diff options
author | dm <dm@cvs.openbsd.org> | 1996-07-18 05:57:25 +0000 |
---|---|---|
committer | dm <dm@cvs.openbsd.org> | 1996-07-18 05:57:25 +0000 |
commit | 32c1571b6340f34ac25cc12f7bbac65dd8209b45 (patch) | |
tree | bf257b3cd4eadd635f5ee6cf370dcbe9e2b2ba20 /share/ipf/firewall.1 | |
parent | 855450577164de85ddee7341a7ed13c7073882ca (diff) |
added my two firewall examples, plus the stuff from the distribution
Diffstat (limited to 'share/ipf/firewall.1')
-rw-r--r-- | share/ipf/firewall.1 | 33 |
1 files changed, 33 insertions, 0 deletions
diff --git a/share/ipf/firewall.1 b/share/ipf/firewall.1 new file mode 100644 index 00000000000..49323797bc5 --- /dev/null +++ b/share/ipf/firewall.1 @@ -0,0 +1,33 @@ +# +# This is an example of a very light firewall used to guard against +# some of the most easily exploited common security holes. +# +# The example assumes it is running on a gateway with interface ppp0 +# attached to the outside world, and interface ed0 attached to +# network 192.168.4.0 which needs to be protected. +# +# +# Pass any packets not explicitly mentioned by subsequent rules +# +pass out from any to any +pass in from any to any +# +# Block any inherently bad packets coming in from the outside world. +# These include ICMP redirect packets and IP fragments so short the +# filtering rules won't be able to examine the whole UDP/TCP header. +# +block in log quick on ppp0 proto icmp from any to any icmp-type redir +block in log quick on ppp0 proto tcp/udp all with short +# +# Block any IP spoofing atempts. (Packets "from" our network +# shouldn't be coming in from outside). +# +block in log quick on ppp0 from 198.168.4.0/24 to any +block in log quick on ppp0 from localhost to any +# +# Block any incoming traffic to NFS ports, to the RPC portmapper, and +# to X servers. +# +block in log on ppp0 proto tcp/udp from any to any port = sunrpc +block in log on ppp0 proto tcp/udp from any to any port = 2049 +block in log on ppp0 proto tcp from any to any port = 6000 |