Initial editorial pass through intro of this chapter.
Sponsored by: iXsystems
This commit is contained in:
parent
0f513f358f
commit
dd0a14165c
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=43997
1 changed files with 24 additions and 31 deletions
|
@ -1509,8 +1509,8 @@ block drop out quick on $ext_if from any to $martians</programlisting>
|
|||
|
||||
<para><application>IPFILTER</application>, also known as
|
||||
<application>IPF</application>, is a cross-platform, open source firewall which
|
||||
has been ported to &os;, NetBSD, OpenBSD, and
|
||||
&solaris; operating systems.</para>
|
||||
has been ported to several operating systems, including &os;, NetBSD, OpenBSD, and
|
||||
&solaris;.</para>
|
||||
|
||||
<para><application>IPFILTER</application> is a kernel-side firewall and
|
||||
<acronym>NAT</acronym> mechanism that can be controlled and
|
||||
|
@ -1525,32 +1525,25 @@ block drop out quick on $ext_if from any to $martians</programlisting>
|
|||
|
||||
<para><application>IPF</application> was originally written using a rule processing logic
|
||||
of <quote>the last matching rule wins</quote> and only used
|
||||
stateless rules. Over time, <application>IPF</application> has been enhanced to include a
|
||||
<quote>quick</quote> option and a stateful
|
||||
<quote>keep state</quote> option which modernized the rules
|
||||
processing logic. <application>IPF</application>'s official documentation covers only the
|
||||
legacy rule coding parameters and rule file processing logic and
|
||||
the modernized functions are only included as additional
|
||||
options.</para>
|
||||
|
||||
<para>The instructions contained in this section are based on
|
||||
using rules that contain <quote>quick</quote> and
|
||||
<quote>keep state</quote> as these provide the basic framework
|
||||
for configuring an inclusive firewall ruleset.</para>
|
||||
stateless rules. Since then, <application>IPF</application> has been enhanced to include
|
||||
the <literal>quick</literal> and
|
||||
<literal>keep state</literal> options.</para>
|
||||
|
||||
<para>For a detailed explanation of the legacy rules processing
|
||||
method, refer to <uri
|
||||
xlink:href="http://www.munk.me.uk/ipf/ipf-howto.html">http://www.munk.me.uk/ipf/ipf-howto.html</uri>
|
||||
and <uri
|
||||
xlink:href="http://coombs.anu.edu.au/~avalon/ip-filter.html">http://coombs.anu.edu.au/~avalon/ip-filter.html</uri>.</para>
|
||||
|
||||
<para>The <application>IPF</application> FAQ is at <uri
|
||||
xlink:href="http://www.phildev.net/ipf/index.html">http://www.phildev.net/ipf/index.html</uri>.</para>
|
||||
|
||||
<para>A searchable archive of the IPFilter mailing list is
|
||||
xlink:href="http://www.phildev.net/ipf/index.html">http://www.phildev.net/ipf/index.html</uri>.
|
||||
A searchable archive of the IPFilter mailing list is
|
||||
available at <uri
|
||||
xlink:href="http://marc.theaimsgroup.com/?l=ipfilter">http://marc.theaimsgroup.com/?l=ipfilter</uri>.</para>
|
||||
xlink:href="http://marc.info/?l=ipfilter">http://marc.info/?l=ipfilter</uri>.</para>
|
||||
|
||||
<para>This section of the Handbook focuses on
|
||||
<application>IPF</application> as it pertains to FreeBSD.
|
||||
It provides examples which uses
|
||||
rules that contain the <literal>quick</literal> and
|
||||
<literal>keep state</literal> options.</para>
|
||||
<sect2>
|
||||
<title>Enabling <application>IPF</application></title>
|
||||
|
||||
|
@ -1560,7 +1553,7 @@ block drop out quick on $ext_if from any to $martians</programlisting>
|
|||
<secondary>enabling</secondary>
|
||||
</indexterm>
|
||||
|
||||
<para> is included in the basic &os; install as a kernel
|
||||
<para><application>IPF</application> is included in the basic &os; install as a kernel
|
||||
loadable module, meaning that a custom kernel is not needed in
|
||||
order to enable <application>IPF</application>.</para>
|
||||
|
||||
|
@ -1590,22 +1583,21 @@ block drop out quick on $ext_if from any to $martians</programlisting>
|
|||
|
||||
<para>For users who prefer to statically compile <application>IPF</application> support
|
||||
into a custom kernel, refer to the instructions in <xref
|
||||
linkend="kernelconfig"/>. The following <application>IPF</application> option statements are
|
||||
linkend="kernelconfig"/>. The following kernel options are
|
||||
available:</para>
|
||||
|
||||
<programlisting>options IPFILTER
|
||||
options IPFILTER_LOG
|
||||
options IPFILTER_LOOKUP
|
||||
options IPFILTER_DEFAULT_BLOCK</programlisting>
|
||||
|
||||
<para>where <literal>options IPFILTER</literal> enables support for
|
||||
<application>IPFILTER</application>.</para>
|
||||
|
||||
<para><literal>options IPFILTER_LOG</literal> enables IPF
|
||||
<application>IPFILTER</application>, <literal>options IPFILTER_LOG</literal> enables <application>IPF</application>
|
||||
logging using the <filename>ipl</filename> packet logging
|
||||
pseudo—device for every rule that has the
|
||||
<literal>log</literal> keyword.</para>
|
||||
|
||||
<para><literal>options IPFILTER_DEFAULT_BLOCK</literal> changes
|
||||
pseudo device for every rule that has the
|
||||
<literal>log</literal> keyword,
|
||||
<literal>IPFILTER_LOOKUP</literal> enables <acronym>IP</acronym> pools in
|
||||
order to speed up <acronym>IP</acronym> lookups, and <literal>options IPFILTER_DEFAULT_BLOCK</literal> changes
|
||||
the default behavior so that any packet not matching a
|
||||
firewall <literal>pass</literal> rule gets blocked.</para>
|
||||
|
||||
|
@ -1614,7 +1606,8 @@ options IPFILTER_DEFAULT_BLOCK</programlisting>
|
|||
the following entries to
|
||||
<filename>/etc/rc.conf</filename>. These entries will also enable logging and
|
||||
<literal>default pass all</literal>. To change the
|
||||
default to <literal>block all</literal>, add a
|
||||
default policy to <literal>block all</literal> without
|
||||
compiling a custom kernel, remember to add a
|
||||
<literal>block all</literal> rule at the end of the
|
||||
ruleset.</para>
|
||||
|
||||
|
@ -1633,7 +1626,7 @@ ipmon_flags="-Ds" # D = start as daemon
|
|||
ipnat_enable="YES" # Start ipnat function
|
||||
ipnat_rules="/etc/ipnat.rules" # rules definition file for ipnat</programlisting>
|
||||
|
||||
<para>To start <application>IPF</application> now:</para>
|
||||
<para>Then, to start <application>IPF</application> now:</para>
|
||||
|
||||
<programlisting>&prompt.root; <command>service ipfilter start</command></programlisting>
|
||||
|
||||
|
|
Loading…
Reference in a new issue