Date: Fri, 19 Feb 1999 08:43:18 -0600 From: "Thomas T. Veldhouse" <veldy@visi.com> To: "Brian Budnick" <clubkid@bzzzz.com>, <freebsd-questions@FreeBSD.ORG> Subject: Re: Simple FIREWALL Message-ID: <004301be5c16$31130ac0$236319ac@w142844.carlson.com>
next in thread | raw e-mail | index | archive | help
You also need to enable NATD and use the interface for the outside world, ed1 as you NATD interface. I usually totally destroy /etc/rc.firewall and rewrite it to my own needs. I recommend you also put IPFIREWALL_VERBOSE in your kernel and add logging to you firewall so that you can see the IP of rule breakers on your console. I have caught a few people trying to break into my system, and my IP is dyanmic via a cable modem (one-way). Tom Veldhouse veldy@visi.com -----Original Message----- From: Brian Budnick <clubkid@bzzzz.com> To: freebsd-questions@FreeBSD.ORG <freebsd-questions@FreeBSD.ORG> Date: Friday, February 19, 1999 12:14 AM Subject: Simple FIREWALL > >I am running FreeBSD 3.1-RELEASE on a K6/166 that has 2 ethernet cards in >it. The ethernet cards are setup as follows: > >ed1: ip: 209.90.111.199 netmask: 255.255.255.192 >pn0: ip: 10.0.0.1 netmask: 255.255.255.0 > >I'm trying to get a simple firewall up to protect several computers on our >network. I want it so that whenever we access the web from like 10.0.0.2 >it goes thru 10.0.0.1 and then that machine will be the gateway to the >Internet. I want to be able to have access to Telnet/FTP/WWW/IRC from >the 10.0.0.2 machines, etc. > >I did the following to the server 209.90.111.199 to get it to work: > >/etc/defaults/rc.conf (looks as follows): > ><snip> > >### Network routing options: ### >defaultrouter="NO" # Set to default gateway (or NO). >static_routes="" # Set to static route list (or leaveempty). >gateway_enable="YES" # Set to YES if this host will be agateway. >router_enable="NO" # Set to YES to enable a routing daemon. >router="routed" # Name of routing daemon to use ifenabled. >router_flags="-q" # Flags for routing daemon. >mrouted_enable="NO" # Do multicast routing (see/etc/mrouted.conf). >mrouted_flags="" # Flags for multicast routing daemon. >ipxgateway_enable="NO" # Set to YES to enable IPX routing. >ipxrouted_enable="NO" # Set to YES to run the IPX routingdaemon. >ipxrouted_flags="" # Flags for IPX routing daemon. >arpproxy_all="" # replaces obsolete kernel optionARP_PROXYALL. >forward_sourceroute="NO" # do source routing (only ifgateway_enable is set to "YES") >accept_sourceroute="NO" # accept source routed packets to us > ><snip> > >hostname="myname.my.domain" # Set this! >nisdomainname="NO" # Set to NIS domain if using NIS (or NO). >firewall_enable="YES" # Set to YES to enable firewall functionality >firewall_type="simple" # Firewall type (see /etc/rc.firewall) >firewall_quiet="NO" # Set to YES to suppress rule display >natd_enable="NO" # Enable natd (if firewall_enable == YES). >natd_interface="fxp0" # Public interface to use with natd. >natd_flags="" # Additional flags for natd. >tcp_extensions="NO" # Disallow RFC1323 extensions (or YES). >network_interfaces="lo0" # List of network interfaces (lo0 is loopback). >ifconfig_lo0="inet 127.0.0.1" # default loopback device configuration. > >--- > >in my /etc/rc.firewall (under the simple section my configuration reads): > ># set these to your outside interface network and netmask and ip > oif="ed1" > onet="209.90.111.199/24" > omask="255.255.255.192" > oip="209.90.111.199" > > # set these to your inside interface network and netmask and ip > iif="pn0" > inet="10.0.0.1/24" > imask="255.255.255.0" > iip="10.0.0.1" > > # Stop spoofing > $fwcmd add deny all from ${inet}:${imask} to any in via ${oif} > $fwcmd add deny all from ${onet}:${omask} to any in via ${iif} > > # Stop RFC1918 nets on the outside interface > $fwcmd add deny all from 192.168.0.0:255.255.0.0 to any via ${oif} out > $fwcmd add deny all from any to 192.168.0.0:255.255.0.0 via ${oif} > $fwcmd add deny all from 172.16.0.0:255.240.0.0 to any via ${oif} > $fwcmd add deny all from any to 172.16.0.0:255.240.0.0 via ${oif} > $fwcmd add deny all from 10.0.0.0:255.0.0.0 to any via ${oif} > $fwcmd add deny all from any to 10.0.0.0:255.0.0.0 via ${oif} > > # Allow TCP through if setup succeeded > # $fwcmd add pass tcp from any to any established > $fwcmd add pass all from any to any > > # allow IDENT for IRC > $fwcmd add allow tcp from any to ${oif} 113 > $fwcmd add allow udp from any to ${oif} 113 > > # Allow setup of incoming email > $fwcmd add pass tcp from any to ${oip} 25 setup > > # Allow access to our DNS > $fwcmd add pass tcp from any to ${oip} 53 setup > > # Allow access to our WWW > $fwcmd add pass tcp from any to ${oip} 80 setup > > # Reject&Log all setup of incoming connections from the outside > #$fwcmd add deny log tcp from any to any in via ${oif} setup > > # Allow setup of any other TCP connection > $fwcmd add pass tcp from any to any setup > > # Allow DNS queries out in the world > $fwcmd add pass udp from any 53 to ${oip} > $fwcmd add pass udp from ${oip} to any 53 > > # Allow NTP queries out in the world > $fwcmd add pass udp from any 123 to ${oip} > $fwcmd add pass udp from ${oip} to any 123 > > # Everything else is denied as default. > >elif [ "${firewall_type}" != "UNKNOWN" -a -r "${firewall_type}" ]; then > $fwcmd ${firewall_type} >fi > >--- > >On Bootup when it displays the rulesets it seems to have a problem with >one of them but i'm not sure which one. > >i know this message is kind of long but i'm really wanting to get this to >work and would appreciate anyones kind help to let me know what's wrong. > >--- > >i tried to setup a work station as follows: >ip: 10.0.0.2 >subnetmask: 255.255.255.0 >gateway: 10.0.0.1 > >i could ping 10.0.0.1, of course i couldn't ping outside our network, but >I couldn't telnet, i couldn't do web, or irc, or anything... > >Please Help! > >Thanks. > >Brian > > > > > >To Unsubscribe: send mail to majordomo@FreeBSD.org >with "unsubscribe freebsd-questions" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?004301be5c16$31130ac0$236319ac>