Date: Fri, 23 Jun 2000 23:28:43 -0700 From: "Crist J. Clark" <cristjc@earthlink.net> To: Joel Eusebio <joel@tilapia.pang.pworld.net.ph> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: ipfw Message-ID: <20000623232843.A215@dialin-client.earthlink.net> In-Reply-To: <Pine.LNX.3.95.1000624044604.6469A-100000@tilapia.pang.pworld.net.ph>; from joel@tilapia.pang.pworld.net.ph on Sat, Jun 24, 2000 at 04:54:51AM %2B0000 References: <Pine.LNX.3.95.1000624044604.6469A-100000@tilapia.pang.pworld.net.ph>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Jun 24, 2000 at 04:54:51AM +0000, Joel Eusebio wrote:
> I still can't make ipfw work on my 4-0 box. I tried to recompile my
> kernel but still I see errors when I run ipfw manually. I still get ipfw:
> setsockopt (IP_FW_ADD) protocol not available errors.Do I have to include
> additional lines in /conf/GENERIC before I recompile??? If so what lines
> do I have to add??? I really need help
In ipfw(4):
Kernel Options
Options in the kernel configuration file:
options IPFIREWALL enable ipfirewall
options IPFIREWALL_VERBOSE enable firewall output
options IPFIREWALL_VERBOSE_LIMIT limit firewall output
options IPDIVERT enable divert(4) sockets
In ipfw(8):
fwd ipaddr[,port]
Change the next-hop on matching packets to ipaddr, which
can be an IP address in dotted quad or a host name.
.
.
.
The kernel must have been compiled with the
IPFIREWALL_FORWARD option.
In /usr/src/sys/i386/conf/LINT,
# IPFIREWALL enables support for IP firewall construction, in
# conjunction with the `ipfw' program. IPFIREWALL_VERBOSE sends
# logged packets to the system logger. IPFIREWALL_VERBOSE_LIMIT
# limits the number of times a matching entry can be logged.
#
# WARNING: IPFIREWALL defaults to a policy of "deny ip from any to any"
# and if you do not add other rules during startup to allow access,
# YOU WILL LOCK YOURSELF OUT. It is suggested that you set firewall_type=open
# in /etc/rc.conf when first enabling this feature, then refining the
# firewall rules in /etc/rc.firewall after you've tested that the new kernel
# feature works properly.
#
# IPFIREWALL_DEFAULT_TO_ACCEPT causes the default rule (at boot) to
# allow everything. Use with care, if a cracker can crash your
# firewall machine, they can get to your protected machines. However,
# if you are using it as an as-needed filter for specific problems as
# they arise, then this may be for you. Changing the default to 'allow'
# means that you won't get stuck if the kernel and /sbin/ipfw binary get
# out of sync.
#
# IPDIVERT enables the divert IP sockets, used by ``ipfw divert''
#
# IPSTEALTH enables code to support stealth forwarding (i.e., forwarding
# packets without touching the ttl). This can be useful to hide firewalls
# from traceroute and similar tools.
#
# TCPDEBUG is undocumented.
#
options TCP_COMPAT_42 #emulate 4.2BSD TCP bugs
options MROUTING # Multicast routing
options IPFIREWALL #firewall
options IPFIREWALL_VERBOSE #print information about
# dropped packets
options IPFIREWALL_FORWARD #enable transparent proxy support
options IPFIREWALL_VERBOSE_LIMIT=100 #limit verbosity
options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default
options IPV6FIREWALL #firewall for IPv6
options IPV6FIREWALL_VERBOSE
options IPV6FIREWALL_VERBOSE_LIMIT=100
options IPV6FIREWALL_DEFAULT_TO_ACCEPT
options IPDIVERT #divert sockets
--
Crist J. Clark cjclark@alum.mit.edu
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000623232843.A215>
