mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
Fix typos in quick-start
(cherry picked from commit 32460e70ef014616ec36fce9361f702d5cc1463a) # Conflicts: # docs/quick-start.rst
This commit is contained in:
parent
3d927aa7ee
commit
6ed85600b2
@ -158,8 +158,29 @@ Configure Stateful Packet Filtering
|
||||
With the new firewall structure, we have have a lot of flexibility in how we
|
||||
group and order our rules, as shown by the two alternative approaches below.
|
||||
|
||||
<<<<<<< HEAD
|
||||
Option 1: Common Chain
|
||||
^^^^^^^^^^^^^^^^^^^^^^
|
||||
=======
|
||||
Option 1: Global State Policies
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
Using options defined in ``set firewall global-options state-policy``, state
|
||||
policy rules that applies for both IPv4 and IPv6 are created. These global
|
||||
state policies also applies for all traffic that passes through the router
|
||||
(transit) and for traffic originated/destinated to/from the router itself, and
|
||||
will be evaluated before any other rule defined in the firewall.
|
||||
|
||||
Most installations would choose this option, and will contain:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set firewall global-options state-policy established action accept
|
||||
set firewall global-options state-policy related action accept
|
||||
set firewall global-options state-policy invalid action drop
|
||||
|
||||
Option 2: Common/Custom Chain
|
||||
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
||||
>>>>>>> 32460e70 (Fix typos in quick-start)
|
||||
|
||||
We can create a common chain for stateful connection filtering of multiple
|
||||
interfaces (or multiple netfilter hooks on one interface). Those individual
|
||||
@ -225,7 +246,7 @@ established and related connections, we can block all other incoming traffic
|
||||
addressed to our local network.
|
||||
|
||||
Create a new chain (``OUTSIDE-IN``) which will drop all traffic that is not
|
||||
explicity allowed at some point in the chain. Then, we can jump to that chain
|
||||
explicitly allowed at some point in the chain. Then, we can jump to that chain
|
||||
from the ``forward`` hook when traffic is coming from the ``WAN`` interface
|
||||
group and is addressed to our local network.
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user