Hi Group,
Any thoughts on this?
I think some of the Firewall rules that Wireshark composes are  
strange. Wireshark sometimes makes assumptions about what you're  
doing with the rules that don't agree with how most people would  
think about the problem?
For example, a device is using Nessus to scan my network. The goal is  
to use Wireshark to build a Netfilter firewall rule to deny all  
inbound traffic on the eth0 interface from the scanning device. The  
scanning device is 192.168.1.141.
I know Netfilter (iptables) reasonably well. I've also checked with  
other iptables users and they agree with me that the rule should be:
iptables -A INPUT -i eth0 -s 192.168.1.141/32 -j DROP
Wireshark composes this rule:
iptables -A INPUT -i eth0 -d 192.168.1.141/32 -j DROP
That can't be right unless what you're trying to block is traffic  
back to the scanner and eth 0 is on the side of the possible responder.
By the way, for comparison's sake, Wireshark gets it right for other  
types of firewalls. It says a Cisco standard ACL (which is based on  
source addr only) is this:
access-list NUMBER deny host 192.168.1.141
For Cisco extended, where source address comes first, it also gets it  
right:
access-list NUMBER deny ip host 192.168.1.141 any
For ipfw, it gets it right:
add deny ip from 192.168.1.141 to any in
Also, iptables is good for this related situation where we want to  
block the scanner specifically from sending to ports 0 and 443. These  
rules are right:
iptables -A INPUT -p tcp --destination-port 0 -j DROP
and
iptables -A INPUT -p tcp --destination-port 443 -j DROP
But it gets squirrelly again if you include port numbers with Cisco  
extended ACLs, for what it's worth.
Thanks for any insights!
__________________
Priscilla Oppenheimer
http://www.priscilla.com
"If the brain is a computer, then it is the only one that runs on  
glucose, generates 10 watts of electricity, and is manufactured by  
unskilled labor." -- David Lewis