Interconnect between the restricted-access network and the regular campus network.
General
- ITSO will determine and manage the access policy.
- NIS will operate the in-line equipment.
- All traffic from/to the restricted access network will pass through this border.
- 1Gbps throughput will be good enough for now.
Access Policy
ICMP and other Firewall generic rules
- Inbound ICMP errors SHOULD NOT be filtered by source IP address. RFC-4787 Network Address Translation (NAT) Behavioral Requirements for Unicast UDP,9. ICMP Destination Unreachable Behavior
- Inbound ICMP errors MAY be filtered by stateful match with outbound traffic (e.g. Linux RELATED target).
- Outbound ICMP echo requests SHOULD be permitted to any host for which other outbound traffic is permitted.
- Outbound ICMP echo requests SHOULD be rejected if sent to non-authorized destinations. (admin prohibited)
- Inbound ICMP echo replies SHOULD be permitted from any of the hosts ICMP echoes can be sent to. Stateful firewall may do this automatically.
- TCP connections to unauthorized destinations should be rejected with TCP RST.
Hardware
- IPv4 NAT
- NIS will purchase and specify the IPv4 NAT device.
- NAT device could most likely support IPv4 firewall as well.
- Firewall
- May be the same as IPv4 NAT device.
- To be jointly specified by ITSO and NIS R&D
- How to deal with IPv6
- Cisco?
- Juniper?
- SonicWall?
- StoneSoft? (being tested by ITSO)
- Unix/Linux + iptables/pfsense for IPv6 only?
- http://www.getipv6.info/index.php/IPv6_Firewalls
- IPS/IDS
- specified and purchased by ITSO.
- FireEye
- specified and purchased by ITSO.