netspoc-1.7
Fixed bugs:
- ACLs for secondary packet filter were too permissive
for rules having an interface of a full packet filter as source or destination.
netspoc-1.6
New features:
- Introduced policies: A policy is a named group of related rules, which
all refer to the same network objects in their source or
destination.
- The functionality of NetSPoC is available as a perl module now.
netspoc-1.5
New features:
- Topology allows simple loops now which must be neither nested nor
adjacent.
- Secondary packet filters are introduced, which have much shorter
access lists for traffic which is already filtered by a full packet
filter.
- New option $auto_default_route to optimize the number of routing
entries per router.
- Attribute 'routing=OSPF' for interfaces: disables generation of
static routes and generates access lists which automatically permit
OSPF packets.
- NetSPoC warns if different interfaces have an identical IP address.
Fixed bugs:
- Routing entries were missing for traffic back from dst to src if
there was no other rule which allowed traffic from dst to src.
- It was possible to link an 'any' object to an undefined router object.
- Script 'newpolicy' now uses 'update -d'.
Other:
- Option $strict_subnets now may have values 0, 'warn' or 1.
netspoc-1.4
Fixed bugs:
- Some valid configuration was rejected for certain combinations of
services with port ranges.
- Some traffic was rejected even if the traffic was explicitly
allowed by another rule. See examples/auto-any-deny for an example.
netspoc-1.3
Language:
- Source port may be specified for tcp and udp services
Other:
- Changed code generation for stateless IOS routers:
Answer packets for tcp and udp connections are no longer restricted to
ports > 1023 for two reasons:
- This didn't work for services like IKE with source port < 1024.
- It was too difficult to handle correctly during optimization.
netspoc-1.2
New features:
- Preliminary support for stateless Cisco IOS routers
(without Firewall Feature Set)
This is untested until now.
- Interfaces of managed IOS routers are automatically protected from
unwanted access. Permitting access to a network which is directly
attached to the interface of an managed router, no longer implicitly
gives access to the interface. If desired, access to an interface has
to be stated explicitly by a rule. (This feature isn't implemented for
PIX firewalls, because they protect themselves.)
Language:
- Switched names for Cisco IOS routers:
- 'IOS' is used now for stateless IOS routers,
- 'IOS_FW' is used for stateful IOS routers.
Fixed bugs:
- Routing to unnumbered networks now works
- Hosts aren't allowed any longer in unnumbered networks
- Unnumbered networks must be connected to at most two interfaces
- Script 'newpolicy': home directory; quotes in messages
Other:
- added some small examples
netspoc-1.1
Optimization:
- Hosts with successive IP addresses are converted to ranges.
- Duplicate ACL entries are no longer generated for rules with an 'any'
object as src or dst
Language:
- Overlapping networks are rejected unless this relation is declared
explicitly using new attributes 'route_hint' or 'subnet_of'.
This may be useful for a large topology, where a network may easily be
redefined by mistake.
Use option 'strict_subnets' to (de)active this new behavior.
Other:
- Warning messages are shown for unused groups and servicegroups.
This may be switched off using option 'warn_unused_groups'.
- NetSPoC doesn't accept rules with an 'any' object both as src and dst
any longer.
Fixed bugs:
- pix security levels: all interfaces except inside and outside got
level 1.
- For rules with an 'any' object as dst, too few deny rules for
intermediate networks were generated in some cases.
- Routing entries were generated for disabled networks in some cases.
netspoc-1.0
Initial public release.