Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Sep 2004 12:39:50 -0500
From:      "Micheal Patterson" <micheal@tsgincorporated.com>
To:        "Norm Vilmer" <norm@etherealconsulting.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Too many dynamic rules, sorry
Message-ID:  <07af01c49cdd$e9910f80$4df24243@tsgincorporated.com>
References:  <414A6E9C.4060708@etherealconsulting.com><020b01c49c76$e3d1ada0$0201a8c0@dredster> <414AF79C.4030809@etherealconsulting.com> <06af01c49cc5$b0b615b0$4df24243@tsgincorporated.com> <414B02FD.6020703@etherealconsulting.com> <06fd01c49ccd$36e91450$4df24243@tsgincorporated.com> <414B150C.6090608@etherealconsulting.com>

next in thread | previous in thread | raw e-mail | index | archive | help


----- Original Message ----- 
From: "Norm Vilmer" <norm@etherealconsulting.com>
To: "Micheal Patterson" <micheal@tsgincorporated.com>
Cc: <freebsd-questions@freebsd.org>
Sent: Friday, September 17, 2004 11:47 AM
Subject: Re: Too many dynamic rules, sorry


> Micheal Patterson wrote:
> >
> > ----- Original Message ----- 
> > From: "Norm Vilmer" <norm@etherealconsulting.com>
> > To: "Micheal Patterson" <micheal@tsgincorporated.com>
> > Cc: <freebsd-questions@freebsd.org>
> > Sent: Friday, September 17, 2004 10:30 AM
> > Subject: Re: Too many dynamic rules, sorry
> >
> >
> > <snip>
> >
> >>I do have a check-state rule
> >>
> >>add 00200 check-state
> >>
> >>Norm Vilmer
> >
> >
> > Ok. Then right above the check-state entry, place an
> >
> > allow ip from 123.123.123/24 to 123.123.123./24
> >
> > Replace the ip's with the appropriate network/metric for your lan and
that
> > will allow lan traffic to go to itself unhindered by any stateful
checks.
> >
> > --
> >
> > Micheal Patterson
> > TSG Network Administration
> > 405-917-0600
> >
> >
> >
> would this be the same?
>
> add 00200 allow all from any to any via ${iif} keep-state
> add 00210 check-state
>
>

The goal is to not use dynamic rules for your local lan, only the traffic
from the lan to the net. Otherwise, you're wasting dynamic state table space
for rules that aren't necessary.

A very basic stateful ruleset:

ipfw add 100 allow ip from 1.1.1.0/24 to 1.1.1.0/24
ipfw add 500 check-state
ipfw add 600 allow ip from 1.1.1.0/24 to any keep-state
ipfw add 65000 deny log ip from any to any

That type of ruleset, will allow local traffic without using state table,
and the entry at 1000 will catch everything else outbound and use state
tables for it.  If it's not originating from your network, and there's no
state entry, it's blocked by 65000.

--

Micheal Patterson
TSG Network Administration
405-917-0600



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?07af01c49cdd$e9910f80$4df24243>