Deleted Added
full compact
firewall.7 (141846) firewall.7 (141851)
1.\" Copyright (C) 2001 Matthew Dillon. All rights reserved.
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions
5.\" are met:
6.\" 1. Redistributions of source code must retain the above copyright
7.\" notice, this list of conditions and the following disclaimer.
8.\" 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
22.\" SUCH DAMAGE.
23.\"
1.\" Copyright (C) 2001 Matthew Dillon. All rights reserved.
2.\"
3.\" Redistribution and use in source and binary forms, with or without
4.\" modification, are permitted provided that the following conditions
5.\" are met:
6.\" 1. Redistributions of source code must retain the above copyright
7.\" notice, this list of conditions and the following disclaimer.
8.\" 2. Redistributions in binary form must reproduce the above copyright

--- 7 unchanged lines hidden (view full) ---

16.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
17.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
18.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
19.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
20.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
21.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
22.\" SUCH DAMAGE.
23.\"
24.\" $FreeBSD: head/share/man/man7/firewall.7 141846 2005-02-13 22:25:33Z ru $
24.\" $FreeBSD: head/share/man/man7/firewall.7 141851 2005-02-13 23:45:54Z ru $
25.\"
26.Dd May 26, 2001
27.Dt FIREWALL 7
28.Os
29.Sh NAME
30.Nm firewall
31.Nd simple firewalls under FreeBSD
32.Sh FIREWALL BASICS

--- 84 unchanged lines hidden (view full) ---

117boot sequence, also resulting in an inaccessible machine.
118Because of these problems the
119.Sy IPFIREWALL_DEFAULT_TO_ACCEPT
120kernel option is also available which changes the default firewall
121to pass through all packets.
122Note, however, that using this option
123may open a small window of opportunity during booting where your
124firewall passes all packets.
25.\"
26.Dd May 26, 2001
27.Dt FIREWALL 7
28.Os
29.Sh NAME
30.Nm firewall
31.Nd simple firewalls under FreeBSD
32.Sh FIREWALL BASICS

--- 84 unchanged lines hidden (view full) ---

117boot sequence, also resulting in an inaccessible machine.
118Because of these problems the
119.Sy IPFIREWALL_DEFAULT_TO_ACCEPT
120kernel option is also available which changes the default firewall
121to pass through all packets.
122Note, however, that using this option
123may open a small window of opportunity during booting where your
124firewall passes all packets.
125Still, it's a good option to use
125Still, it is a good option to use
126while getting up to speed with
127.Fx
128firewalling.
129Get rid of it once you understand how it all works
130to close the loophole, though.
131There is a third option called
132.Sy IPDIVERT
133which allows you to use the firewall to divert packets to a user program

--- 245 unchanged lines hidden (view full) ---

379# otherwise do not bother. Have a final deny rule as a safety to
380# guarantee that your firewall is inclusive no matter how the kernel
381# is configured.
382#
383add 05000 deny log ip from any to any frag
384add 06000 deny all from any to any
385.Ed
386.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
126while getting up to speed with
127.Fx
128firewalling.
129Get rid of it once you understand how it all works
130to close the loophole, though.
131There is a third option called
132.Sy IPDIVERT
133which allows you to use the firewall to divert packets to a user program

--- 245 unchanged lines hidden (view full) ---

379# otherwise do not bother. Have a final deny rule as a safety to
380# guarantee that your firewall is inclusive no matter how the kernel
381# is configured.
382#
383add 05000 deny log ip from any to any frag
384add 06000 deny all from any to any
385.Ed
386.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
387We've mentioned multi-homing hosts and binding services to internal or
387We have mentioned multi-homing hosts and binding services to internal or
388external addresses but we have not really explained it.
389When you have a
390host with multiple IP addresses assigned to it, you can bind services run
391on that host to specific IPs or interfaces rather than all IPs.
392Take
393the firewall machine for example: with three interfaces
394and two exposed IP addresses
395on one of those interfaces, the firewall machine is known by 5 different

--- 48 unchanged lines hidden ---
388external addresses but we have not really explained it.
389When you have a
390host with multiple IP addresses assigned to it, you can bind services run
391on that host to specific IPs or interfaces rather than all IPs.
392Take
393the firewall machine for example: with three interfaces
394and two exposed IP addresses
395on one of those interfaces, the firewall machine is known by 5 different

--- 48 unchanged lines hidden ---