30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 8<br />

Firewall and Intrusion Prevention System<br />

8.1 Network intrusion prevention system (IPS)<br />

<strong>Kerio</strong> Control integrates Snort, an intrusion detection and prevention system (IDS/IPS)<br />

protecting the firewall and the local network from known network intrusions. In <strong>Kerio</strong> Control,<br />

the system name is simplified for Intrusion Prevention (the name includes meaning of<br />

both functions — no prevention measures can be taken without detection).<br />

What the intrusion prevention system is for and how it works<br />

Network intrusion is undesirable network traffic impacting on functionality or security of the<br />

victim-host. Its purpose is mostly to get illegitimate access or/and to exploit fragile data.<br />

A typical attribute of such intrusions is their apparent legitimacy and it is difficult to uncover<br />

such traffic and filter it simply out by traffic rules. Let us use DoS intrusion (Denial of Service)<br />

as an example. In this type of intrusion, too many connections are established on a port to use<br />

up the system resources of the server application so that no other users can connect there.<br />

However, the firewall considers this act only as an access to an allowed port.<br />

Therefore, sophisticated analysis of network traffic is needed here to detect network<br />

intrusions. Network intrusion detection systems use databases of known intrusions (this is<br />

similar to antivirus programs using databases of known viruses). Thanks to regular update of<br />

the database, new intrusion types are also recognized.<br />

In the current version of <strong>Kerio</strong> Control, the intrusion prevention system works on all network<br />

interfaces included in the Internet interfaces group (see chapter 5). This implies that it detects<br />

and blocks network intrusions coming from the Internet, not from hosts in local networks or<br />

VPN clients (these hosts are considered as trusted).<br />

For correct functionality of the intrusion prevention system, use of NAT is required (for details<br />

on NAT, see chapter 7.3). It can therefore be used for all typical configurations where <strong>Kerio</strong><br />

Control is used for protection of local network. If <strong>Kerio</strong> Control is implemented as so called<br />

neutral router (without IP address translation), the intrusion prevention system will not work<br />

correctly.<br />

Intrusion detection is performed before application of traffic rules (see chapter 7) which avoids<br />

intervention of traffic rules with the detection process.<br />

112

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!