Difference between revisions of "OpenBSD Firewall / PF"
| Line 3: | Line 3: | ||
|Members=Antarez, Vicarious | |Members=Antarez, Vicarious | ||
|Description=building a gateway on openbsd | |Description=building a gateway on openbsd | ||
| − | }} | + | }} |
In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop. | In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop. | ||
| − | how to play: | + | how to play: |
| − | * Log into the wireless network "antareztest" | + | *Log into the wireless network "antareztest" |
| − | * SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252) | + | *SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252) |
| − | * Login as "root" password "bier" | + | *Login as "root" password "bier" |
| − | * use "tmux a" to attach to the shared session | + | *use "tmux a" to attach to the shared session |
| − | * break things, discuss, fix things | + | *break things, discuss, fix things |
| + | |||
| + | |||
| + | <pre> | ||
| + | |||
| + | # PF Rules ACKspace gateway 2 | ||
| + | |||
| + | ### Macros ### | ||
| + | ext_if = "fxp0" | ||
| + | int_if = "{ fxp1 vlan10 vlan11 vlan12 vlan13 vlan14 vlan15 vlan16 vlan17 vlan18 vlan19 vlan20 vlan21 vlan22 vlan23 vlan24 vl$ | ||
| + | gw2_ext = "213.125.94.212" | ||
| + | icmp_types="echoreq" | ||
| + | tcp_services="{ ssh }" | ||
| + | private_networks="{ 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 255.255.255.255/32, 127.0.0.0/8 }" | ||
| + | |||
| + | ### Skip Policy ### | ||
| + | |||
| + | # Skip any filtering if it is on infterface localhost | ||
| + | set skip on lo | ||
| + | |||
| + | ### Block Policy ### | ||
| + | |||
| + | # Provide nice blocked messages | ||
| + | set block-policy return | ||
| + | |||
| + | |||
| + | ### Default Policy ### | ||
| + | |||
| + | # Block all unless a allow rule exists | ||
| + | block in log | ||
| + | block out log | ||
| + | |||
| + | </pre> | ||
Revision as of 12:33, 11 June 2011
| Project: OpenBSD Firewall / PF | |
|---|---|
| Featured: | |
| State | Active |
| Members | Antarez, Vicarious |
| GitHub | No GitHub project defined. Add your project here. |
| Description | building a gateway on openbsd |
| Picture | |
| No project picture! Fill in form Picture or Upload a jpeg here | |
In this talk we will be building a highly available firewalling gateway. It is not a lecture or talk, it's a hands-on workshop.
how to play:
- Log into the wireless network "antareztest"
- SSH to the gateway in that lan (192.168.1.254 or 192.168.1.252)
- Login as "root" password "bier"
- use "tmux a" to attach to the shared session
- break things, discuss, fix things
# PF Rules ACKspace gateway 2
### Macros ###
ext_if = "fxp0"
int_if = "{ fxp1 vlan10 vlan11 vlan12 vlan13 vlan14 vlan15 vlan16 vlan17 vlan18 vlan19 vlan20 vlan21 vlan22 vlan23 vlan24 vl$
gw2_ext = "213.125.94.212"
icmp_types="echoreq"
tcp_services="{ ssh }"
private_networks="{ 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 255.255.255.255/32, 127.0.0.0/8 }"
### Skip Policy ###
# Skip any filtering if it is on infterface localhost
set skip on lo
### Block Policy ###
# Provide nice blocked messages
set block-policy return
### Default Policy ###
# Block all unless a allow rule exists
block in log
block out log