THROUGH the Untangle server. By default this ruleset is blank. Forward Filter Rules are useful for blocking traffic going through the Untangle server.

A forward filter rule
  • Enable Forward Filter Rule
    • If checked, the rule is enabled. If unchecked the rule has no effect and is disabled.
  • IPv6
    • If checked, the filter rule will also be active with IPv6 addressing.
  • Description
    • A description of this rule. This is just for documentation.
  • Conditions
  • Action
    • Block or Pass. Block means the session dropped silently. Pass means the session will be passed.

The rules are evaluated in order on all new sessions going through the Untangle server as described in the Rules documentation. The action from the first matching rule is taken, if no rule matches the session is passed. All passed sessions are still subject to processing in the Apps.

Why use Forward Filter Rules

There are also block/pass rules available in the Firewall app. There are several key differences that determine when its appropriate to use a Forward Filter Rule vs a Firewall Rule.

  • Forward Filter Rules still apply to bypassed traffic. The Firewall doesn't see bypassed traffic. This means if you want to block anything that's bypassed you should use the Forward Filter Rule.
  • Forward Filter Rules apply to all protocol while Firewall only sees TCP and UDP. If you want to block IP protocols other than TCP and UDP, you should use Forward Filter Rules.
  • Firewall Rules have more application-layer conditions available like Client has exceeded Quota and HTTP: Client User OS. If you need the application-layer conditions you should use Firewall.
  • Firewall Rules are evaluated in the Firewall app, so it can be used in policies setup in Policy Manager.

Input Filter Rules

Input Filter rules apply to sessions destined to the Untangle server's local processes and only sessions destined to the Untangle server's local processes. These rules have no effect on sessions passing THROUGH Untangle and are only used to limit and secure access to local services on the Untangle server.

WARNING: Improperly configuring input filter rules can compromise the security and proper functioning of your Untangle server.

WARNING: Disabling rules in the default configuration may interfere with the proper functioning of many features of Untangle.

There are two rules not enabled by default:

  • Allow HTTPS on WANs - enable this rule if you would like HTTPS access externally.
  • Allow SSH - enable this rule if you would like SSH access to Untangle's SSH service.

WARNING: Changing other settings is Input Filter Rules is not recommended.

Input Filter Rules configuration:

  • Enable Input Filter Rule
    • If checked, the rule is enabled. If unchecked the rule has no effect and is disabled.
  • IPv6
    • If checked, the filter rule will also be active with IPv6 addressing.
  • Description
    • A description of this rule. This is just for documentation.
  • Conditions
  • Action
    • Block or Pass. Block means the session dropped silently. Pass means the session will be passed.

The rules are evaluated in order on all new sessions going to the Untangle server as described in the Rules documentation. The action from the first matching rule is taken, if no rule matches the session is passed.