Winroute Manual3
Winroute Manual3
User’s
Manual
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 1
B R I E F OV E R V I E W
1 Product Overview . . . . . . . . . . . . . . . . . . . . . . . . . .5
Q U I C K S TA R T
2 Installation
Choosing the computer for installation . . . . . . . . . . . . . . . . . . . 10
System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Installation program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Installed files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
3 Configuration
Quick configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Network interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
RAS interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Configuration examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
REFERENCE GUIDE
4 Security
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Network address translator (NAT) . . . . . . . . . . . . . . . . . . . . . . . .24
How does NAT work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
NAT parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
NAT configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
An example configuration of advanced NAT . . . . . . . . . . . . . . . . . . .27
Port mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
How does port mapping work . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
Port mapping configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
1
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 2
5 DNS Server
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
DNS server in WinRoute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
DNS server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
6 DHCP Server
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
DHCP server in WinRoute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
DHCP server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
Configuration in multi-segment network environment . . . . . . . .50
Example configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50
7 Proxy Server
Proxy overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Proxy server setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54
Configuring proxy clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Access control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Access control - examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58
Cache improvements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
2
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 3
8 Mail Server
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Receiving mail from the Internet . . . . . . . . . . . . . . . . . . . . . . . .62
Download from individual remote POP3 accounts . . . . . . . . . . . . . . .62
Download from domain mailbox . . . . . . . . . . . . . . . . . . . . . . . . . .62
SMTP domain mailing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Sending mail to the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Sending email locally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Configuring email clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Scheduling email exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
Aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
9 Appendices
Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70
Routing in Networks with Multiple Segments . . . . . . . . . . . . . . . . .70
Routing in the Windows Environment . . . . . . . . . . . . . . . . . . . . . .71
Port mapping examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
WWW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
SMTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
CU-SeeMe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
ICQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Using WinRoute with DirecPC . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Example Setting 1 .............. . . . . . . . . . . . . . . . . . . . . .75
Example Setting 2 .............. . . . . . . . . . . . . . . . . . . . . .76
Example Setting 3 .............. . . . . . . . . . . . . . . . . . . . . .77
Configuring TCP to Increase Throughput . . . . . . . . . . . . . . . . . . . . .78
Dividing network into multiple segments . . . . . . . . . . . . . . . . . .78
Keyboard Shortcuts in WinRoute . . . . . . . . . . . . . . . . . . . . . . . . .79
3
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 4
4
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 5
Product
overview
5
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 6
6
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 7
Built-in DHCP
Network management is not a nightmare anymore! WinRoute’s built-in DHCP server take
you out of the problems with internal IP addresses management.
MailServer
You could hardly find mailserver of such a versatility and flexibility like WinRoute has.
Fully SMTP/POP3 compatible with virtually unlimited aliasing oportunities WinRoute’s
mail server is the right choice for all small/medium businesses.
Network Management
Diverting of IP traffic, creating of public and private zones, running several web or email
servers behind a single IP and many more network services are available and so easy to
do like never before.
Firewall
WinRoute includes the best firewall protection you could imagine. WinRoute’ s advan-
ced technology will give you the protection you would expect from much higher priced
solutions.
URL Filter!
Even though the freedom is one of the very basic human rigts WinRoute includes a
powerfull tool how to control a user access to the Internet. You may do it via Firewall
or built-in URL filter.
7
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 8
8
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 9
Installation
9
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 10
System Requirements
Operating System
WinRoute may be installed on computers with the following operating systems:
V Windows NT 4.0 Workstation
V Windows NT 4.0 Server
V Windows 95
V Windows 98
Windows NT 4.0 should have the Service Pack 3 applied.
Hardware
V PC with 486/66 processor or higher
V Memory:
8 MB (16 MB recommended) with Windows 95/98
16 MB (24 MB recommended) with Windows NT
V Ample disk space for proxy-cache
The hardware requirements grow as the number of users grows.
System Software
V TCP/IP protocol
V Telephone connection (RAS) if you use a modem or an ISDN card
10
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 11
Installation Program
To install WinRoute, launch the installation program. You will find the program on the
distribution medium. You may also download it from Internet.
After you start the installation program, you may choose the following:
V ”Destination Directory”
The directory in which WinRoute will be installed.
V ”Install WinRoute as”
This option controls whether the program should be installed as a common appli-
cation or as an application with service support. If you choose the latter, you
will be able to launch WinRoute either as a common application or as a service.
The latter option is only available in Windows NT.
V ”Start service automatically at system startup”
If you install WinRoute as a service, you may have it started automatically
during operating system startup.
V ”Create Program Group”
This option controls whether a program group will be created in Start j Prog-
rams
After the installation is finished, you will be prompted to restart the computer.
11
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 12
Installed Files
The installation creates the following executable files:
In the destination directory:
V WinRoute.exe
V Server.exe
In the system directory:
V wrdrv.sys (if the operating system is Windows NT)
V wrdrv.vxd (if the operating system is Windows 95/98)
Uninstallation
To uninstall the product, use the uninstall program solely. The uninstall program may be
started from the WinRoute group in the menu Start j Programs, or from Control Panels
j Add or Remove programs.
After the uninstallation is over restart the computer in order to deactivate the WinRou-
te network driver.
12
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 13
Configuration
13
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 14
Requirements
V The Remote Access Service (RAS) is installed on the WinRoute computer.
V All the computers within the local area network have TCP/IP installed.
2.Using other DHCP server (for example the one in Windows NT)
If you use othe DHCP server to assign workstations with their IP address you will have
to pefomr following setting at each computer: set the deafault gateway to the compu-
ter where WinRoute is running.
14
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 15
An Example Setting
The figure bellow summarizes the information on configuring TCP/IP in your LAN. The
addresses used in the figure are the ones proposed in the previous paragraphs. The value
"A.B.C.D" is the DNS Server address supplied to you by your ISP. "EL90X1" is the name
of the network interface card of the WinRoute computer.
15
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 16
Product Features
WinRoute has the following features:
V NAT (Network Address Translation)
Allows for accessing the network to the Internet using a single IP address. It also
provides automatic network protection.
V Port mapping
Port mapping provides the access to services which run in the network protected by
NAT.
V Packet filtering
Firewalling based on packet filtering together with NAT provides an ultimate net-
work protection.
V DHCP Server
Provides automatic configuration of the network (IP addresses, network masks, and
others).
V HTTP proxy cache
Provides fast access to web pages visited in the past. WinRoute’s cache includes
revolutionary technology speeding up the access, saving the disk space up to 10x
and preventing the disk from fragmenting.
V Mail server
Features-rich mail server provides the whole network to send and receive email. Rich
aliasing and email-downloading options.
V Simple DNS Server
Serves as a simple DNS server for the local network. It is also capable of DNS query
forwarding and it contains a DNS cache.
Architecture
The figure bellow shows the architecture of WinRoute:
16
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 17
Network Interfaces
In WinRoute, the network interfaces identify the networks that are connected to the
computer which runs WinRoute. Each network interface bears a unique name.
WinRoute works with the following three types of interfaces (categorized according to
the type of network equipment):
V Ethernet (local area network cards)
V RAS (modems, ISDN adapters)
V DirecPC (satellite data delivery card)
To obtain a list of network interfaces which are available on your computer use the follo-
3
wing menu command:
Settings j Interfaces
If you select an interface and push the “Settings” button, a dialog window opens
with pads containing the interface configuration. The following pads may appear:
V ”Nat”
Network address translation setup. Refer to the chapter on network security for
more information.
V ”Ras”
The configuration of remote access lines (RAS type interfaces). The configuration
is described in the next chapter.
V ”DirecPC”
The satellite data delivery interface setup. The configuration of this interface is
described in the appendix.
RAS Interface
RAS (Remote Access Service) interface allows you to connect to the Internet using a
modem or an ISDN adapter. A record from the Telephone network connection must be
associated with each RAS interface. The record describes the connection to your Inter-
net service provider.
17
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 18
18
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 19
Configuration Examples
The following examples show how to set up WinRoute and the computers in the local
area network in the most usual situations.
IP addresses and interface names (EL90X1, NE2000) used in the examples are only illust-
rative. Your actual values will probably be different.
The IP address of DNS server is in the examples substituted with the string “A.B.C.D”.
Replace this string with an actual address using one of these two methods: 3
V Use the IP address of the DNS server of your Internet service provider. DNS queries
will go directly to the DNS server of your ISP.
V Use the IP address of the computer with WinRoute (in our examples, this is
192.168.1.1). In WinRoute, activate its built-in DNS server using the menu “Settings”
j “DNS Server” and enter the IP address of your Internet service provider's DNS ser-
ver in the field “Forward DNS queries to”. The DNS queries will go to computer with
WinRoute which will forward them to the DNS server of your ISP.
Example 1
A local area network connected to the Internet using a telephone line (a modem,
an ISDN adapter).
Example 2
A local area network connected to the Internet through the second network card on
the computer running WinRoute.
19
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 20
Example 3
A local area network connected to the Internet using a cable modem.
Example 4
This example is similar to example 1. The DHCP server is used additionally for setting
network parameters of workstations.
The DHCP server configured in this way assigns the following parameters to the work-
stations:
V IP addresses in the range 192.168.1.10 through 192.168.1.20
V Network mask 255.255.255.0
V Router (gateway) address 192.168.1.1
V DNS server A.B.C.D
20
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 21
Security
21
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 22
Overview
WinRoute provides the following techniques of packet manipulation: (in the network
layer of the OSI model) :
V Network address translation (NAT)
V Port mapping
V Packet filtering
V Anti-spoofing
These techniques may be used to safeguard a local area network against attacks from
the Internet. The Network address translation also allows for connecting a network to
the Internet even if the available number of registered addresses is otherwise insuffici-
ent. An entire network may be for example connected using a single IP address.
The network address translation is a technique which modifies packets sent from the
entire local area network or from its defined part (the requests) so that they look as if
sent from the computer which runs WinRoute (the computer replaces the address in the
packet with its own one). The incoming packets (the answers), are sent back to the com-
puters in the local area network.
Port mapping provides access to selected services protected by NAT.
Packet filtering is a basic security module of each firewall. Using data in packets (like
source and target IP address, the type of network protocol, source and target port, etc.)
it either allows packets to pass trough or blocks them. If a filtering rule applies (depen-
ding on the meaning of the rule), information about the packet is recorded.
Anti-spoofing is an add-on to packet filtering, which protects the local area network
against an attack during which an intruder falsifies source IP addresses.
In order to achieve a high level of security, WinRoute contains an inspection module. It
is a special driver which works between the line and network layers of the OSI model.
The driver uses an original technology which ensures that WinRoute receives packets
directly from the network card driver, that is before any other component of the opera-
ting system.
The location of the WinRoute's inspection module (which checks the contents of packets)
in the network architecture of Windows operating systems is shown in the figure bellow.
22
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 23
Terminology
It would be usefull to get more familiar with some of the terms used in this manual and
in the product especially if you are going to configure packet filtering. It is a must to
know what exactly mean the information contained in packet headers.
TCP/IP protocols
WinRoute is a product which works with TCP/IP networks. The TCP/IP protocols are
designed to work in layers. Speaking about TCP/IP protocols we mean the following pro-
tocols: IP, TCP, UDP, ICMP, and others based on IP.
Network interface
A network interface is a device which connects the computer with other computers by
means of a communication medium. A network interface may be an ethernet card,
modem, ISDN card, etc. The computer sends and receives packets by means of the net-
work interface.
IP address
4
An IP address is a unique 32-bit number, which identifies the computer in IP networks.
The unique IP address is assigned to each computer in the Internet. Each packet pas-
sing across the Internet contains an information about from which address it was sent
(the source IP address) and to which address it should be delivered (the target IP
address).
Network mask
Network mask is used to group IP addresses together. There is a group of addresses
assigned to each network segment. For example, the mask 255.255.255.0 groups toget-
her 254 IP addresses. If we have, for example, a sub-network 194.196.16.0 with mask
255.255.255.0, the addresses we may assign to computers on the sub-network are
194.196.16.1 through 194.196.16.254
Port
A port is a 16-bit number (the allowed range being 1 through 65535) used by the pro-
tocols of the transport layer - the TCP and UDP protocols. Ports are used to address
applications (services) which run on a computer. If there was only a single network
application running on the computer, there would be no need for port numbers and the
IP address only would suffice for addressing services. However, several applications may
run at once on a particular computer and we need to differentiate among them. This is
what port numbers are used for. Thus, a port number may be seemed as an address of
an application within the computer.
Packet
A packet is a basic communication data unit used when transmitting data from one com-
puter to another. Each packet contains a certain amount of data. The maximum length
of a packet depends on the communication medium. As an example, in ethernet net-
23
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 24
works the maximum length is 1500 bytes. In each layer, we may divide the contents of
the packet into two parts: the header part and the data part. The header contains con-
trol information of the particular layer, the data part contains data that belong to the
upper layer. More detailed information on the structure of the packet may be found bel-
low in the section on packet filtering.
When NAT is employed, the local area network does not use registered IP addresses.
Because of this, the internal structure of the network is hidden and not directly acces-
sible from the Internet. An intermediary is needed to access the LAN from the outside
networks. The NAT module is responsible for that. NAT only allows the packets which are
an answer to the initiated communication to enter the protected network since it
remembers all communication initiated from the protected network. Other packets are
blocked.
The connection of an entire network using a single registered IP address is made pos-
sible since the NAT module rewrites the source address in the packets sent from compu-
ters in the local area network with the address of the computer WinRoute is running on.
The connection to the Internet is transparent, which means that the computers in the
local network use WinRoute as their gateway (router). From the point of view of the
local computers it looks as if they were connected to the Internet using registered
addresses. Thus, most applications work with the NAT without the need to setup anyt-
hing on the application's or server's side. This is the main feature which diferentiate NAT
significantly from various proxy servers and application-level gateways. These applicati-
ons - in principle - will never be able to support some protocols.
24
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 25
NAT parameters
Normally applications work with NAT without any problems as long as the communica-
tion is initiated from the protected network. This is the case with most applications.
However, there are applications which are not designed correctly and do not comply with
the client-server model entirely. Such applications may not work through NAT, or some
of their functions may be restricted. The reason is that these applications use more than
one connection and the additional connections are initiated by the server (located
somewhere in the Internet). Naturally enough, NAT blocks such connections.
NAT Configuration
Basic Configuration
In WinRoute, NAT is simply switched on and off using a single option is the network
interface properties. The interface should the outer one, the one which connects the
local area network to the Internet.
NAT may be configured using the menu:
Settings j Interface Table j NAT
V ”Perform NAT with the IP address of this interface on all communication passing
through”
This switches NAT on for the interface. When NAT is on, it is applied to all packets
passing through the interface.
25
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 26
Advanced Settings
NAT advanced settings may be used in case you need to apply NAT to some parts (seg-
ments) of your network and not to the rest of it. You may need this if registered addres-
ses are used in a part of your network and this part is accessible from the Internet, while
the rest of the network uses unregistered (internal) addresses and should not be acces-
sible from the Internet. The advanced NAT is also suitable for creating demilitarized
zones (DMZs) in which the servers accessible from the Internet run.
You may set other IP address that would be used when performing NAT on selected
Interfaces. Then all packets leaving this interface will be assigned that address for
return (this address will be used in “From” field in the header of outgoing packets).
Using this feature your network would look like it would have a different IP address.
The NAT advanced settings are defined with a table of rules. The table is always sear-
ched from its top to bottom. The search ends after a first applicable rule is found. The
rule is applicable if source and target addresses comply with the data set in the rule.
The NAT advanced settings are configured in the menu:
26
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 27
V ”Log Packet”
If the rule is applicable to a packet, packet information is recorded. Logging is sui-
table especially for testing the configuration or finding problems in it.
The first two networks use private IP addresses, so in order to access the Internet, NAT
must be used. The third network uses registered IP addresses. It is directly accessible
from the Internet.
To configure NAT for this situation, first switch NAT on for the interface that leads to
the Internet (line 0). Then, in the Advanced Settings, configure NAT not to be done for
the third network.
27
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 28
Port Mapping
WinRoute performs NAT, which makes the protected network inaccessible from outside.
Using port mapping, it is possible to create communication channels through which ser-
vices inside the network may be accessed. Subsequently it is possible to create public
services like a WWW server or an FTP server, and others.
28
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 29
Packet Filtering
Setting up filtering rules to protect the local area network is important especially if the
local area network uses registered IP addresses and if it is directly accessible from the
Internet. If you use NAT for your entire network, you do not need packet filtering.
The following information is used when setting up the filtering rules for headers of par-
ticular protocols (layers):
29
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 30
30
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 31
31
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 32
Security Policies
The choice of filtering rules depends strongly on the Internet services you wish to make
available for your users. It also depends upon the services in your network that you want
to make accessible from the Internet.
More restrictive rules may cause some Internet services to be inaccessible for your users.
This is the case with applications which need an additional connection to be created
from the Internet, or UDP-based applications. On the other hand, when the rules are
more benevolent, more applications will be functional but the network will get less
secure.
The basic principle for setting up the filtering rules is that you block the access from
the Internet to your network, while you keep the other direction open (the direction
from your network to Internet). Then, according to the services you want to access out-
side and the services you want to offer to the outside world, you tune the the rules.
The most important is the protection of vital services in your network. These services
(eg. file servers, intranet WWW servers, SQL servers) usually listen for connections on
ports with numbers less than 1024. Services with port numbers less than 1024 might
not run on servers only, even user workstation may run such services. This is the case
with file sharing. On the other hand, the port numbers used by client applications are
greater than 1024. Thus the number 1024 is very significant for security policies setup.
Each reasonable policy blocks access from the Internet to ports less than 1024 for both
the TCP and UDP. After that, you may allow services that you want to make accessible
from the Internet. For example, for WWW you allow TCP on port 80.
The more restrictive policy also forbids all incoming UDP packets and also TCP packets
that try to establish a connection from Internet to port numbers greater than 1024. So,
this policy entirely forbids a connection to be established with the protected network
from the Internet, but it allows any communication to be initiated from the protected
network. When this policy is applied, some application may cease to function (entirely
or in part, this depends upon the application). The applications that will have problems
are those which expect that their party will connect from the Internet to port number
greater than 1024. Also applications which use UDP will not work.
Example policies:
When setting up the filtering rules it is important to remember that the rules are sear-
ched in the order they appear in the table and once an applicable rule is found, the
search is stopped.
The following examples show both the more and less restrictive policies you may use
when setting up the rules:
The less restrictive policy:
For incoming packets on the interface connected to Internet we do the following:
V individually allow packets with port number smaller than 1024 for the services that
you want to offer to the outside world
32
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 33
Example:
to allow access to your WWW server, allow TCP packets with target address equal to the
address of your WWW server and target port equal to 80.
33
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 34
The figure shows the configuration of the policy in the packet filter:
If you run a proxy server which does filtering according to URL and you want to make
your users use the proxy instead of a direct connection, use the following:
For outgoing packets on the interface connected to Internet:
V Allow packets from the address of the proxy server with target port equal to 80
V Forbid TCP packets with target port equal to 80.
34
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 35
35
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 36
V ”Only establishing TCP connections” : the rule applies if a packet attempts to cre-
ate a new TCP connection, ie. its SYN flag is on.
V ”Action”
If the rule is applicable to a packet, an action is performed:
Permit - the packet is allowed to enter the protected network
Drop - the packet is discarded
Deny - packet is denied
If the packet is denied, a deny message is sent to the sender of the packet (ie. TCP
reset, or ICMP port unreachable messages).
V ”Log Packet”
If the rule applies to a packet, the information about it is recorded. The recording
is done either to the WinRoute window or to a file
V ”Valid at”
Defines the time interval in which the rule is valid. You may set the rule to be
always valid.
Anti-spoofing
Some network services (e.g. rlogin and NFS) use a security mechanism based on the IP
address of a client. An attacker might beguile this security mechanism using IP spoo-
fing, a technique based on falsification of source IP address. This attack is usually com-
bined with TCP SYN flooding or with source routing. The attacker might endanger the
correct function of the service or even gain unauthorized access to it.
The anti-spoofing test is performed upon the arrival of a packet. It it possible to defi-
ne what IP addresses may appear in packets received by each interface. Packets with
source addresses other than the allowed ones are discarded and optionally information
about the packet is logged.
The method of anti-spoofing setup in WinRoute is as follows:
We define for each interface that the source address of the incoming packets must
belong to the interval of addresses of the directly connected sub-network. If there are
other network segments behind a router, it is necessary to create a named group of
addresses for these segments. Then we may define that only packets from the directly
connected network or from the named address group are allowed.
It is evident that it is impossible to name all addresses that may appear in packets
incoming to the interface connected to the Internet. A packet is allowed to pass
through if its source address does not fall among the addresses allowed for the inter-
faces which lead to the protected network. So any address other than the addresses
accepted by the local area network interfaces is allowed. This ensures that no packets
with a falsified source address (packets which look as if sent from a computer inside
the protected network) are allowed to pass through.
36
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 37
37
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 38
38
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 39
Example:
Group “Sales” does not have access to the “Games” sites during “Business hours”.
Address Groups
Address groups are used when target addresses have to be specified, for example in con-
figuring of packet filtering, advanced NAT configuration, etc.
The advantages of named address groups are:
V One name may represent several networks so it is not necessary to specify each net-
work separately when source/target addresses are entered.
4
V When the configuration of the network is changed (new network segment added,
IP addresses changed, etc.), it suffices to the named group only.
V With complex networks, named groups simplify the setup.
Time Intervals
Time intervals may be used for example to make a filtering rule valid only in certain
periods of time. The interval's name is used to refer to it.
39
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 40
40
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 41
DNS Server
41
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 42
Introduction
Each computer connected to the Internet is identified by unique numeric IP address. In
order to connect to a computer in the Internet, its address must be known to the com-
puter which is creating the connection. Since IP addresses are difficult to remember,
Domain Name Service was created. The DNS is a database of descriptive names which are
easy to remember. Thus the user does not have to know the IP address of the server
she/he wants to communicate with. It suffices to enter the appropriate name (e.g.
www.yahoo.com) and DNS will find the actual IP address.
42
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 43
Note: the cache only stores the answers which are of the “Name j IP address” type.
The answers are stored until they expire. The expiration time is supplied by the DNS ser-
vers together with each answer.
5
43
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 44
44
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 45
DHCP Server
45
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 46
Introduction
In a network, each computer has to have its TCP/IP protocol properly configured. This
means that IP address, network mask, default gateway address, DNS server address, etc.
must be configured on each computer. If the maintainer has to set the parameters
manually on a larger number of workstations, it is difficult to avoid mistakes, eg. using
an address twice - which may cause collisions and consequently also an incorrect func-
tion of the entire network.
To simplify the task, Dynamic Host Configuration Protocol has been created. DHCP is
used for a dynamic configuration of the TCP/IP protocol on computers. During start-up,
the DHCP client computer sends a request. When the DHCP server receives the request,
it chooses TCP/IP configuration parameters for the client. The parameters are IP address,
network mask, default gateway, DNS server address, client's domain name, etc. Using the
parameters, the server creates an answer and sends it to the client. The server may
assign a configuration to the client for a limited time only (lease time). The server
always assigns the IP address so that it does not collide with any other address assig-
ned through DHCP to another client.
With a DHCP server available, it suffices to enable the “Obtain IP address from DHCP server”
option and the DHCP server takes over the responsibility for proper configuration of
TCP/IP on workstations. This may help to significantly lower the network maintenance
and management costs.
46
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 47
In “Scopes”, the ranges of IP addresses to be assigned to clients are displayed. The dia-
log shows the range network addresses and the first and the last address within the
range.
Additional parameters may be configured for each scope. These parameters are shown in
the “Options” area.
The Scopes area always contains “Default Options” - a list of parameters which are assig-
ned to clients if no specific parameter is defined in the scope. To identify whether or
not a parameter is a global one (taken from “Default Options”), an icon is displayed next
to it:
the parameter is specific for the scope
the parameter is taken from “Default Options”
6
The lower part of the dialog windows contains the following buttons:
V “New Scope...”
On pressing this button a new dialog appears in which you may define parameters
of a new scope.
V “Edit...”
Used to edit an existing scope.
V “Remove”
Removes the scope.
47
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 48
V “Address Scope”
Enter the range of IP addresses to be assigned to clients (the fields “From” and
“To”) together with network mask (the field “Mask”). The IP addresses of the range
must belong to the same sub-network.
V “Options”
This shows a list of other configuration parameters to be assigned to stations wit-
hin the particular scope. If a parameter is not entered (the “Specify option” box is
not checked), a value from Default Options is used instead. The following parame-
ters may be used:
V “Default Gateway”
The default gateway address. The gateway facilitates communication with stations
in other sub-networks.
V “DNS Server”
IP address of DNS server.
V “Domain Name”
You may enter the name of your domain (if you have a registered domain).
V “Lease Time”
The time for which the client may use the configuration data. After this interval,
the configuration expires and the client must request new TCP/IP parameters from
the DHCP server.
V “WINS Server”
The address of WINS server, which is used to distribute information about shared
network resources in Microsoft networks.
In each scope, you may reserve particular IP addresses for some computers using the
“Add Lease...” button.
48
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 49
V “IP address”
The IP address you want to reserve.
V “Reserved for”
Here you may choose how to identify the computer for which the address is reser-
ved:
V “Hardware address”
The computer is identified by its ethernet hardware address. The address should be
entered in the “Value” field as six bytes with a dash in between each two of them.
(e.g. 00-60-08-5f-75-b9)
V “Computer name”
The computer is identified by its name, which is set in MS Windows network con-
figuration.
6
“Advanced...” button
This is used to configure the DHCP server to also answer the requests sent using the
BOOTP protocol. BOOTP is an older protocol used for TCP/IP configuration. You should
switch this function on if you have some client computers which use BOOTP.
A list of addresses assigned to particular clients by DHCP may be obtained by right-click-
ing in the WinRoute main logging window and choosing Show j Leased IPs from the
menu. Alternatively, you may press the CTRL+SHIFT+L key combination.
49
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 50
Configuration in Multi-segment
Network Environment
To use the DHCP server in a network with multiple segments you need to configure your
network gateways so that they forward DHCP requests to the segment to which the DHCP
server is connected. Sample configurations for several types of routers are shown bellow:
Windows NT
If you use a Windows NT server as a router (gateway), you need to install “DHCP Relay
Agent” service on it. Then, go to the TCP/IP configuration of the server, switch to the
DHCP Relay pad and fill in the IP address of the DHCP server to which the DHCP requ-
ests should be forwarded (that is, you should enter the IP address of the computer on
which WinRoute runs).
Novell Netware
If you use a Netware server as a router, you need to load the BOOTPFWD.NLM module on
it. The module will take care of forwarding both the DHCP and BOOTP requests. The com-
mand to be used is:
load bootpfwd.nlm <DHCP server address>
Again, the IP address of the DHCP server is the IP address of the computer which runs
WinRoute.
Example Configuration
The following figure shows an example configuration of the DHCP server:
In the example, two scopes are defined. The first in defined for network 192.168.1.0,
the second for network 192.168.2.0. The first scope assigns addresses 192.168.1.10
through 192.168.1.20, the second one assigns addresses 192.168.2.80 through
192.168.2.90.
50
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 51
51
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 52
52
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 53
Proxy Server
53
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 54
Proxy Overview
Proxy Cache
WWW Internet Proxy service functions: The proxy server collects data from the Internet
and passes it to the requesting browsers on the local network. This data is also stored
in a cache. If the same information is required again, the information is retrieved from
the cache. Since the cache is on the local network the retrieval is performed at local
network rates, much more quickly than re-accessing the Internet.
Generally, the cache speeds Internet access because it temporarily stores the pages
already visited and allows the fast local access to them. Then the Internet access is nee-
ded to retrieve only unvisited data. The effect is an increased performance with no
change in communication resources.
Access Control
The Proxy server may be used to control access to WWW Service resources. For example,
you may limit access of specific users to particular Internet web sites.
Restrictions may be applied to individual users, groups of users or particular URL's.
54
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 55
55
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 56
Access
Advanced Properties
V Parent Proxy
DNS name or IP address and port number of a parent proxy server, if one exists.
When set, all requests will be forwarded.
56
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 57
Netscape Communicator
Select the menu items: Edit j Preferences j Advanced j Proxies
Choose Manual Proxy Configuration
Push [View...] button
Enter the WinRoute IP address and port number for the HTTP, FTP and GOPHER fields.
The default port number is 3128.
7
MS Internet Explorer 3.0
Select the menu items: View j Options j Connections
For the Windows 95 version, press the Proxy button
Enable the check box for Use the same proxy for all protocols.
Enter the WinRoute IP address and port number in the provided fields.
57
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 58
Access Control
Access Control allows you to limit a user's WWW Server access rights.
Browser Notice:
Some browsers do not support the authentication function required for restricted URL
access. These browsers will not be able to access any restricted URL; however, other
URLs will not be affected. The Proxy Authentication function is supported by Netscape
Navigator 3.0, MSIE 3.0 and all later versions.
Please be advised: A user will be prompted for authentication only once during each
browser session. Thereafter, the browser will automatically provide the user name and
password when required. This is known as authentication caching. To clear the authen-
tication cache the user must terminate the browser session.
58
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 59
Cache Improvements
This section describes improvements of HTTP-Cache in WinRoute. The main difference is
the method of storing data in the disk cache. Unlike the other proxy servers with
caching functionality (including Microsoft Proxy and Netscape Proxy server) the new ver-
sion stores cached data in one fixed-length file instead of using a single file for each
object. The cache file is organized in a FAT-like fashion with allocation unit of 1024
bytes. This significantly saves the disk space occupied by the cache. For better under-
standing, see the following table which shows a typical distribution of objects in the
cache:
size number % of
in kB of objects ..total objects..
1 5738 17.57
2 5626 17.23
3 4804 14.71
4 3254 9.96
5 2615 8.01
6 1975 6.05
7 1303 3.99
8 962 2.95
9 877 2.69
10 660 2.02
11 596 1.83
12 485 1.49
13 417 1.28
14 298 0.91 Cache size: 150 MB
You may see from the table that 50% of all objects in the cache are smaller than 6 kB.
The reason for this is that WWW usually consists of many small objects (html pages, inli-
ne images, ...). Storing each object in a single file significantly wastes the disk space
on nearly every filesystem.
The following calculation assumes the worst case: large disc formatted with 16-bit FAT
table. In this case, the size of allocation unit (cluster) is 32kB.
The actual size allocated on disk by file-oriented cache is: 7
32 * (5738 + 5626 + 4804 + 3254 + 2615 + 1975 + 1303) = 32 * 25315 = 810080 kB = 791 MB
The actual size allocated in WinRoute cache is:
5738 + 2*5626 + 3*4804 + 4*3254 + 5*2615 + 6*1975 + 7*1303 = 78464 kB = 76 MB
The WinRoute cache needs 10.4 times smaller disk space for storing the cached objects.
59
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 60
60
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 61
Mail Server
61
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 62
Overview
WinRoute Mail server may be used as a mail gateway between a local network and the
Internet. It collects mail sent by the users in the local network and incoming mail from
the Internet. Then, mail intended for the Internet is sent to the Internet and mail for
local users is delivered to their mailboxes.
If the local network is connected to the Internet through a dial-up line, it is possible
to schedule send and receive time for Internet mail.
Users in the local network may use any SMTP/POP3 capable client (MS Internet Mail,
Netscape Mail client, MS Exchange, Eudora, Pegasus mail, et.al..) to connect to Win-
Route Mail server.
Mail server is configured through “Mail Server” dialog box from menu “Settings, Mail Server”.
62
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 63
For each action you may select from the following conditions:
V “Allow to dial”
8
Allow demand dialing if needed to establish an Internet connection.
V “Every – At”
The periodic rate or specific time to execute the action.
63
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 64
V “Valid on”
The weekdays on which the action may execute.
V “Valid at time interval”
You can choose time interval defined in menu ”Settings j Advanced-Time” intervals.
For example, it is possible to valid e-mail exchange only in working hours.
Note: You may manually invoke the Mail Server exchange via the Web Interface. Brow-
se the Manual page, then click on the [Send and Receive] button.
Aliases
Aliases may be used to create users' aliases and to redirect/forward email.
Aliases are processed when following situations occur:
V email is received through SMTP (from user's mail client or from the Internet)
V before email downloaded from remote POP3 account is delivered to a mailbox
Aliases may be set in “Aliases” sheet.
Examples
Download from individual remote POP3 accounts
Each user has an account at ISP. For outgoing mail is used ISP's mail server mailserver.
provider.com.
In this case, users' e-mail addresses should be entered into Aliases, as shown bellow.
This is useful when local users send emails to each other. Without appropriate alias set-
tings, WinRoute mail server would not recognize that the email is for local user and
would send it to the Internet to be downloaded back from remote POP3 acccount.
64
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 65
65
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 66
66
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 67
In case the local network is using NAT (Network Address Translation) it in necessary to
create a port mapping for SMTP protocol. (menu Settings j Advanced j Mapped ports).
67
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 68
68
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 69
Appendices 9
69
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 70
Routing
Routing is a process that instructs the packet of the route it must take on its way from
sender to receiver.
For the purposes of routing, computers may be divided into two groups.
V Workstations
Workstations usually have a single network adapter and they do not forward packets
from one interface to another. They keep a routing table, but they only use it when sen-
ding their own packets. The routing table usually contains a default router (gateway)
entry. There is a direct route from the workstation to the default router.
V Routers (Gateways)
Gateways have more than one network adapter (interface). By means of the interfaces,
the gateway is connected to two or more networks. When a packet arrives at an inter-
face, the gateway must decide to which of the remaining interfaces the packet should
be sent. The appropriate interface is chosen according to the packet's target IP address
and the gateway's routing table.
70
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 71
V On the router 192.168.1.100, the default route must lead to the computer with Win-
Route, i.e. 192.168.1.1.
When deciding to which interface a packet should be sent, the following algorithm
applies:
The records in the routing table are searched for a record in which the network field
matches with the target IP address in the packet (with the network mask applied). If
several matching records are found, the record with the most selective mask is chosen.
If there are two or more such records, we choose the one with the smallest metric.
The packet is sent to the interface indicated in the record. If the target computer is not
in the network directly connected to the interface, the packet is sent to the gateway
named in the record.
The record with zero network address and zero mask has a special meaning. It denotes
the default route. The record indicates where to send a packet if no other appropriate
record has been found.
9
71
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 72
We may categorize the records in the routing table according to their origin:
V Direct
Direct routes are added to the table using the IP address and mask assigned to indi-
vidual interfaces on the router. They identify a directly accessible networks.
V Persistent
Persistent routes identify networks which are not directly connected to the interfaces
of the router. These routes are configured by router's maintainer and are set during
operating system start-up.
V Temporary
Temporary routes are entered by the user or are learned by means of a routing proto-
col. They are lost if the system is switched off.
WWW
Let us suppose you run a WEB server in your private network (the address of the server
being 192.168.1.10) and you wish to allow the users in the Internet to access the server.
You have to create a mapped port in the following manner:
Protocol: TCP
Listen IP: <unspecified>
Listen Port: 80
Destination IP: enter the IP address of the WEB server (192.168.1.10 in our case)
Destination Port: 80
72
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 73
PPTP
If you run a Point to Point Tunneling Protocol server in your LAN and want to allow users
from Internet to connect to your server via PPTP, you have to create two mapped ports:
1. For the control connection:
Protocol: TCP
Listen IP: <unspecified>
Listen Port: 1723
Destination IP: IP address of your PPTP server
Destination Port: 1723
2. For the GRE (PPTP) packets:
Protocol: PPTP
Listen IP: <unspecified>
Destination IP: again, the IP address of your PPTP server
CU-SeeMe
If you only call other users by means of CU-SeeMe, you should have no problems. If also
want to receive CU-SeeMe calls from users outside your network, you must create the
following mapped ports:
Protocol: UDP
Listen IP: <unspecified>
Listen Port: 7648
Destination IP: the IP address of the workstation that runs the CU-SeeMe client
Destination Port: 7648
Protocol: UDP
Listen IP: <unspecified>
Listen Port: 7649
Destination IP: the IP address of the workstation that runs the CU-SeeMe client
Destination Port: 7649
Limitations:
At present, it is not possible to run more that one CU-SeeMe client on one local area
network (naturally, this is not true if you use routing)
it is not possible to connect to a “reflector” protected by password.
9
73
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 74
ICQ
You may connect to ICQ server and communicate with other ICQ users (ie. send messa-
ges, create a chat connection, or send files) without having to create mapped ports. If
you wish to receive calls from other ICQ users, you have to create the following entry
in the table of mapped ports:
Protocol: TCP
Listen IP: <unspecified>
Listen Port: 5000 – 5011
Destination IP: IP address of the workstation that runs the ICQ client
Destination Port: 5000 – 5011
Then do the following: In ICQ “Preferences” choose “Connection”, “I'm using a perma-
nent internet connection (LAN)”, “I'm behind a firewall or proxy”. In “Firewall Settings”
choose “I don't use a SOCKS Proxy server...”, press the “Next” button, choose “Use the
following TCP listen ports for incoming event” and enter the range 5000 through 5011. If
you wish to run several ICQ clients in your LAN (and these clients need to accept calls
from other ICQ users), you have to create an entry in the mapped ports table for each
additional client and assign a port range to it (e.g. 5012 - 5023). You also have to con-
figure each ICQ client accordingly.
74
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 75
Example Setting 1
The figure bellow shows a network configuration when the first method is used (outgo-
ing packets are sent to the Internet using the DirecPC Navigator).
9
75
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 76
Example Setting 2
The figure bellow shows a network configuration when the second method is used. The
outgoing packets are sent via RAS interface (the device is a modem or an ISDN adapter).
In the TCP/IP settings of the RAS entry, the “Use default gateway of remote network”
must not be selected, otherwise all traffic will be routed to the RAS interface and
DirecPC will not be used!
76
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 77
9
77
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 78
In Windows NT:
Add (if it exists, edit it) an entry named “TcpWindowSize” (it is of type DWORD) in
registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters.
Set its value to 0xBB80.
In Windows 95:
Add (if it exists, edit it) an entry named “DefaultRcvWindow” (it is of type string) in
registry HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP.
Set its value to “0xBB80”.
Without NAT
The network still uses registered IP addresses, but is divided into segments with the
mask 255.255.255.224. The router is connected to segment 194.196.16.32, while the
local area network is segment 194.196.16.0. The computer which runs WinRoute uses
two network cards and is connected to both segments.
With NAT
The network is divided into two segments. One of them is public and uses registered IP
addresses, while the other one uses address out of a private address block. NAT is used
when accessing Internet from the private segment. The computer which runs WinRoute
uses two network cards and is connected to both segments.
78
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 79
Literature
Windows NT Server Resource Kit, Microsoft Press,
TCP/IP Network Administration, Graig Hunt, O´Reilly, 1992
Building Internet Firewalls, D. Brent Chapman, Elizabeth D. Zwiky, O´Reilly, 1995.
9
79
WinRoute manual.qxd 10.3.1998 20:41 StrÆnka 80