Filters can permit or deny virtually any kind of traffic – up to a point. Here are some basic dos and don’ts for filter usage.Filters can permit or deny virtually any kind of traffic – up to a point. Here are some basic dos and don’ts for filter usage:• Do prevent address spoofing at the edge of a company’s network. At minimum, routers at the edge of a company should block inbound traffic with source IP addresses claiming to be from internal networks. Similarly, the source IP address of any outbound packet should only be from an internal network.• Do prevent bogus routes. Some IP addresses should never be seen on the Internet. These include not only the private addresses specified in RFC 1918 but also those networks designated as reserved by the Internet Assigned Numbers Authority (IANA) (see here and here). IANA-reserved routes, known as bogons, change over time, so it’s a good idea to keep current on which networks to block. One good source is the bogon-announce mailing list. Details, a filtering FAQ and links to other filtering information are available on the Web (see here). • Do block unwanted applications. An easy method for stopping unwanted traffic is simply to filter on the well-known protocol and/or port numbers that a given application uses. For example, a router could block outbound telnet sessions by dropping any packet with destination TCP Port 23. The major caveat with this technique is that it does not protect against rogue applications that change port numbers, for example by sending peer-to-peer traffic over Port 80 (which is reserved for Web traffic).• Do track usage: How many times did users visit a given network? How much bandwidth did a given application consume? Most routers’ filters can be set to answer these questions by logging the number of times a filter was invoked. In the case of Cisco’s access lists, enabling logging is simple: Just append the word “log” at the end of the filtering conditions. Some other devices, such as those from Enterasys Networks and Tasman, automatically log by default. • Do lighten the load. Our test results and Cisco documentation agree: Packet filtering can impose several performance penalties on Cisco routers. One strategy that considerably reduces CPU utilization is to use routing instead of filtering. For example, it’s possible to route traffic to or from unwanted addresses to the null0 interface.• Do pay attention to order. Routers process filters in order. For every packet that comes in, a router checks the packet against its first filter, its second filter and so on until it finds a match. If the first rule in an access control list (ACL) is to deny all traffic, the router won’t forward any packets. It’s a good practice to end an ACL with a deny-all filter, but be sure it’s preceded by filters that explicitly allow traffic that should be permitted.• Don’t forget about routing. As soon as a single filter is invoked, many routers automatically will block traffic unless it is expressly permitted. A common error when configuring ACLs is to omit filters that permit routing traffic to pass.• Don’t use routers in place of firewalls. Packet filters block access, but that’s where the similarities to firewalls end. As a network-layer device, a router can’t track state on transport- or application-layer sessions, both critical requirements of a firewall. Packet filtering offers some security (and it’s certainly better than nothing), but it won’t prevent an attacker from mounting many attacks a firewall could stop. Back to main review: “Filters on routers: The price of performance” Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe