Advertisement
Guest User

SuSEfirewall2 configuration for masquerading

a guest
Apr 24th, 2013
127
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 32.97 KB | None | 0 0
  1. # Copyright (c) 2000-2002 SuSE GmbH Nuernberg, Germany.  All rights reserved.
  2. # Copyright (c) 2003,2004 SuSE Linux AG Nuernberg, Germany.  All rights reserved.
  3. # Copyright (c) 2005-2007 SUSE LINUX Products GmbH Nuernberg, Germany.  All rights reserved.
  4. #
  5. # Author: Marc Heuse, 2002
  6. #         Ludwig Nussel, 2004-2007
  7. #
  8. # /etc/sysconfig/SuSEfirewall2
  9. #
  10. # for use with /sbin/SuSEfirewall2 version 3.6
  11. #
  12. # ------------------------------------------------------------------------     #
  13. # PLEASE NOTE THE FOLLOWING:
  14. #
  15. # Just by configuring these settings and using the SuSEfirewall2 you
  16. # are not secure per se! There is *not* such a thing you install and
  17. # hence you are saved from all (security) hazards.
  18. #
  19. # To ensure your security, you need also:
  20. #
  21. #   * Secure all services you are offering to untrusted networks
  22. #     (internet) You can do this by using software which has been
  23. #     designed with security in mind (like postfix, vsftpd, ssh),
  24. #     setting these up without misconfiguration and praying, that
  25. #     they have got really no holes. Apparmor can help in
  26. #     most circumstances to reduce the risk.
  27. #   * Do not run untrusted software. (philosophical question, can
  28. #     you trust SuSE or any other software distributor?)
  29. #   * Check the security of your server(s) regulary
  30. #   * If you are using this server as a firewall/bastion host to the
  31. #     internet for an internal network, try to run proxy services
  32. #     for everything and disable routing on this machine.
  33. #   * If you run DNS on the firewall: disable untrusted zone
  34. #     transfers and either don't allow access to it from the
  35. #     internet or run it split-brained.
  36. #
  37. # Good luck!
  38. #
  39. # Yours,
  40. #   SuSE Security Team
  41. #
  42. # ------------------------------------------------------------------------
  43. #
  44. # Configuration HELP:
  45. #
  46. # If you have got any problems configuring this file, take a look at
  47. # /usr/share/doc/packages/SuSEfirewall2/EXAMPLES or use YaST
  48. #
  49. #
  50. # If you are an end-user who is NOT connected to two networks (read:
  51. # you have got a single user system and are using a dialup to the
  52. # internet) you just have to configure (all other settings are OK):
  53. # 2) and maybe 9).
  54. #
  55. # If this server is a firewall, which should act like a proxy (no direct
  56. # routing between both networks), or you are an end-user connected to the
  57. # internet and to an internal network, you have to setup your proxys and
  58. # reconfigure (all other settings are OK): 2), 3), 9) and maybe 7), 11), 14)
  59. #
  60. # If this server is a firewall, and should do routing/masquerading between
  61. # the untrusted and the trusted network, you have to reconfigure (all other
  62. # settings are OK): 2), 3), 5), 6), 9), and maybe 7), 10), 11), 12), 13),
  63. # 14)
  64. #
  65. # If you want to run a DMZ in either of the above three standard setups, you
  66. # just have to configure *additionally* 4), 9), 12), 13), 18)
  67. #
  68. # Please note that if you use service names, they have to exist in
  69. # /etc/services. There is for example no service "dns", it's called
  70. # "domain"; email is called "smtp" etc.
  71. #
  72. # ------------------------------------------------------------------------
  73.  
  74. ## Path:    Network/Firewall/SuSEfirewall2
  75. ## Description: SuSEfirewall2 configuration
  76. ## Type:    string
  77. ## Default: any
  78. #
  79. # 2.)
  80. # Which are the interfaces that point to the internet/untrusted
  81. # networks?
  82. #
  83. # Enter all untrusted network devices here
  84. #
  85. # Format: space separated list of interface or configuration names
  86. #
  87. # The special keyword "any" means that packets arriving on interfaces not
  88. # explicitly configured as int, ext or dmz will be considered external. Note:
  89. # this setting only works for packets destined for the local machine. If you
  90. # want forwarding or masquerading you still have to add the external interfaces
  91. # individually. "any" can be mixed with other interface names.
  92. #
  93. # Examples: "ippp0 ippp1", "any dsl0"
  94. #
  95. # Note: alias interfaces (like eth0:1) are ignored
  96. #
  97. FW_DEV_EXT="eth0"
  98.  
  99. ## Type:    string
  100. #
  101. # 3.)
  102. # Which are the interfaces that point to the internal network?
  103. #
  104. # Enter all trusted network interfaces here. If you are not
  105. # connected to a trusted network (e.g. you have just a dialup) leave
  106. # this empty.
  107. #
  108. # Format: space separated list of interface or configuration names
  109. #
  110. # Examples: "tr0", "eth0 eth1"
  111. #
  112. FW_DEV_INT="eth1"
  113.  
  114. ## Type:    string
  115. #
  116. # 4.)
  117. # Which are the interfaces that point to the dmz or dialup network?
  118. #
  119. # Enter all the network devices here which point to the dmz/dialups.
  120. # A "dmz" is a special, seperated network, which is only connected
  121. # to the firewall, and should be reachable from the internet to
  122. # provide services, e.g. WWW, Mail, etc. and hence is at risk from
  123. # attacks. See /usr/share/doc/packages/SuSEfirewall2/EXAMPLES for an
  124. # example.
  125. #
  126. # Note: You have to configure FW_FORWARD to define the services
  127. # which should be available to the internet and set FW_ROUTE to yes.
  128. #
  129. # Format: space separated list of interface or configuration names
  130. #
  131. # Examples: "tr0", "eth0 eth1"
  132. #
  133. FW_DEV_DMZ=""
  134.  
  135. ## Type:    yesno
  136. ## Default: no
  137. #
  138. # 5.)
  139. # Should routing between the internet, dmz and internal network be
  140. # activated?
  141. #
  142. # Set this to "yes" if you either want to masquerade internal
  143. # machines or allow access to the dmz (or internal machines, but
  144. # this is not a good idea).
  145. #
  146. # This option overrides IP_FORWARD from
  147. # /etc/sysconfig/network/options
  148. #
  149. # Setting this option one alone doesn't do anything. Either activate
  150. # masquerading with FW_MASQUERADE below if you want to masquerade
  151. # your internal network to the internet, or configure FW_FORWARD to
  152. # define what is allowed to be forwarded. You also need to define
  153. # internal or dmz interfaces in FW_DEV_INT or FW_DEV_DMZ.
  154. #
  155. # defaults to "no" if not set
  156. #
  157. FW_ROUTE="yes"
  158.  
  159. ## Type:    yesno
  160. ## Default: no
  161. #
  162. # 6.)
  163. # Do you want to masquerade internal networks to the outside?
  164. #
  165. # Requires: FW_DEV_INT or FW_DEV_DMZ, FW_ROUTE, FW_MASQ_DEV
  166. #
  167. # "Masquerading" means that all your internal machines which use
  168. # services on the internet seem to come from your firewall. Please
  169. # note that it is more secure to communicate via proxies to the
  170. # internet than to use masquerading.
  171. #
  172. # This option is required for FW_MASQ_NETS and FW_FORWARD_MASQ.
  173. #
  174. # defaults to "no" if not set
  175. #
  176. FW_MASQUERADE="yes"
  177.  
  178. ## Type:    string
  179. ## Default:     zone:ext
  180. #
  181. # 6a.)
  182. # You also have to define on which interfaces to masquerade on.
  183. # Those are usually the same as the external interfaces. Most users
  184. # can leave the default.
  185. #
  186. # The special string "zone:" concatenated with the name of a zone
  187. # means to take all interfaces in the specified zone.
  188. #
  189. # Old version of SuSEfirewall2 used a shell variable ($FW_DEV_EXT)
  190. # here. That method is deprecated as it breaks auto detection of
  191. # interfaces. Please use zone:ext instead.
  192. #
  193. # Examples: "ippp0", "zone:ext"
  194. #
  195. FW_MASQ_DEV="zone:ext"
  196.  
  197. ## Type:    string
  198. ## Default: 0/0
  199. #
  200. # Which internal computers/networks are allowed to access the
  201. # internet via masquerading (not via proxys on the firewall)?
  202. #
  203. # Format: space separated list of
  204. #  <source network>[,<destination network>,<protocol>[,port[:port]]
  205. #  
  206. #  If the protocol is icmp then port is interpreted as icmp type
  207. #
  208. # Examples: - "0/0" unrestricted access to the internet
  209. #           - "10.0.0.0/8" allows the whole 10.0.0.0 network with
  210. #             unrestricted access.
  211. #           - "10.0.1.0/24,0/0,tcp,80 10.0.1.0/24,0/0,tcp,21" allows
  212. #             the 10.0.1.0 network to use www/ftp to the internet. -
  213. #           - "10.0.1.0/24,0/0,tcp,1024:65535 10.0.2.0/24" the
  214. #             10.0.1.0/24 network is allowed to access unprivileged
  215. #             ports whereas 10.0.2.0/24 is granted unrestricted
  216. #             access.
  217. #           - "0/0,!10.0.0.0/8" unrestricted access to the internet
  218. #             with the exception of 10.0.0.8 which will not be
  219. #             masqueraded.
  220. #          
  221. FW_MASQ_NETS=""
  222.  
  223. ## Type:    string
  224. ## Default: 0/0
  225. #
  226. # Which computers/networks should be excluded from beeing masqueraded?
  227. # Note that this only affects the POSTROUTING chain of the nat
  228. # table. Ie the forwarding rules installed by FW_MASQ_NETS do not
  229. # include the listed exceptions.
  230. # *** Since you may use FW_NOMASQ_NETS together with IPsec make sure
  231. # that the policy database is loaded even when the tunnel is not up
  232. # yet. Otherwise packets to the listed networks will be forwarded to
  233. # the internet unencrypted! ***
  234. #
  235. # Format: space separated list of
  236. #  <source network>[,<destination network>,<protocol>[,port[:port]]
  237. #  
  238. #  If the protocol is icmp then port is interpreted as icmp type
  239. #
  240. # Examples: - "0/0,10.0.0.0/8" do not masquerade packets from
  241. #             anywhere to the 10.0.0.0/8 network
  242. #          
  243. FW_NOMASQ_NETS=""
  244.  
  245. ## Type:    yesno
  246. ## Default: no
  247. #
  248. # 7.)
  249. # Do you want to protect the firewall from the internal network?
  250. # Requires: FW_DEV_INT
  251. #
  252. # If you set this to "yes", internal machines may only access
  253. # services on the firewall you explicitly allow. If you set this to
  254. # "no", any internal user can connect (and attack) any service on
  255. # the firewall.
  256. #
  257. # defaults to "yes" if not set
  258. #
  259. # see also FW_REJECT_INT
  260. #
  261. FW_PROTECT_FROM_INT="no"
  262.  
  263. ## Type:    string
  264. #
  265. # 9.)
  266. # Which TCP services _on the firewall_ should be accessible from
  267. # untrusted networks?
  268. #
  269. # Enter all ports or known portnames below, seperated by a space.
  270. # TCP services (e.g. SMTP, WWW) must be set in FW_SERVICES_*_TCP, and
  271. # UDP services (e.g. syslog) must be set in FW_SERVICES_*_UDP.
  272. # e.g. if a webserver on the firewall should be accessible from the internet:
  273. # FW_SERVICES_EXT_TCP="www"
  274. # e.g. if the firewall should receive syslog messages from the dmz:
  275. # FW_SERVICES_DMZ_UDP="syslog"
  276. # For IP protocols (like GRE for PPTP, or OSPF for routing) you need to set
  277. # FW_SERVICES_*_IP with the protocol name or number (see /etc/protocols)
  278. #
  279. # Format: space separated list of ports, port ranges or well known
  280. #         service names (see /etc/services)
  281. #
  282. # Examples: "ssh", "123 514", "3200:3299", "ftp 22 telnet 512:514"
  283. #
  284. FW_SERVICES_EXT_TCP="443 80"
  285.  
  286. ## Type:    string
  287. #
  288. # Which UDP services _on the firewall_ should be accessible from
  289. # untrusted networks?
  290. #
  291. # see comments for FW_SERVICES_EXT_TCP
  292. #
  293. # Example: "53"
  294. #
  295. FW_SERVICES_EXT_UDP=""
  296.  
  297. ## Type:    string
  298. #
  299. # Which UDP services _on the firewall_ should be accessible from
  300. # untrusted networks?
  301. #
  302. # Usually for VPN/Routing which END at the firewall
  303. #
  304. # Example: "esp"
  305. #
  306. FW_SERVICES_EXT_IP=""
  307.  
  308. ## Type:        string
  309. #
  310. # Which RPC services _on the firewall_ should be accessible from
  311. # untrusted networks?
  312. #
  313. # Port numbers of RPC services are dynamically assigned by the
  314. # portmapper. Therefore "rpcinfo -p localhost" has to be used to
  315. # automatically determine the currently assigned port for the
  316. # services specified here.
  317. #
  318. # USE WITH CAUTION!
  319. # regular users can register rpc services and therefore may be able
  320. # to have SuSEfirewall2 open arbitrary ports
  321. #
  322. # Example: "mountd nfs"
  323. FW_SERVICES_EXT_RPC=""
  324.  
  325. ## Type:        string
  326. #
  327. # Which services _on the firewall_ should be accessible from
  328. # untrusted networks?
  329. #
  330. # Packages can drop a configuration file that specifies all required
  331. # ports into /usr/share/SuSEfirewall2/services . That is handy for
  332. # services that require multiple ports or protocols. Enter the space
  333. # separated list of configuration files you want to load.
  334. #
  335. # Example: "samba-server nfs-server"
  336. FW_CONFIGURATIONS_EXT="sshd"
  337.  
  338. ## Type:    string
  339. #
  340. # see comments for FW_SERVICES_EXT_TCP
  341. FW_SERVICES_DMZ_TCP=""
  342.  
  343. ## Type:    string
  344. #
  345. # see comments for FW_SERVICES_EXT_UDP
  346. FW_SERVICES_DMZ_UDP=""
  347.  
  348. ## Type:    string
  349. #
  350. # see comments for FW_SERVICES_EXT_IP
  351. FW_SERVICES_DMZ_IP=""
  352.  
  353. ## Type:        string
  354. #
  355. # see comments for FW_SERVICES_EXT_RPC
  356. FW_SERVICES_DMZ_RPC=""
  357.  
  358. ## Type:        string
  359. #
  360. # see comments for FW_CONFIGURATIONS_EXT
  361. FW_CONFIGURATIONS_DMZ=""
  362.  
  363. ## Type:    string
  364. #
  365. # see comments for FW_SERVICES_EXT_TCP
  366. FW_SERVICES_INT_TCP=""
  367.  
  368. ## Type:    string
  369. #
  370. # see comments for FW_SERVICES_EXT_UDP
  371. FW_SERVICES_INT_UDP=""
  372.  
  373. ## Type:    string
  374. #
  375. # see comments for FW_SERVICES_EXT_IP
  376. FW_SERVICES_INT_IP=""
  377.  
  378. ## Type:        string
  379. #
  380. # see comments for FW_SERVICES_EXT_RPC
  381. FW_SERVICES_INT_RPC=""
  382.  
  383. ## Type:        string
  384. #
  385. # see comments for FW_CONFIGURATIONS_EXT
  386. FW_CONFIGURATIONS_INT=""
  387.  
  388. ## Type: string
  389. #
  390. # Packets to silently drop without log message
  391. #
  392. # Format: space separated list of net,protocol[,port][,sport]
  393. # Example: "0/0,tcp,445 0/0,udp,4662"
  394. #
  395. # The special value _rpc_ is recognized as protocol and means that dport is
  396. # interpreted as rpc service name. See FW_SERVICES_EXT_RPC for
  397. # details.
  398. #
  399. FW_SERVICES_DROP_EXT=""
  400.  
  401. ## Type: string
  402. ## Default: 0/0,tcp,113
  403. #
  404. # Packets to silently reject without log message. Common usage is
  405. # TCP port 113 which if dropped would cause long timeouts when
  406. # sending mail or connecting to IRC servers.
  407. #
  408. # Format: space separated list of net,protocol[,dport][,sport]
  409. # Example: "0/0,tcp,113"
  410. #
  411. # The special value _rpc_ is recognized as protocol and means that dport is
  412. # interpreted as rpc service name. See FW_SERVICES_EXT_RPC for
  413. # details.
  414. #
  415. FW_SERVICES_REJECT_EXT="0/0,tcp,113"
  416.  
  417. ## Type: string
  418. ## Default:
  419. #
  420. # Services to allow. This is a more generic form of FW_SERVICES_{IP,UDP,TCP}
  421. # and more specific than FW_TRUSTED_NETS
  422. #
  423. # Format: space separated list of net,protocol[,dport[,sport[,flags]]]
  424. # Example: "0/0,tcp,22"
  425. #
  426. # Supported flags are
  427. #   hitcount=NUMBER     : ipt_recent --hitcount parameter
  428. #   blockseconds=NUMBER : ipt_recent --seconds parameter
  429. #   recentname=NAME     : ipt_recent --name parameter
  430. # Example:
  431. #    Allow max three ssh connects per minute from the same IP address:
  432. #      "0/0,tcp,22,,hitcount=3,blockseconds=60,recentname=ssh"
  433. #
  434. # The special value _rpc_ is recognized as protocol and means that dport is
  435. # interpreted as rpc service name. See FW_SERVICES_EXT_RPC for
  436. # details.
  437. #
  438. FW_SERVICES_ACCEPT_EXT=""
  439.  
  440. ## Type:    string
  441. #
  442. # 10.)
  443. # Which services should be accessible from 'trusted' hosts or nets?
  444. #
  445. # Define trusted hosts or networks (doesn't matter whether they are internal or
  446. # external) and the services (tcp,udp,icmp) they are allowed to use. This can
  447. # be used instead of FW_SERVICES_* for further access restriction. Please note
  448. # that this is no replacement for authentication since IP addresses can be
  449. # spoofed. Also note that trusted hosts/nets are not allowed to ping the
  450. # firewall until you also permit icmp.
  451. #
  452. # Format: space separated list of network[,protocol[,port]]
  453. # in case of icmp, port means the icmp type
  454. #
  455. # Example: "172.20.1.1 172.20.0.0/16 1.1.1.1,icmp 2.2.2.2,tcp,22"
  456. #
  457. FW_TRUSTED_NETS=""
  458.  
  459. ## Type:    string
  460. ## Default:
  461. #
  462. # 11.)
  463. # Specify which ports are allowed to access unprivileged ports (>1023)
  464. #
  465. # Format: yes, no or space separated list of ports
  466. #
  467. # You may either allow everyone from anyport access to your highports ("yes"),
  468. # disallow anyone ("no"), anyone who comes from a defined port (portnumber or
  469. # known portname). Note that this is easy to circumvent! The best choice is to
  470. # keep this option unset or set to 'no'
  471. #
  472. # defaults to "no" if not set (good choice)
  473. #
  474. # Note: Use of this variable is deprecated and it will likely be
  475. # removed in the future. If you think it should be kept please
  476. # report your use case at
  477. # http://forge.novell.com/modules/xfmod/project/?susefirewall2
  478. #
  479. FW_ALLOW_INCOMING_HIGHPORTS_TCP=""
  480.  
  481. ## Type:    string
  482. ## Default:
  483. #
  484. # See FW_ALLOW_INCOMING_HIGHPORTS_TCP
  485. #
  486. # defaults to "no" if not set (good choice)
  487. #
  488. # Note: Use of this variable is deprecated and it will likely be
  489. # removed in the future. If you think it should be kept please
  490. # report your use case at
  491. # http://forge.novell.com/modules/xfmod/project/?susefirewall2
  492. #
  493. FW_ALLOW_INCOMING_HIGHPORTS_UDP=""
  494.  
  495. ## Type:    string
  496. #
  497. # 13.)
  498. # Which services or networks are allowed to be routed through the
  499. # firewall, no matter which zone they are in?
  500. # Requires: FW_ROUTE
  501. #
  502. # With this option you may allow access to e.g. your mailserver. The
  503. # machines must have valid, non-private, IP addresses which were
  504. # assigned to you by your ISP. This opens a direct link to the
  505. # specified network, so please think twice befor using this option!
  506. #
  507. # Format: space separated list of
  508. #    <source network>,<destination network>[,protocol[,port[,flags]]]
  509. #
  510. #  If the protocol is icmp then port is interpreted as icmp type
  511. #
  512. #  The only flag currently supported is 'ipsec' which means to only
  513. #  match packets that originate from an IPsec tunnel
  514. #
  515. # Examples: - "1.1.1.1,2.2.2.2" allow the host 1.1.1.1 to access any
  516. #             service on the host 2.2.2.2
  517. #           - "3.3.3.3/16,4.4.4.4/24" allow the network 3.3.3.3/16
  518. #             to access any service in the network 4.4.4.4/24
  519. #           - "5.5.5.5,6.6.6.6,igmp" allow routing of IGMP messages
  520. #              from 5.5.5.5 to 6.6.6.6
  521. #           - "0/0,0/0,udp,514" always permit udp port 514 to pass
  522. #             the firewall
  523. #           - "192.168.1.0/24,10.10.0.0/16,,,ipsec \
  524. #              10.10.0.0/16,192.168.1.0/24,,,ipsec" permit traffic
  525. #              from 192.168.1.0/24 to 10.10.0.0/16 and vice versa
  526. #              provided that both networks are connected via an
  527. #              IPsec tunnel.
  528. #           - "fd76:9dbb:91a3:1::/64,fd76:9dbb:91a3:4::/64,tcp,ssh"
  529. #              allow ssh from one IPv6 network to another
  530. #
  531. FW_FORWARD=""
  532.  
  533. ## Type:    string
  534. #
  535. # 13a.)
  536. #
  537. # same as FW_FORWARD but packages are rejected instead of accepted
  538. #
  539. # Requires: FW_ROUTE
  540. #
  541. FW_FORWARD_REJECT=""
  542.  
  543. ## Type:    string
  544. #
  545. # 13b.)
  546. #
  547. # same as FW_FORWARD but packages are dropped instead of accepted
  548. #
  549. # Requires: FW_ROUTE
  550. #
  551. FW_FORWARD_DROP=""
  552.  
  553. ## Type:    string
  554. #
  555. # 14.)
  556. # Which services accessed from the internet should be allowed to masqueraded
  557. # servers (on the internal network or dmz)?
  558. # Requires: FW_ROUTE
  559. #
  560. # With this option you may allow access to e.g. your mailserver. The
  561. # machines must be in a masqueraded segment and may not have public
  562. # IP addesses! Hint: if FW_DEV_MASQ is set to the external interface
  563. # you have to set FW_FORWARD from internal to DMZ for the service as
  564. # well to allow access from internal!
  565. #
  566. # Please note that this should *not* be used for security reasons!
  567. # You are opening a hole to your precious internal network. If e.g.
  568. # the webserver there is compromised - your full internal network is
  569. # compromised!
  570. #
  571. # Format: space separated list of
  572. #    <source network>,<ip to forward to>,<protocol>,<port>[,redirect port,[destination ip]]
  573. #
  574. # Protocol must be either tcp or udp
  575. #
  576. # Examples: - "4.0.0.0/8,10.0.0.10,tcp,80" forward all tcp request on
  577. #             port 80 coming from the 4.0.0.0/8 network to the
  578. #             internal server 10.10.0.10
  579. #           - "4.0.0.0/8,10.0.0.10,tcp,80,81" forward all tcp request on
  580. #             port 80 coming from the 4.0.0.0/8 network to the
  581. #             internal server 10.10.0.10 on port 81
  582. #           - "200.200.200.0/24,10.0.0.10,tcp,80,81,202.202.202.202"
  583. #             the network 200.200.200.0/24 trying to access the
  584. #             address 202.202.202.202 on port 80 will be forwarded
  585. #             to the internal server 10.0.0.10 on port 81
  586. #
  587. # Note: du to inconsitent iptables behaviour only port numbers are possible but
  588. # no service names (https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=273)
  589. #
  590. FW_FORWARD_MASQ=""
  591.  
  592. ## Type:    string
  593. #
  594. # 15.)
  595. # Which accesses to services should be redirected to a local port on
  596. # the firewall machine?
  597. #
  598. # This option can be used to force all internal users to surf via
  599. # your squid proxy, or transparently redirect incoming webtraffic to
  600. # a secure webserver.
  601. #
  602. # Format: list of <source network>[,<destination network>,<protocol>[,dport[:lport]]
  603. # Where protocol is either tcp or udp. dport is the original
  604. # destination port and lport the port on the local machine to
  605. # redirect the traffic to
  606. #
  607. # An exclamation mark in front of source or destination network
  608. # means everything EXCEPT the specified network
  609. #
  610. # Example: "10.0.0.0/8,0/0,tcp,80,3128 0/0,172.20.1.1,tcp,80,8080"
  611. #
  612. # Note: contrary to previous SuSEfirewall2 versions it is no longer necessary
  613. # to additionally open the local port
  614. FW_REDIRECT=""
  615.  
  616. ## Type:    yesno
  617. ## Default: yes
  618. #
  619. # 16.)
  620. # Which kind of packets should be logged?
  621. #
  622. # When set to "yes", packages that got dropped and are considered
  623. # 'critical' will be logged. Such packets include for example
  624. # spoofed packets, tcp connection requests and certain icmp types.
  625. #
  626. # defaults to "yes" if not set
  627. #
  628. FW_LOG_DROP_CRIT="yes"
  629.  
  630. ## Type:    yesno
  631. ## Default: no
  632. #
  633. # whether all dropped packets should be logged
  634. #
  635. # Note: for broadcasts to be logged you also need to set
  636. # FW_IGNORE_FW_BROADCAST_* to 'no'
  637. #
  638. # defaults to "no" if not set
  639. #
  640. FW_LOG_DROP_ALL="no"
  641.  
  642. ## Type:    yesno
  643. ## Default: yes
  644. #
  645. # When set to "yes", packages that got accepted and are considered
  646. # 'critical' will be logged. Such packets include for example tcp
  647. # connection requests, rpc connection requests, access to high
  648. # udp/tcp port and forwarded pakets.
  649. #
  650. # defaults to "yes" if not set
  651. #
  652. FW_LOG_ACCEPT_CRIT="yes"
  653.  
  654. ## Type:    yesno
  655. ## Default: no
  656. #
  657. # whether all accepted packets should be logged
  658. #
  659. # Note: setting this to 'yes' causes _LOTS_ of log entries and may
  660. # fill your disk quickly. It also disables FW_LOG_LIMIT
  661. #
  662. # defaults to "no" if not set
  663. #
  664. FW_LOG_ACCEPT_ALL="no"
  665.  
  666. ## Type:    string
  667. #
  668. # How many packets per time unit get logged for each logging rule.
  669. # When empty a default of 3/minute is used to prevent port scans
  670. # flooding your log files. For desktop usage it's a good idea to
  671. # have the limit, if you are using logfile analysis tools however
  672. # you might want to disable it.
  673. #
  674. # Set to 'no' to disable the rate limit. Setting FW_LOG_ACCEPT_ALL
  675. # to 'yes' disables this option as well.
  676. #
  677. # Format: a digit and suffix /second, /minute, /hour or /day
  678. FW_LOG_LIMIT=""
  679.  
  680. ## Type:    string
  681. #
  682. # iptables logging option. Must end with --log-prefix and some prefix
  683. # characters
  684. #
  685. # You may specify an alternative logging target by starting the
  686. # string with "-j ". E.g. "-j ULOG --ulog-prefix SFW2"
  687. #
  688. # only change this if you know what you are doing!
  689. FW_LOG=""
  690.  
  691. ## Type:    yesno
  692. ## Default: yes
  693. #
  694. # 17.)
  695. # Do you want to enable additional kernel TCP/IP security features?
  696. # If set to yes, some obscure kernel options are set.
  697. # (icmp_ignore_bogus_error_responses, icmp_echoreply_rate,
  698. #  icmp_destunreach_rate, icmp_paramprob_rate, icmp_timeexeed_rate,
  699. #  ip_local_port_range, log_martians, rp_filter, routing flush,
  700. #  bootp_relay, proxy_arp, secure_redirects, accept_source_route
  701. #  icmp_echo_ignore_broadcasts, ipfrag_time)
  702. #
  703. # Tip: Set this to "no" until you have verified that you have got a
  704. # configuration which works for you. Then set this to "yes" and keep it
  705. # if everything still works. (It should!) ;-)
  706. #
  707. # Choice: "yes" or "no", if not set defaults to "yes"
  708. #
  709. FW_KERNEL_SECURITY="yes"
  710.  
  711. ## Type:    yesno
  712. ## Default: no
  713. #
  714. # 18.)
  715. # Keep the routing set on, if the firewall rules are unloaded?
  716. # REQUIRES: FW_ROUTE
  717. #
  718. # Choices "yes" or "no", if not set defaults to "no"
  719. #
  720. FW_STOP_KEEP_ROUTING_STATE="no"
  721.  
  722. ## Type:    yesno
  723. ## Default: yes
  724. #
  725. # 19.)
  726. # Allow the firewall to reply to icmp echo requests
  727. #
  728. # defaults to "no" if not set
  729. #
  730. FW_ALLOW_PING_FW="yes"
  731.  
  732. ## Type:    yesno
  733. ## Default: no
  734. #
  735. # 19a.)
  736. # Allow hosts in the dmz to be pinged from hosts in other zones even
  737. # if neither FW_FORWARD nor FW_MASQUERADE is set
  738. #
  739. # Requires: FW_ROUTE
  740. #
  741. # defaults to "no" if not set
  742. #
  743. FW_ALLOW_PING_DMZ="no"
  744.  
  745. ## Type:    yesno
  746. ## Default: no
  747. #
  748. # 19b.)
  749. # Allow hosts in the external zone to be pinged from hosts in other
  750. # zones even if neither FW_FORWARD nor FW_MASQUERADE is set
  751. #
  752. # Requires: FW_ROUTE
  753. #
  754. # defaults to "no" if not set
  755. #
  756. FW_ALLOW_PING_EXT="no"
  757.  
  758. ## Type:    yesno
  759. ## Default: yes
  760. #
  761. # 21.)
  762. # Allow ICMP sourcequench from your ISP?
  763. #
  764. # If set to yes, the firewall will notice when connection is choking, however
  765. # this opens yourself to a denial of service attack. Choose your poison.
  766. #
  767. # Defaults to "yes" if not set
  768. #
  769. FW_ALLOW_FW_SOURCEQUENCH=""
  770.  
  771. ## Type:    string(yes,no)
  772. #
  773. # 22.)
  774. # Allow IP Broadcasts?
  775. #
  776. # Whether the firewall allows broadcasts packets.
  777. # Broadcasts are used for e.g. for Netbios/Samba, RIP, OSPF and Games.
  778. #
  779. # If you want to drop broadcasts however ignore the annoying log entries, set
  780. # FW_IGNORE_FW_BROADCAST_* to yes.
  781. #
  782. # Note that if you allow specifc ports here it just means that broadcast
  783. # packets for that port are not dropped. You still need to set
  784. # FW_SERVICES_*_UDP to actually allow regular unicast packets to
  785. # reach the applications.
  786. #
  787. # Format: either
  788. #           - "yes" or "no"
  789. #           - list of udp destination ports
  790. #
  791. # Examples: - "631 137" allow broadcast packets on port 631 and 137
  792. #              to enter the machine but drop any other broadcasts
  793. #           - "yes" do not install any extra drop rules for
  794. #              broadcast packets. They'll be treated just as unicast
  795. #              packets in this case.
  796. #           - "no" drop all broadcast packets before other filtering
  797. #              rules
  798. #
  799. # defaults to "no" if not set
  800. #
  801. FW_ALLOW_FW_BROADCAST_EXT="no"
  802.  
  803. ## Type:    string
  804. #
  805. # see comments for FW_ALLOW_FW_BROADCAST_EXT
  806. FW_ALLOW_FW_BROADCAST_INT="no"
  807.  
  808. ## Type:    string
  809. #
  810. # see comments for FW_ALLOW_FW_BROADCAST_EXT
  811. FW_ALLOW_FW_BROADCAST_DMZ="no"
  812.  
  813. ## Type:    string(yes,no)
  814. #
  815. # Suppress logging of dropped broadcast packets. Useful if you don't allow
  816. # broadcasts on a LAN interface.
  817. #
  818. # This setting only affects packets that are not allowed according
  819. # to FW_ALLOW_FW_BROADCAST_*
  820. #
  821. # Format: either
  822. #           - "yes" or "no"
  823. #           - list of udp destination ports
  824. #
  825. # Examples: - "631 137" silently drop broadcast packets on port 631 and 137
  826. #           - "yes" do not log dropped broadcast packets
  827. #           - "no" log all dropped broadcast packets
  828. #
  829. #
  830. # defaults to "no" if not set
  831. FW_IGNORE_FW_BROADCAST_EXT="yes"
  832.  
  833. ## Type:    string
  834. #
  835. # see comments for FW_IGNORE_FW_BROADCAST_EXT
  836. FW_IGNORE_FW_BROADCAST_INT="no"
  837.  
  838. ## Type:    string
  839. #
  840. # see comments for FW_IGNORE_FW_BROADCAST_EXT
  841. FW_IGNORE_FW_BROADCAST_DMZ="no"
  842.  
  843. ## Type:    list(yes,no,int,ext,dmz,)
  844. ## Default: no
  845. #
  846. # 23.)
  847. # Specifies whether routing between interfaces of the same zone should be allowed
  848. # Requires: FW_ROUTE="yes"
  849. #
  850. # Set this to allow routing between interfaces in the same zone,
  851. # e.g. between all internet interfaces, or all internal network
  852. # interfaces.
  853. #
  854. # Caution: Keep in mind that "yes" affects all zones. ie even if you
  855. # need inter-zone routing only in the internal zone setting this
  856. # parameter to "yes" would allow routing between all external
  857. # interfaces as well. It's better to use
  858. # FW_ALLOW_CLASS_ROUTING="int" in this case.
  859. #
  860. # Choice: "yes", "no", or space separate list of zone names
  861. #
  862. # Defaults to "no" if not set
  863. #
  864. FW_ALLOW_CLASS_ROUTING=""
  865.  
  866. ## Type:    string
  867. #
  868. # 25.)
  869. # Do you want to load customary rules from a file?
  870. #
  871. # This is really an expert option. NO HELP WILL BE GIVEN FOR THIS!
  872. # READ THE EXAMPLE CUSTOMARY FILE AT /etc/sysconfig/scripts/SuSEfirewall2-custom
  873. #
  874. #FW_CUSTOMRULES="/etc/sysconfig/scripts/SuSEfirewall2-custom"
  875. FW_CUSTOMRULES=""
  876.  
  877. ## Type:    yesno
  878. ## Default: no
  879. #
  880. # 26.)
  881. # Do you want to REJECT packets instead of DROPing?
  882. #
  883. # DROPing (which is the default) will make portscans and attacks much
  884. # slower, as no replies to the packets will be sent. REJECTing means, that
  885. # for every illegal packet, a connection reject packet is sent to the
  886. # sender.
  887. #
  888. # Choice: "yes" or "no", if not set defaults to "no"
  889. #
  890. # Defaults to "no" if not set
  891. #
  892. # You may override this value on a per zone basis by using a zone
  893. # specific variable, e.g. FW_REJECT_DMZ="yes"
  894. #
  895. FW_REJECT=""
  896.  
  897. ## Type:    yesno
  898. ## Default: no
  899. #
  900. # see FW_REJECT for description
  901. #
  902. # default config file setting is "yes" assuming that slowing down
  903. # portscans is not strictly required in the internal zone even if
  904. # you protect yourself from the internal zone
  905. #
  906. FW_REJECT_INT="yes"
  907.  
  908. ## Type:    string
  909. #
  910. # 27.)
  911. # Tuning your upstream a little bit via HTB (Hierarchical Token Bucket)
  912. # for more information about HTB see http://www.lartc.org
  913. #
  914. # If your download collapses while you have a parallel upload,
  915. # this parameter might be an option for you. It manages your
  916. # upload stream and reserves bandwidth for special packets like
  917. # TCP ACK packets or interactive SSH.
  918. # It's a list of devices and maximum bandwidth in kbit.
  919. # For example, the german TDSL account, provides 128kbit/s upstream
  920. # and 768kbit/s downstream. We can only tune the upstream.
  921. #
  922. # Example:
  923. # If you want to tune a 128kbit/s upstream DSL device like german TDSL set
  924. # the following values:
  925. # FW_HTB_TUNE_DEV="dsl0,125"
  926. # where dsl0 is your pppoe device and 125 stands for 125kbit/s upstream
  927. #
  928. # you might wonder why 125kbit/s and not 128kbit/s. Well practically you'll
  929. # get a better performance if you keep the value a few percent under your
  930. # real maximum upload bandwidth, to prevent the DSL modem from queuing traffic in
  931. # it's own buffers because queing is done by us now.
  932. # So for a 256kbit upstream
  933. #   FW_HTB_TUNE_DEV="dsl0,250"
  934. # might be a better value than "dsl0,256". There is no perfect value for a
  935. # special kind of modem. The perfect value depends on what kind of traffic you
  936. # have on your line but 5% under your maximum upstream might be a good start.
  937. # Everthing else is special fine tuning.
  938. # If you want to know more about the technical background,
  939. # http://tldp.org/HOWTO/ADSL-Bandwidth-Management-HOWTO/
  940. # is a good start
  941. #
  942. FW_HTB_TUNE_DEV=""
  943.  
  944. ## Type:    list(no,drop,reject)
  945. ## Default: drop
  946. #
  947. # 28.)
  948. # What to do with IPv6 Packets?
  949. #
  950. # On older kernels ip6tables was not stateful so it's not possible to implement
  951. # the same features as for IPv4 on such machines. For these there are three
  952. # choices:
  953. #
  954. # - no: do not set any IPv6 rules at all. Your Host will allow any IPv6
  955. #   traffic unless you setup your own rules.
  956. #
  957. # - drop: drop all IPv6 packets.
  958. #
  959. # - reject: reject all IPv6 packets. This is the default if stateful matching is
  960. #   not available.
  961. #
  962. # Disallowing IPv6 packets may lead to long timeouts when connecting to IPv6
  963. # Adresses. See FW_IPv6_REJECT_OUTGOING to avoid this.
  964. #
  965. # Leave empty to automatically detect whether your kernel supports stateful matching.
  966. #
  967. FW_IPv6=""
  968.  
  969. ## Type:    yesno
  970. ## Default: yes
  971. #
  972. # 28a.)
  973. # Reject outgoing IPv6 Packets?
  974. #
  975. # Set to yes to avoid timeouts because of dropped IPv6 Packets. This Option
  976. # does only make sense with FW_IPv6 != no
  977. #
  978. # Defaults to "yes" if not set
  979. #
  980. FW_IPv6_REJECT_OUTGOING=""
  981.  
  982. ## Type:    list(yes,no,int,ext,dmz,)
  983. ## Default: no
  984. #
  985. # 29.)
  986. # Trust level of IPsec packets.
  987. #
  988. # You do not need to change this if you do not intend to run
  989. # services that should only be available trough an IPsec tunnel.
  990. #
  991. # The value specifies how much IPsec packets are trusted. 'int', 'ext' or 'dmz'
  992. # are the respective zones. 'yes' is the same as 'int. 'no' means that IPsec
  993. # packets belong to the same zone as the interface they arrive on.
  994. #
  995. # Note: you still need to explicitely allow IPsec traffic.
  996. # Example:
  997. #   FW_IPSEC_TRUST="int"
  998. #   FW_SERVICES_EXT_IP="esp"
  999. #   FW_SERVICES_EXT_UDP="isakmp"
  1000. #   FW_PROTECT_FROM_INT="no"
  1001. #
  1002. # Defaults to "no" if not set
  1003. #
  1004. FW_IPSEC_TRUST="no"
  1005.  
  1006. ## Type:    string
  1007. ## Default:
  1008. #
  1009. # 30.)
  1010. # Define additional firewall zones
  1011. #
  1012. # The built-in zones INT, EXT and DMZ must not be listed here. Names
  1013. # of additional zones must only contain lowercase ascii characters.
  1014. # To define rules for the additional zone, take the approriate
  1015. # variable for a built-in zone and substitute INT/EXT/DMZ with the
  1016. # name of the additional zone.
  1017. #
  1018. # Example:
  1019. #   FW_ZONES="wlan"
  1020. #   FW_DEV_wlan="wlan0"
  1021. #   FW_SERVICES_wlan_TCP="80"
  1022. #   FW_ALLOW_FW_BROADCAST_wlan="yes"
  1023. #
  1024. FW_ZONES=""
  1025.  
  1026. ## Type:    list(yes,no,auto,)
  1027. ## Default:
  1028. #
  1029. # 31.)
  1030. # Whether to use iptables-batch
  1031. #
  1032. # iptables-batch commits all rules in an almost atomic way similar
  1033. # to iptables-restore. This avoids excessive iptables calls and race
  1034. # conditions.
  1035. #
  1036. # Choice:
  1037. #     - yes: use iptables-batch if available and warn if it isn't
  1038. #     - no: don't use iptables-batch
  1039. #     - auto: use iptables-batch if available, silently fall back to
  1040. #       iptables if it isn't
  1041. #
  1042. # Defaults to "auto" if not set
  1043. #
  1044. FW_USE_IPTABLES_BATCH=""
  1045.  
  1046. ## Type:    string
  1047. ## Default:
  1048. #
  1049. # 32.)
  1050. # Which additional kernel modules to load at startup
  1051. #
  1052. # Example:
  1053. #   FW_LOAD_MODULES="ip_conntrack_ftp ip_nat_ftp"
  1054. #
  1055. FW_LOAD_MODULES="nf_conntrack_netbios_ns"
  1056.  
  1057. ## Type:    string
  1058. ## Default:
  1059. #
  1060. # 33.)
  1061. # Bridge interfaces without IP address
  1062. #
  1063. # Traffic on bridge interfaces like the one used by xen appears to
  1064. # enter and leave on the same interface. Add such interfaces here in
  1065. # order to install special permitting rules for them.
  1066. #
  1067. # Format: list of interface names separated by space
  1068. #
  1069. # Example:
  1070. #   FW_FORWARD_ALWAYS_INOUT_DEV="xenbr0"
  1071. #
  1072. # FW_FORWARD_ALWAYS_INOUT_DEV="xenbr+"
  1073. FW_SERVICES_ACCEPT_INT=""
  1074. FW_SERVICES_ACCEPT_DMZ=""
  1075. FW_FORWARD_ALWAYS_INOUT_DEV=""
  1076. FW_SERVICES_ACCEPT_RELATED_EXT=""
  1077. FW_SERVICES_ACCEPT_RELATED_INT=""
  1078. FW_SERVICES_ACCEPT_RELATED_DMZ=""
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement