Date: Fri, 19 Mar 1999 00:32:58 -0500 From: Spamoff <Spambait@tampabay.rr.com> To: freebsd-questions <freebsd-questions@FreeBSD.ORG> Subject: Re: Simple FIREWALL Message-ID: <36F1E189.DB9D7961@tampabay.rr.com> References: <Pine.BSF.4.05.9902182301050.346-100000@stardust.bzzzz.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Brian. Please let me know what you found out. This is my new project as well Regards...Martin Brian Budnick wrote: > I am running FreeBSD 3.1-RELEASE on a K6/166 that has 2 ethernet cards in > it. The ethernet cards are setup as follows: > > ed1: ip: 209.90.111.199 netmask: 255.255.255.192 > pn0: ip: 10.0.0.1 netmask: 255.255.255.0 > > I'm trying to get a simple firewall up to protect several computers on our > network. I want it so that whenever we access the web from like 10.0.0.2 > it goes thru 10.0.0.1 and then that machine will be the gateway to the > Internet. I want to be able to have access to Telnet/FTP/WWW/IRC from > the 10.0.0.2 machines, etc. > > I did the following to the server 209.90.111.199 to get it to work: > > /etc/defaults/rc.conf (looks as follows): > > <snip> > > ### Network routing options: ### > defaultrouter="NO" # Set to default gateway (or NO). > static_routes="" # Set to static route list (or leaveempty). > gateway_enable="YES" # Set to YES if this host will be agateway. > router_enable="NO" # Set to YES to enable a routing daemon. > router="routed" # Name of routing daemon to use ifenabled. > router_flags="-q" # Flags for routing daemon. > mrouted_enable="NO" # Do multicast routing (see/etc/mrouted.conf). > mrouted_flags="" # Flags for multicast routing daemon. > ipxgateway_enable="NO" # Set to YES to enable IPX routing. > ipxrouted_enable="NO" # Set to YES to run the IPX routingdaemon. > ipxrouted_flags="" # Flags for IPX routing daemon. > arpproxy_all="" # replaces obsolete kernel optionARP_PROXYALL. > forward_sourceroute="NO" # do source routing (only ifgateway_enable is set to "YES") > accept_sourceroute="NO" # accept source routed packets to us > > <snip> > > hostname="myname.my.domain" # Set this! > nisdomainname="NO" # Set to NIS domain if using NIS (or NO). > firewall_enable="YES" # Set to YES to enable firewall functionality > firewall_type="simple" # Firewall type (see /etc/rc.firewall) > firewall_quiet="NO" # Set to YES to suppress rule display > natd_enable="NO" # Enable natd (if firewall_enable == YES). > natd_interface="fxp0" # Public interface to use with natd. > natd_flags="" # Additional flags for natd. > tcp_extensions="NO" # Disallow RFC1323 extensions (or YES). > network_interfaces="lo0" # List of network interfaces (lo0 is loopback). > ifconfig_lo0="inet 127.0.0.1" # default loopback device configuration. > > --- > > in my /etc/rc.firewall (under the simple section my configuration reads): > > # set these to your outside interface network and netmask and ip > oif="ed1" > onet="209.90.111.199/24" > omask="255.255.255.192" > oip="209.90.111.199" > > # set these to your inside interface network and netmask and ip > iif="pn0" > inet="10.0.0.1/24" > imask="255.255.255.0" > iip="10.0.0.1" > > # Stop spoofing > $fwcmd add deny all from ${inet}:${imask} to any in via ${oif} > $fwcmd add deny all from ${onet}:${omask} to any in via ${iif} > > # Stop RFC1918 nets on the outside interface > $fwcmd add deny all from 192.168.0.0:255.255.0.0 to any via ${oif} out > $fwcmd add deny all from any to 192.168.0.0:255.255.0.0 via ${oif} > $fwcmd add deny all from 172.16.0.0:255.240.0.0 to any via ${oif} > $fwcmd add deny all from any to 172.16.0.0:255.240.0.0 via ${oif} > $fwcmd add deny all from 10.0.0.0:255.0.0.0 to any via ${oif} > $fwcmd add deny all from any to 10.0.0.0:255.0.0.0 via ${oif} > > # Allow TCP through if setup succeeded > # $fwcmd add pass tcp from any to any established > $fwcmd add pass all from any to any > > # allow IDENT for IRC > $fwcmd add allow tcp from any to ${oif} 113 > $fwcmd add allow udp from any to ${oif} 113 > > # Allow setup of incoming email > $fwcmd add pass tcp from any to ${oip} 25 setup > > # Allow access to our DNS > $fwcmd add pass tcp from any to ${oip} 53 setup > > # Allow access to our WWW > $fwcmd add pass tcp from any to ${oip} 80 setup > > # Reject&Log all setup of incoming connections from the outside > #$fwcmd add deny log tcp from any to any in via ${oif} setup > > # Allow setup of any other TCP connection > $fwcmd add pass tcp from any to any setup > > # Allow DNS queries out in the world > $fwcmd add pass udp from any 53 to ${oip} > $fwcmd add pass udp from ${oip} to any 53 > > # Allow NTP queries out in the world > $fwcmd add pass udp from any 123 to ${oip} > $fwcmd add pass udp from ${oip} to any 123 > > # Everything else is denied as default. > > elif [ "${firewall_type}" != "UNKNOWN" -a -r "${firewall_type}" ]; then > $fwcmd ${firewall_type} > fi > > --- > > On Bootup when it displays the rulesets it seems to have a problem with > one of them but i'm not sure which one. > > i know this message is kind of long but i'm really wanting to get this to > work and would appreciate anyones kind help to let me know what's wrong. > > --- > > i tried to setup a work station as follows: > ip: 10.0.0.2 > subnetmask: 255.255.255.0 > gateway: 10.0.0.1 > > i could ping 10.0.0.1, of course i couldn't ping outside our network, but > I couldn't telnet, i couldn't do web, or irc, or anything... > > Please Help! > > Thanks. > > Brian > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?36F1E189.DB9D7961>