How the LANCOM Firewall inspects data packets

The Firewall filters only those data packets out of the entire data stream running through the IP router of the LANCOM, for which a special treatment has been defined.





The Firewall only checks data packets routed by the IP router of the LANCOM. In general, these are the data packets, which are exchanged between one of the WAN interfaces and the internal networks (LAN, WLAN, DMZ).

For example, the communication between LAN and WLAN is normally not carried out by the router, as long as the LAN bridge allows a direct exchange. Thus the Firewall rules do not apply here. The same applies to the so-called “internal services” of the LANCOM like Telnet, TFTP, SNMP and the web server for the configuration with WEBconfig. The data packets of these services do not run through the router, and therefore aren’t influenced by the Firewall.

Note: Due to the positioning behind the masquerading module (seen from the WAN), the Firewall operates with the “real” internal IP addresses of the LAN stations, and not with the outside known Internet address of the LANCOM.

The LANCOM Firewall uses several lists for checking data packets, which are automatically generated from Firewall rules, resulting Firewall actions or by active data connections:

When a data packet should be routed via the IP router, the Firewall uses the lists as follows:

  1. The first check is, whether the packet was coming from a workstation belonging to the host block list. If the sender is blocked, the packet will be discarded.
  2. If the sender is not blocked in this list, the port block list will be checked, if the used port/protocol combination on the destination PC is closed. In this case the packet will be discarded.
  3. If sender and destination are not blocked in the first two lists, then it will be checked whether a connection entry exists for this packet in the connection list. If such an entry exists, then the packet will be handled as noted in this list.
  4. If no entry has been found for the packet, then the filter list will be searched, whether a suitable entry exists and the action indicated in this list will be carried out. If the action intends to accept the packet, then an entry is made in the connection list, as well as for any further actions.




Note: If no explicit Firewall rule exists for a data packet, the packet will be accepted (’Allow-All’). That grants a backward-compatibility for existing installations. For maximum protection by the Stateful Inspection, please note the section .

The four lists obtain their information as follows:

Thus all lists, which are consulted by the Firewall to check data packets, finally base on the Firewall rules.