IPFW2 setup

2003-01-31 Thread Jason Morgan
OK, I've read the man page for IPFW a couple times and I am still having
difficulty setting up a working firewall. The firewall acts as a gateway
to my inside network as well as a web server and mail server. I also
need ssh connectivity from inside and out. Also, one odd thing is that I
have a Zyxel Prestige 643 acting as an additional router between me and
my DSL connection (I couldn't figure out how to get the router in pure
bridging mode). It comes in handy, though, as it has a 4-port switch
built in and can also act a firewall and does the PPPoE easy enough.

NICs:
xl0 as 192.168.1.101 (to Zyxel and outside)
dc0 as 10.0.0.1 (inside)

Current IPFW config:

-

# Basics
add 00010 pass all from any to any via lo0
add 00020 deny all from any to 127.0.0.0/8
add 00030 deny ip from 127.0.0.0/8 to any
add 00040 deny ip from any to any frag

# Spoofing Check
add 00050 deny all from 10.0.0.0/8 to any in via xl0
add 00060 deny all from 172.16.0.0/12 to any in via xl0

add 00080 allow all from 192.168.1.1 to any in via xl0
add 00085 deny all from 192.168.0.0/16 to any in via xl0

# Divert
add 00100 divert natd all from any to any via xl0

# Allowances
add 00200 allow all from any to any in via dc0

# Check state of dynamic rules
add 00220 check-state

# UDP
add 00300 allow udp from any to any out setup
add 00310 deny udp from any to any established
add 00320 allow udp from any to any 53 in via xl0 setup keep-state

# TCP
add 00400 allow tcp from any to any out setup keep-state
add 00410 deny tcp from any to any established
add 00420 allow tcp from any to any 22,25,80 in setup keep-state


add 32000 allow all from any to any



Could anyone offer some advice?

Regards,

Jason

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message



Re: IPFW2 setup

2003-01-31 Thread Jason Morgan
Kernel firewall settings:

options IPFW2
options IPFIREWALL  #Firewall
options IPFIREWALL_VERBOSE  #print info about dropped packets
options IPFIREWALL_VERBOSE_LIMIT=10  #limit verbosity
options IPV6FIREWALL
options IPV6FIREWALL_VERBOSE
options IPV6FIREWALL_VERBOSE_LIMIT=10
options IPDIVERT#Divert sockets
options IPSTEALTH   #support stealth forwarding
options ICMP_BANDLIM#Rate limit bad replies
options ACCEPT_FILTER_DATA
options ACCEPT_FILTER_HTTP


I can't reach the web from the inside, nor can I ssh to my server.
Everything seems to be getting hung up on rules 310 and 410. I, of
course, want to do away with 32000. In order to get through, I have
temporarily added an 'allow all from any to any' at 210. I'll start
logging the denys and see what happens.

-jason


On Fri, Jan 31, 2003 at 11:56:02AM -0500, Steve Bertrand wrote:
 What part is not working? Can you nat through? Perhaps you could add 
 some logging to see which packets are failing and why.
 Do you have the following in the kernel?
 
 optionsIPFIREWALL
 optionsIPFIREWALL_VERBOSE
 optionsIPDIVERT
 
 Let us know.
 
 Steve
 
 Jason Morgan wrote:
 
 OK, I've read the man page for IPFW a couple times and I am still having
 difficulty setting up a working firewall. The firewall acts as a gateway
 to my inside network as well as a web server and mail server. I also
 need ssh connectivity from inside and out. Also, one odd thing is that I
 have a Zyxel Prestige 643 acting as an additional router between me and
 my DSL connection (I couldn't figure out how to get the router in pure
 bridging mode). It comes in handy, though, as it has a 4-port switch
 built in and can also act a firewall and does the PPPoE easy enough.
 
 NICs:
 xl0 as 192.168.1.101 (to Zyxel and outside)
 dc0 as 10.0.0.1 (inside)
 
 Current IPFW config:
 
 -
 
 # Basics
 add 00010 pass all from any to any via lo0
 add 00020 deny all from any to 127.0.0.0/8
 add 00030 deny ip from 127.0.0.0/8 to any
 add 00040 deny ip from any to any frag
 
 # Spoofing Check
 add 00050 deny all from 10.0.0.0/8 to any in via xl0
 add 00060 deny all from 172.16.0.0/12 to any in via xl0
 
 add 00080 allow all from 192.168.1.1 to any in via xl0
 add 00085 deny all from 192.168.0.0/16 to any in via xl0
 
 # Divert
 add 00100 divert natd all from any to any via xl0
 
 # Allowances
 add 00200 allow all from any to any in via dc0
 
 # Check state of dynamic rules
 add 00220 check-state
 
 # UDP
 add 00300 allow udp from any to any out setup
 add 00310 deny udp from any to any established
 add 00320 allow udp from any to any 53 in via xl0 setup keep-state
 
 # TCP
 add 00400 allow tcp from any to any out setup keep-state
 add 00410 deny tcp from any to any established
 add 00420 allow tcp from any to any 22,25,80 in setup keep-state
 
 
 add 32000 allow all from any to any
 
 
 
 Could anyone offer some advice?
 
 Regards,
 
 Jason
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-questions in the body of the message
 
 
  
 
 
 

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-questions in the body of the message