Setting up the DMZ - firewall rules
The firewall rules we used for our webApp.secure environment are detailed here.
The firewall rules were structured in the following three areas:
- Incoming traffic
- Forwarding
- Outgoing traffic
Firewall 2
The rules we used for firewall
2 were:
- Incoming traffic
- Stop all incoming traffic
- Allow SSH session to firewall 2
- Allow ICMP traffic to firewall 2
- Allow all related and established traffic for firewall 2
- Forwarding traffic
- Stop all forwarding traffic
- Allow forwarding of TCP traffic on IP interface 10.10.60.0 (client) port 80 (HTTP) and port 443 (HTTPS) to go to 192.168.40.95 (webApp.secure)
- Allow forwarding of ICMP traffic
- Allow forwarding of all related and established traffic
- Outgoing traffic
- Allow output traffic for ICMP
Note: Rules 2, 3, 7, and 9a are for maintenance only and would probably
not be implemented in a production environment.
Firewall 1
The rules we used for firewall
1 were:
- Incoming traffic
- Stop all incoming traffic
- Allow SSH session to firewall 1
- Allow ICMP traffic to firewall 1
- Allow all related and established traffic for firewall 1
- Forwarding traffic
- Stop all forwarding traffic
- Allow forwarding of TCP traffic on interface 192.168.40.0 (guest LAN) to go to 10.10.50.110 (HiperSockets™ to z/OS®)
- Allow forwarding of ICMP traffic
- Allow forwarding of all related and established traffic
- Outgoing traffic
- Allow output traffic for ICMP
Note: Rules 2, 3, 7, and 9a are for maintenance only and would probably
not be implemented in a production environment.