mirror of
				https://github.com/vyos/vyos-documentation.git
				synced 2025-10-26 08:41:46 +01:00 
			
		
		
		
	Updated labels for the pages Added new pictures. Signed-off-by: Nephiaust <29741794+Nephiaust@users.noreply.github.com>
		
			
				
	
	
		
			86 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
| :lastproofread: 2023-09-17
 | |
| 
 | |
| ########
 | |
| Firewall
 | |
| ########
 | |
| 
 | |
| .. attention:: 
 | |
|    Starting from VyOS 1.4-rolling-202308040557, a new firewall structure
 | |
|    can be found on all vyos installations.
 | |
| 
 | |
| .. note:: 
 | |
|    The legacy and zone-based firewall configuration options is not longer
 | |
|    supported. They are here for reference purposes only.
 | |
| 
 | |
| Netfilter based
 | |
| ^^^^^^^^^^^^^^^
 | |
| .. toctree::
 | |
|    :maxdepth: 1
 | |
|    :includehidden:
 | |
| 
 | |
|    general
 | |
| 
 | |
| With VyOS being based on top of Linux and its kernel, the Netfilter project created
 | |
| the iptables and now the successor nftables for the Linux kernel to work directly
 | |
| on the data flows. This now extends the concept of zone-based security to allow
 | |
| for manipulating the data at multiple stages once accepted by the network interface
 | |
| and the driver before being handed off to the destination (e.g. a web server OR
 | |
| another device).
 | |
| 
 | |
| To configure VyOS with the new :doc:`firewall configuration </configuration/firewall/general>`
 | |
| 
 | |
| The only stages VyOS will process as part of the firewall configuration is the 
 | |
| `forward` (F4 stage), `input` (L4 stage), and `output` (L5 stage). All the other
 | |
| stages and steps are for reference and cant be manipulated through VyOS.
 | |
| 
 | |
| In this example image, a simplifed traffic flow is shown to help provide context
 | |
| to the terms of `forward`, `input`, and `output` for the new firewall CLI format.
 | |
| 
 | |
| .. figure:: /_static/images/firewall-netfilter.png
 | |
| 
 | |
| .. note:: **For more information**
 | |
|    of Netfilter hooks and Linux networking packet flows can be
 | |
|    found in `Netfilter-Hooks
 | |
|    <https://wiki.nftables.org/wiki-nftables/index.php/Netfilter_hooks>`_
 | |
| 
 | |
| Legacy Firewall
 | |
| ^^^^^^^^^^^^^^^
 | |
| .. toctree::
 | |
|    :maxdepth: 1
 | |
|    :includehidden:
 | |
| 
 | |
|    general-legacy
 | |
| 
 | |
| Traditionally firewalls weere configured with the concept of data going in and
 | |
| out of an interface. The router just listened to the data flowing through and
 | |
| responding as required if it was directed at the router itself.
 | |
| 
 | |
| To configure VyOS with the :doc:`legacy firewall configuration </configuration/firewall/general-legacy>`
 | |
| 
 | |
| As the example image below shows, the device was configured with rules blocking
 | |
| inbound or outbound traffic on each interface.
 | |
| 
 | |
| .. figure:: /_static/images/firewall-traditional.png
 | |
| 
 | |
| Zone-based firewall
 | |
| ^^^^^^^^^^^^^^^^^^^
 | |
| .. toctree::
 | |
|    :maxdepth: 1
 | |
|    :includehidden:
 | |
| 
 | |
|    zone
 | |
| 
 | |
| With zone-based firewalls a new concept was implemented, in addtion to the standard
 | |
| in and out traffic flows, a local flow was added. This local was for traffic
 | |
| originating and destined to the router itself. Which means additional rules were 
 | |
| required to secure the firewall itself from the network, in addition to the existing
 | |
| inbound and outbound rules from the traditional concept above.
 | |
| 
 | |
| To configure VyOS with the :doc:`zone-based firewall configuration </configuration/firewall/zone>`
 | |
| 
 | |
| As the example image below shows, the device now needs rules to allow/block traffic
 | |
| to or from the services running on the device that have open connections on that
 | |
| interface.
 | |
| 
 | |
| .. figure:: /_static/images/firewall-zonebased.png
 |