Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [2.1-DEVELOPMENT][[email protected]]/root(2): pfctl -s rules
- scrub in on pppoe0 all fragment reassemble
- scrub in on rl0 all fragment reassemble
- scrub in on gif0 all fragment reassemble
- anchor "relayd/*" all
- block drop in log inet all label "Default deny rule IPv4"
- block drop out log inet all label "Default deny rule IPv4"
- block drop in log inet6 all label "Default deny rule IPv6"
- block drop out log inet6 all label "Default deny rule IPv6"
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echoreq keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echoreq keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
- pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type echorep keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type echorep keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type routeradv keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type echorep keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routersol keep state
- pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type routeradv keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type unreach keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type toobig keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type neighbrsol keep state
- pass quick inet6 proto ipv6-icmp all icmp6-type neighbradv keep state
- block drop quick inet proto tcp from any port = 0 to any
- block drop quick inet proto tcp from any to any port = 0
- block drop quick inet proto udp from any port = 0 to any
- block drop quick inet proto udp from any to any port = 0
- block drop quick inet6 proto tcp from any port = 0 to any
- block drop quick inet6 proto tcp from any to any port = 0
- block drop quick inet6 proto udp from any port = 0 to any
- block drop quick inet6 proto udp from any to any port = 0
- block drop quick from <snort2c> to any label "Block snort2c hosts"
- block drop quick from any to <snort2c> label "Block snort2c hosts"
- block drop in log quick proto tcp from <sshlockout> to any port = ssh label "sshlockout"
- block drop in log quick proto tcp from <webConfiguratorlockout> to any port = http label "webConfiguratorlockout"
- block drop in quick from <virusprot> to any label "virusprot overload table"
- block drop in log quick on pppoe0 from <bogons> to any label "block bogon IPv4 networks from WAN"
- block drop in log quick on pppoe0 from <bogonsv6> to any label "block bogon IPv6 networks from WAN"
- block drop in on ! pppoe0 inet from 60.xxx.xxx.xxx to any
- block drop in inet from 60.xxx.xxx.xxx to any
- block drop in on pppoe0 inet6 from fe80::205:5dff:fe7b:b589 to any
- block drop in log quick on pppoe0 inet from 10.0.0.0/8 to any label "Block private networks from WAN block 10/8"
- block drop in log quick on pppoe0 inet from 127.0.0.0/8 to any label "Block private networks from WAN block 127/8"
- block drop in log quick on pppoe0 inet from 172.16.0.0/12 to any label "Block private networks from WAN block 172.16/12"
- block drop in log quick on pppoe0 inet from 192.168.0.0/16 to any label "Block private networks from WAN block 192.168/16"
- block drop in log quick on pppoe0 inet6 from fc00::/7 to any label "Block ULA networks from WAN block fc00::/7"
- block drop in on ! rl0 inet6 from 2001:470:35:bd::/64 to any
- block drop in on rl0 inet6 from fe80::2e0:56ff:fe4d:1427 to any
- block drop in inet6 from 2001:470:35:bd::2:1 to any
- block drop in on ! rl0 inet from 192.168.0.0/24 to any
- block drop in inet from 192.168.0.1 to any
- pass in on rl0 inet proto udp from any port = bootpc to 255.255.255.255 port = bootps keep state label "allow access to DHCP server"
- pass in on rl0 inet proto udp from any port = bootpc to 192.168.0.1 port = bootps keep state label "allow access to DHCP server"
- pass out on rl0 inet proto udp from 192.168.0.1 port = bootps to any port = bootpc keep state label "allow access to DHCP server"
- anchor "dhcpv6serverLAN" all
- pass in on rl0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
- pass in on rl0 inet6 proto udp from fe80::/10 to ff02::/16 port = dhcpv6-server keep state label "allow access to DHCPv6 server"
- pass in on rl0 inet6 proto udp from fe80::/10 to 2001:470:35:bd::2:1 port = dhcpv6-client keep state label "allow access to DHCPv6 server"
- pass out on rl0 inet6 proto udp from 2001:470:35:bd::2:1 port = dhcpv6-server to fe80::/10 keep state label "allow access to DHCPv6 server"
- pass in on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
- pass out on lo0 inet all flags S/SA keep state label "pass IPv4 loopback"
- pass in on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
- pass out on lo0 inet6 all flags S/SA keep state label "pass IPv6 loopback"
- pass out inet all flags S/SA keep state allow-opts label "let out anything IPv4 from firewall host itself"
- pass out inet6 all flags S/SA keep state allow-opts label "let out anything IPv6 from firewall host itself"
- pass out route-to (pppoe0 219.xxx.xxx.xxx) inet from 60.xxx.xxx.xxx to ! 60.xxx.xxx.xxx flags S/SA keep state allow-opts label "let out anything from firewall host itself"
- pass out route-to (gif0 2001:470:35:bd::1) inet6 from 2001:470:35:bd::2 to ! 2001:470:35:bd::/126 flags S/SA keep state allow-opts label "let out anything from firewall host itself"
- pass in quick on rl0 proto tcp from any to (rl0) port = http flags S/SA keep state label "anti-lockout rule"
- pass in quick on rl0 proto tcp from any to (rl0) port = ssh flags S/SA keep state label "anti-lockout rule"
- anchor "userrules/*" all
- pass in quick on pppoe0 inet6 from any to 2001:470:35:bd::/126 flags S/SA keep state label "USER_RULE"
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto icmp from 66.220.2.74 to 60.xxx.xxx.xxx keep state label "USER_RULE"
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto icmp from 66.220.18.42 to 60.xxx.xxx.xxx keep state label "USER_RULE"
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto tcp from any to 192.168.0.20 port = 59177 flags S/SA keep state label "USER_RULE"
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto udp from any to 192.168.0.20 port = 59177 keep state label "USER_RULE"
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto tcp from any to 192.168.0.20 flags S/SA keep state label "USER_RULE: NAT "
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto tcp from any to 192.168.0.20 flags S/SA keep state label "USER_RULE: NAT "
- pass in quick on pppoe0 reply-to (pppoe0 219.xxx.xxx.xxx) inet proto tcp from any to 192.168.0.20 flags S/SA keep state label "USER_RULE: NAT "
- pass in quick on rl0 inet from 192.168.0.0/24 to any flags S/SA keep state label "USER_RULE: Default allow LAN to any rule"
- pass in quick on rl0 inet6 all flags S/SA keep state label "USER_RULE"
- anchor "tftp-proxy/*" all
- [2.1-DEVELOPMENT][[email protected]]/root(3):
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement