Lines Matching refs:to
7 # ppp0 - (external) PPP connection to ISP, address a.b.c.d/32
11 # This file contains the basic rules needed to construct a firewall for the
15 # *Nasty* packets we don't want to allow near us at all!
16 # short packets which are packets fragmented too short to be real.
22 # (especially for ed0) and needs to be further refined.
27 block in log on ed0 from w.x.y.z/24 to any head 200
36 block in log quick from 127.0.0.0/8 to any group 100
37 block in log quick from any to 127.0.0.0/8 group 100
38 block in log quick from 127.0.0.0/8 to any group 200
39 block in log quick from any to 127.0.0.0/8 group 200
40 # And of course, make sure the loopback allows packets to traverse it.
49 block in log quick from 10.0.0.0/8 to any group 100
50 block in log quick from 192.168.0.0/16 to any group 100
51 block in log quick from 172.16.0.0/12 to any group 100
55 block in log quick from a.b.c.d/24 to any group 100
60 pass in quick proto udp from any to any port = 53 keep state group 202
62 # If we were running named on the firewall and all internal hosts talked to
65 #pass in quick proto udp from any to w.x.y.z/32 port = 53 keep state group 202
66 #pass out quick on ppp0 proto udp from a.b.c.d/32 to any port = 53 keep state
68 # Allow outgoing FTP from any internal host to any external FTP server.
70 pass in quick proto tcp from any to any port = ftp keep state group 201
71 pass in quick proto tcp from any to any port = ftp-data keep state group 201
72 pass in quick proto tcp from any port = ftp-data to any port > 1023 keep state group 101
74 # Allow NTP from any internal host to any external NTP server.
76 pass in quick proto udp from any to any port = ntp keep state group 202
80 pass in quick proto tcp from any to any port = 22 keep state group 201
81 pass in quick proto tcp from any to any port = telnet keep state group 201
82 pass in quick proto tcp from any to any port = www keep state group 201
85 block in log proto tcp from any to a.b.c.d/32 flags S/SA head 110 group 100
87 # Allow incoming to the external firewall interface: mail, WWW, DNS
89 pass in log quick proto tcp from any to any port = smtp keep state group 110
90 pass in log quick proto tcp from any to any port = www keep state group 110
91 pass in log quick proto tcp from any to any port = 53 keep state group 110
92 pass in log quick proto udp from any to any port = 53 keep state group 100
96 # * return RST packets for invalid SYN packets to help the other end close
97 block return-rst in log proto tcp from any to any flags S/SA group 100