09-16-2002 06:59 AM - edited 03-09-2019 12:19 AM
While a reflexive acl theoretically can prevent ack tunneling how would one implement that on the Pix firewalls? Is it more appropriate to apply reflexive acl's on the interior routers?
This question is in regards to the 'newly released Windows 2000 trojan at
09-16-2002 03:14 PM
The PIX firewall stateful packet filtering ensures that a packet received with an ACK will be checked against the existing state table to make sure that the packet is expected. It will check source and destination ip's, port #'s, tcp sequence #'s, and for some applications, the application layer as well.
This capability is implemented automatically on the pix - no additional configuration is required. And no, the pix is the more appropriate place to apply this kind of protection.
HTH
Jeff
09-18-2002 05:47 AM
Please read http://www.ntsecurity.nu/papers/acktunneling/ to understand my concerns.
09-19-2002 01:14 PM
As Jeff explained, this vulnerability does not apply to PIX firewalls. The PIX checks ALL incoming packets to check it vadility. The article refers to those firewall that check to first (SYN bit set) packet only.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide