Date: Thu, 17 May 2001 18:05:26 +0300 From: Seorge <seorge@rostokgroup.com> To: freebsd-security@FreeBSD.ORG Subject: Cofiguring ports in firewall... A problem Message-ID: <8130809667.20010517180526@myhost.com>
index | next in thread | raw e-mail
The System is FreeBSD 4.3
There is an internal network of the type: 192.168.1.0 with its own DNS
There is an external IP with its own DNS
natd is started
ipfrw is started
The question is how to let users from local network via all protocols
(http, ftp, mail, etc) while closing all ports excepting several ones
from external access (20, 21, 22, 53, 80, 110).
Now it is made as follows:
(the kernel closes all ports as default, rl0 - external interface, rl1
- internal)
If I put a comment on the rule 2000 and take the comment off the
second 2000 and the rule No 4000 in rc.firewall, it does not work at
all.
How to solve this problem? What should I configure and how to get it
working?
//rc.conf
#############################################################
network_interfaces="lo0 rl0 rl1"
ifconfig_lo0="inet 127.0.0.1"
ifconfig_rl0="inet 212.212.212.5 netmask 255.255.255.240"
ifconfig_rl1="inet 192.168.1.1 netmask 255.255.255.0 broadcast 192.168.1.255"
hostname="name.domain.net"
named_enable="YES"
gateway_enable="YES"
defaultrouter="212.212.212.1"
firewall_enable="YES"
firewall_script="/etc/rc.firewall"
firewall_type="EE"
firewall_quiet="NO"
natd_program="/sbin/natd"
natd_enable="YES"
natd_interface="rl0"
natd_flags="-f /etc/natd.conf"
tcp_extensions="NO"
tcp_drop_synfin="YES"
icmp_drop_redirect="YES"
icmp_log_redirect="YES"
##########################################################
//natd.conf
##########################################################
log no
deny_incoming no
same_ports yes
use_sockets yes
verbose no
port natd
unregistered_only yes
##########################################################
//rc.firewall
##########################################################
case ${natd_enable} in
[Yy][Ee][Ss])
if [ -n "${natd_interface}" ]; then
${fwcmd} add 50 divert natd all from any to any via ${natd_interface}
fi
;;
esac
${fwcmd} add 100 pass all from any to any via lo0
${fwcmd} add 200 deny all from any to 127.0.0.0/8
case ${firewall_type} in
[Ee][Ee])
${fwcmd} add 400 pass udp from any to any 33434-33523
${fwcmd} add 500 deny ICMP from any to any frag
${fwcmd} add 600 pass ICMP from any to any
${fwcmd} add 700 pass tcp from any to any
20,21,25,53,80,110,119,443,3128
${fwcmd} add 800 pass tcp from any 20,21,25,53,80,110,119,443,3128 to
any
${fwcmd} add 1000 pass all from any to any via rl1
${fwcmd} add 1100 allow all from any to any via rl1
${fwcmd} add 2000 pass all from any to any via rl0
#${fwcmd} add 2000 pass all from any
20,21,22,25,53,80,110,119,443,3128,8668 to any via rl0
#${fwcmd} add 4000 pass all from any to any
20,21,22,25,53,80,110,119,443,3128,8668 via rl0
;;
[Uu][Nn][Kk][Nn][Oo][Ww][Nn])
;;
*)
if [ -r "${firewall_type}" ]; then
${fwcmd} ${firewall_flags} ${firewall_type}
fi
;;
esac
##########################################################
Looking forward to hearing from you soon,
Best regards,
Seorge mailto:seorge@rostokgroup.com
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8130809667.20010517180526>
