xref: /titanic_44/usr/src/cmd/ipf/examples/firewall (revision 7c478bd95313f5f23a4c958a745db2134aa03244)
1 Configuring IP Filter for firewall usage.
2 =========================================
3 
4 Step 1 - Block out "bad" IP packets.
5 ------------------------------------
6 
7 Run the perl script "mkfilters".  This will generate a list of blocking
8 rules which:
9 	a) blocks all packets which might belong to an IP Spoofing attack;
10 	b) blocks all packets with IP options;
11 	c) blocks all packets which have a length which is too short for
12 	   any legal packet;
13 
14 Step 2 - Convert Network Security Policy to filter rules.
15 ---------------------------------------------------------
16 
17 Draw up a list of which services you want to allow users to use on the
18 Internet (e.g. WWW, ftp, etc).  Draw up a separate list for what you
19 want each host that is part of your firewall to be allowed to do, including
20 communication with internal hosts.
21 
22 Step 3 - Create TCP "keep state" rules.
23 ---------------------------------------
24 
25 For each service that uses TCP, create a rule as follows:
26 
27 pass in on <int-a> proto tcp from <int-net> to any port <ext-service> flags S/SA keep state
28 
29 where
30 * "int-a" is the internal interface of the firewall.  That is, it is the
31   closest to your internal network in terms of network hops.
32 
33 * "int-net" is the internal network IP# subnet address range.  This might
34    be something like 10.1.0.0/16, or 128.33.1.0/24
35 
36 * "ext-service" is the service to which you wish to connect or if it doesn't
37   have a proper name, a number can be used.  The translation of "ext-service"
38   as a name to a number is controlled with the /etc/services file.
39 
40