mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	Quickstart: manual backport to sagitta for firewall configuration in quickstart.
This commit is contained in:
		
							parent
							
								
									7385cfe0d4
								
							
						
					
					
						commit
						be722bf1bd
					
				| @ -141,7 +141,7 @@ networks, addresses, ports, and domains that describe different parts of | |||||||
| our network. We can then use them for filtering within our firewall rulesets, | our network. We can then use them for filtering within our firewall rulesets, | ||||||
| allowing for more concise and readable configuration. | allowing for more concise and readable configuration. | ||||||
| 
 | 
 | ||||||
| In this case, we will create two interface groups—a ``WAN`` group for our | In this case, we will create two interface groups — a ``WAN`` group for our | ||||||
| interfaces connected to the public internet and a ``LAN`` group for the | interfaces connected to the public internet and a ``LAN`` group for the | ||||||
| interfaces connected to our internal network. Additionally, we will create a | interfaces connected to our internal network. Additionally, we will create a | ||||||
| network group, ``NET-INSIDE-v4``, that contains our internal subnet. | network group, ``NET-INSIDE-v4``, that contains our internal subnet. | ||||||
| @ -156,7 +156,7 @@ Configure Stateful Packet Filtering | |||||||
| ----------------------------------- | ----------------------------------- | ||||||
| 
 | 
 | ||||||
| With the new firewall structure, we have have a lot of flexibility in how we | With the new firewall structure, we have have a lot of flexibility in how we | ||||||
| group and order our rules, as shown by the two alternative approaches below. | group and order our rules, as shown by the three alternative approaches below. | ||||||
| 
 | 
 | ||||||
| Option 1: Global State Policies | Option 1: Global State Policies | ||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | ||||||
| @ -212,12 +212,11 @@ hooks as the first filtering rule in the respective chains: | |||||||
|   set firewall ipv4 input filter rule 10 action 'jump' |   set firewall ipv4 input filter rule 10 action 'jump' | ||||||
|   set firewall ipv4 input filter rule 10 jump-target CONN_FILTER |   set firewall ipv4 input filter rule 10 jump-target CONN_FILTER | ||||||
| 
 | 
 | ||||||
| Option 2: Per-Hook Chain | Option 3: Per-Hook Chain | ||||||
| ^^^^^^^^^^^^^^^^^^^^^^^^ | ^^^^^^^^^^^^^^^^^^^^^^^^ | ||||||
| 
 | 
 | ||||||
| Alternatively, instead of configuring the ``CONN_FILTER`` chain described above, | Alternatively, you can take the more traditional stateful connection | ||||||
| you can take the more traditional stateful connection filtering approach by | filtering approach by creating rules on each base hook's chain: | ||||||
| creating rules on each hook's chain: |  | ||||||
| 
 | 
 | ||||||
| .. code-block:: none | .. code-block:: none | ||||||
| 
 | 
 | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user