mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 01:31:44 +02:00
Correction of firewall syntax in multiple pages (#1651)
This commit is contained in:
parent
1772d6700d
commit
711d71329f
@ -208,9 +208,8 @@ Firewall
|
||||
========
|
||||
|
||||
Finally, don't forget the :ref:`Firewall<configuration/firewall/index:Firewall>`. The usage is identical, except for
|
||||
instead of `set firewall name NAME`, you would use `set firewall ipv6-name
|
||||
instead of `set firewall ipv4 name NAME`, you would use `set firewall ipv6 name
|
||||
NAME`.
|
||||
|
||||
Similarly, to attach the firewall, you would use `set interfaces ethernet eth0
|
||||
firewall in ipv6-name` or `set firewall zone LOCAL from WAN firewall
|
||||
Similarly, to attach the firewall, you would use `set firewall ipv6 name NAME rule N inbound-interface name eth0` or `set firewall zone LOCAL from WAN firewall
|
||||
ipv6-name`.
|
||||
|
||||
@ -220,14 +220,15 @@ firewall exception.
|
||||
set firewall ipv4 name OUTSIDE_LOCAL rule 20 destination port 51820
|
||||
set firewall ipv4 name OUTSIDE_LOCAL rule 20 log enable
|
||||
set firewall ipv4 name OUTSIDE_LOCAL rule 20 protocol udp
|
||||
set firewall ipv4 name OUTSIDE_LOCAL rule 20 source
|
||||
|
||||
You should also ensure that the OUTSIDE_LOCAL firewall group is applied to the
|
||||
WAN interface and a direction (local).
|
||||
WAN interface and in an input (local) direction.
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set interfaces ethernet eth0 firewall local name 'OUTSIDE-LOCAL'
|
||||
set firewall ipv4 input filter rule 10 action jump
|
||||
set firewall ipv4 input filter rule 10 jump-target 'OUTSIDE_LOCAL'
|
||||
set firewall ipv4 input filter rule 10 inbound-interface name 'eth0'
|
||||
|
||||
Assure that your firewall rules allow the traffic, in which case you have a
|
||||
working VPN using WireGuard.
|
||||
|
||||
@ -92,18 +92,18 @@ Example:
|
||||
|
||||
.. code-block:: none
|
||||
|
||||
set firewall name OUTSIDE-LOCAL rule 40 action 'accept'
|
||||
set firewall name OUTSIDE-LOCAL rule 40 protocol 'esp'
|
||||
set firewall name OUTSIDE-LOCAL rule 41 action 'accept'
|
||||
set firewall name OUTSIDE-LOCAL rule 41 destination port '500'
|
||||
set firewall name OUTSIDE-LOCAL rule 41 protocol 'udp'
|
||||
set firewall name OUTSIDE-LOCAL rule 42 action 'accept'
|
||||
set firewall name OUTSIDE-LOCAL rule 42 destination port '4500'
|
||||
set firewall name OUTSIDE-LOCAL rule 42 protocol 'udp'
|
||||
set firewall name OUTSIDE-LOCAL rule 43 action 'accept'
|
||||
set firewall name OUTSIDE-LOCAL rule 43 destination port '1701'
|
||||
set firewall name OUTSIDE-LOCAL rule 43 ipsec 'match-ipsec'
|
||||
set firewall name OUTSIDE-LOCAL rule 43 protocol 'udp'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 40 action 'accept'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 40 protocol 'esp'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 41 action 'accept'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 41 destination port '500'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 41 protocol 'udp'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 42 action 'accept'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 42 destination port '4500'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 42 protocol 'udp'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 43 action 'accept'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 43 destination port '1701'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 43 ipsec 'match-ipsec'
|
||||
set firewall ipv4 name OUTSIDE-LOCAL rule 43 protocol 'udp'
|
||||
|
||||
To allow VPN-clients access via your external address, a NAT rule is required:
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user