diff options
| author | rebortg <github@ghlr.de> | 2023-09-12 22:16:59 +0200 | 
|---|---|---|
| committer | rebortg <github@ghlr.de> | 2023-09-12 22:16:59 +0200 | 
| commit | 686a2597f4b1b23a36792bca261d4f901024960e (patch) | |
| tree | 6f5fe07949eecce2c2644c830befe9f879437493 /docs/quick-start.rst | |
| parent | 975df767347a2d6abe2c789824250a8e2fcbd3eb (diff) | |
| parent | 4533a8f8ff1639a50b30f031cea8270bcf04e3ed (diff) | |
| download | vyos-documentation-686a2597f4b1b23a36792bca261d4f901024960e.tar.gz vyos-documentation-686a2597f4b1b23a36792bca261d4f901024960e.zip | |
Merge branch 'master' of github.com:vyos/vyos-documentation
Diffstat (limited to 'docs/quick-start.rst')
| -rw-r--r-- | docs/quick-start.rst | 68 | 
1 files changed, 39 insertions, 29 deletions
| diff --git a/docs/quick-start.rst b/docs/quick-start.rst index 19be7b66..a6055576 100644 --- a/docs/quick-start.rst +++ b/docs/quick-start.rst @@ -122,6 +122,15 @@ network via IP masquerade.  Firewall  ######## +.. note:: Starting from VyOS 1.4-rolling-202308040557, a new firewall +   structure can be found on all vyos instalations. Documentation for most +   of the new firewall CLI can be found in the `firewall +   <https://docs.vyos.io/en/latest/configuration/firewall/general.html>`_ +   chapter. The legacy firewall is still available for versions before +   1.4-rolling-202308040557 and can be found in the :ref:`firewall-legacy` +   chapter. The examples in this section use the new firewall configuration +   commands. +  Add a set of firewall policies for our outside/WAN interface.  This configuration creates a proper stateful firewall that blocks all traffic @@ -129,19 +138,25 @@ which was not initiated from the internal/LAN side first.  .. code-block:: none -  set firewall name OUTSIDE-IN default-action 'drop' -  set firewall name OUTSIDE-IN rule 10 action 'accept' -  set firewall name OUTSIDE-IN rule 10 state established 'enable' -  set firewall name OUTSIDE-IN rule 10 state related 'enable' - -  set firewall name OUTSIDE-LOCAL default-action 'drop' -  set firewall name OUTSIDE-LOCAL rule 10 action 'accept' -  set firewall name OUTSIDE-LOCAL rule 10 state established 'enable' -  set firewall name OUTSIDE-LOCAL rule 10 state related 'enable' -  set firewall name OUTSIDE-LOCAL rule 20 action 'accept' -  set firewall name OUTSIDE-LOCAL rule 20 icmp type-name 'echo-request' -  set firewall name OUTSIDE-LOCAL rule 20 protocol 'icmp' -  set firewall name OUTSIDE-LOCAL rule 20 state new 'enable' +  set firewall ipv4 forward filter default-action 'drop' +  set firewall ipv4 forward filter rule 10 action 'accept' +  set firewall ipv4 forward filter rule 10 state established 'enable' +  set firewall ipv4 forward filter rule 10 state related 'enable' +  set firewall ipv4 forward filter rule 20 action 'drop' +  set firewall ipv4 forward filter rule 20 state invalid 'enable' +  set firewall ipv4 forward filter rule 30 inbound-interface interface-name 'eth1' +  set firewall ipv4 forward filter rule 30 action 'accept' + +  set firewall ipv4 input filter default-action drop +  set firewall ipv4 input filter rule 10 action 'accept' +  set firewall ipv4 input filter rule 10 state established 'enable' +  set firewall ipv4 input filter rule 10 state related 'enable' +  set firewall ipv4 input filter rule 20 action 'drop' +  set firewall ipv4 input filter rule 20 state invalid 'enable' +  set firewall ipv4 input filter rule 30 action 'accept' +  set firewall ipv4 input filter rule 30 icmp type-name 'echo-request' +  set firewall ipv4 input filter rule 30 protocol 'icmp' +  set firewall ipv4 input filter rule 30 state new 'enable'  If you wanted to enable SSH access to your firewall from the outside/WAN  interface, you could create some additional rules to allow that kind of @@ -152,24 +167,19 @@ blocks brute-forcing attempts:  .. code-block:: none -  set firewall name OUTSIDE-LOCAL rule 30 action 'drop' -  set firewall name OUTSIDE-LOCAL rule 30 destination port '22' -  set firewall name OUTSIDE-LOCAL rule 30 protocol 'tcp' -  set firewall name OUTSIDE-LOCAL rule 30 recent count '4' -  set firewall name OUTSIDE-LOCAL rule 30 recent time 'minute' -  set firewall name OUTSIDE-LOCAL rule 30 state new 'enable' - -  set firewall name OUTSIDE-LOCAL rule 31 action 'accept' -  set firewall name OUTSIDE-LOCAL rule 31 destination port '22' -  set firewall name OUTSIDE-LOCAL rule 31 protocol 'tcp' -  set firewall name OUTSIDE-LOCAL rule 31 state new 'enable' +  set firewall ipv4 input filter rule 40 action 'drop' +  set firewall ipv4 input filter rule 40 inbound-interface interface-name 'eth0' +  set firewall ipv4 input filter rule 40 destination port '22' +  set firewall ipv4 input filter rule 40 protocol 'tcp' +  set firewall ipv4 input filter rule 40 recent count '4' +  set firewall ipv4 input filter rule 40 recent time 'minute' +  set firewall ipv4 input filter rule 40 state new 'enable' -Apply the firewall policies: - -.. code-block:: none +  set firewall ipv4 input filter rule 41 action 'accept' +  set firewall ipv4 input filter rule 41 destination port '22' +  set firewall ipv4 input filter rule 41 protocol 'tcp' +  set firewall ipv4 input filter rule 41 state new 'enable' -  set firewall interface eth0 in name 'OUTSIDE-IN' -  set firewall interface eth0 local name 'OUTSIDE-LOCAL'  Commit changes, save the configuration, and exit configuration mode: | 
