summaryrefslogtreecommitdiffstats
path: root/share/man/man7/firewall.7
diff options
context:
space:
mode:
authorschweikh <schweikh@FreeBSD.org>2001-07-14 19:41:16 +0000
committerschweikh <schweikh@FreeBSD.org>2001-07-14 19:41:16 +0000
commit511e378b14868fd06fca565a7db84b7080fdbcb7 (patch)
treefb1031efffc2846e7cacb61180a01c78ece1c3e9 /share/man/man7/firewall.7
parentb855a121e272a07bd83ce7b51f776e73d7412cf4 (diff)
downloadFreeBSD-src-511e378b14868fd06fca565a7db84b7080fdbcb7.zip
FreeBSD-src-511e378b14868fd06fca565a7db84b7080fdbcb7.tar.gz
Removed whitespace at end-of-line; no content changes. I simply did
cd src/share; find man[1-9] -type f|xargs perl -pi -e 's/[ \t]+$//' BTW, what editors are the culprits? I'm using vim and it shows me whitespace at EOL in troff files with a thick blue block... Reviewed by: Silence from cvs diff -b MFC after: 7 days
Diffstat (limited to 'share/man/man7/firewall.7')
-rw-r--r--share/man/man7/firewall.736
1 files changed, 18 insertions, 18 deletions
diff --git a/share/man/man7/firewall.7 b/share/man/man7/firewall.7
index 78cc4ca..52c5ed3 100644
--- a/share/man/man7/firewall.7
+++ b/share/man/man7/firewall.7
@@ -45,11 +45,11 @@ Constructing a firewall may appear to be trivial, but most people
get them wrong. The most common mistake is to create an exclusive
firewall rather then an inclusive firewall. An exclusive firewall
allows all packets through except for those matching a set of rules.
-An inclusive firewall allows only packets matching the rulset
+An inclusive firewall allows only packets matching the rulset
through. Inclusive firewalls are much, much safer then exclusive
firewalls but a tad more difficult to build properly. The
second most common mistake is to blackhole everything except the
-particular port you want to let through. TCP/IP needs to be able
+particular port you want to let through. TCP/IP needs to be able
to get certain types of ICMP errors to function properly - for
example, to implement MTU discovery. Also, a number of common
system daemons make reverse connections to the
@@ -85,13 +85,13 @@ dangerous option to set because it means your firewall is disabled
during booting. You should use this option while getting up to
speed with
.Fx
-firewalling, but get rid of it once you understand how it all works
+firewalling, but get rid of it once you understand how it all works
to close the loophole. There is a third option called
.Sy IPDIVERT
which allows you to use the firewall to divert packets to a user program
and is necessary if you wish to use
.Xr natd 8
-to give private internal networks access to the outside world.
+to give private internal networks access to the outside world.
If you want to be able to limit the bandwidth used by certain types of
traffic, the
.Sy DUMMYNET
@@ -104,20 +104,20 @@ interface cards. fxp0 is connected to the 'exposed' LAN. Machines
on this LAN are dual-homed with both internal 10. IP addresses and
internet-routed IP addresses. In our example, 192.100.5.x represents
the internet-routed IP block while 10.x.x.x represents the internal
-networks. While it isn't relevant to the example, 10.0.1.x is
+networks. While it isn't relevant to the example, 10.0.1.x is
assigned as the internal address block for the LAN on fxp0, 10.0.2.x
for the LAN on fxp1, and 10.0.3.x for the LAN on fxp2.
.Pp
In this example we want to isolate all three LANs from the internet
-as well as isolate them from each other, and we want to give all
+as well as isolate them from each other, and we want to give all
internal addresses access to the internet through a NAT gateway running
on this machine. To make the NAT gateway work, the firewall machine
is given two internet-exposed addresses on fxp0 in addition to an
-internal 10. address on fxp0: one exposed address (not shown)
+internal 10. address on fxp0: one exposed address (not shown)
represents the machine's official address, and the second exposed
address (192.100.5.5 in our example) represents the NAT gateway
rendezvous IP. We make the example more complex by giving the machines
-on the exposed LAN internal 10.0.0.x addresses as well as exposed
+on the exposed LAN internal 10.0.0.x addresses as well as exposed
addresses. The idea here is that you can bind internal services
to internal addresses even on exposed machines and still protect
those services from the internet. The only services you run on
@@ -126,7 +126,7 @@ internet.
.Pp
It is important to note that the 10.0.0.x network in our example
is not protected by our firewall. You must make sure that your
-internet router protects this network from outside spoofing.
+internet router protects this network from outside spoofing.
Also, in our example, we pretty much give the exposed hosts free
reign on our internal network when operating services through
internal IP addresses (10.0.0.x). This is somewhat of security
@@ -146,7 +146,7 @@ firewall_type="/etc/ipfw.conf"
# temporary port binding range let
# through the firewall.
-#
+#
# NOTE: heavily loaded services running through the firewall may require
# a larger port range for local-size binding. 4000-10000 or 4000-30000
# might be a better choice.
@@ -160,7 +160,7 @@ ip_portrange_last=5000
#
# FIREWALL: the firewall machine / nat gateway
# LAN0 10.0.0.X and 192.100.5.X (dual homed)
-# LAN1 10.0.1.X
+# LAN1 10.0.1.X
# LAN2 10.0.2.X
# sw: ethernet switch (unmanaged)
#
@@ -187,7 +187,7 @@ ip_portrange_last=5000
# NOT SHOWN: The INTERNET ROUTER must contain rules to disallow
# all packets with source IP addresses in the 10. block in order
# to protect the dual-homed 10.0.0.x block. Exposed hosts are
-# not otherwise protected in this example - they should only bind
+# not otherwise protected in this example - they should only bind
# exposed services to exposed IPs but can safely bind internal
# services to internal IPs.
#
@@ -241,7 +241,7 @@ add 01501 deny all from 10.0.2.0/24 in via fxp0
# In this example rule set there are no restrictions between
# internal hosts, even those on the exposed LAN (as long as
# they use an internal IP address). This represents a
-# potential security hole (what if an exposed host is
+# potential security hole (what if an exposed host is
# compromised?). If you want full restrictions to apply
# between the three LANs, firewalling them off from each
# other for added security, remove these two rules.
@@ -327,12 +327,12 @@ add 05000 deny log ip from any to any frag
add 06000 deny all from any to any
.Ed
.Sh PORT BINDING INTERNAL AND EXTERNAL SERVICES
-We've mentioned multi-homing hosts and binding services to internal or
-external addresses but we haven't really explained it. When you have a
-host with multiple IP addresses assigned to it, you can bind services run
+We've mentioned multi-homing hosts and binding services to internal or
+external addresses but we haven't really explained it. When you have a
+host with multiple IP addresses assigned to it, you can bind services run
on that host to specific IPs or interfaces rather then all IPs. Take
the firewall machine for example: With three interfaces
-and two exposed IP addresses
+and two exposed IP addresses
on one of those interfaces, the firewall machine is known by 5 different
IP addresses (10.0.0.1, 10.0.1.1, 10.0.2.1, 192.100.5.5, and say
192.100.5.1). If the firewall is providing file sharing services to the
@@ -366,7 +366,7 @@ The
.Nm
manual page was originally written by
.An Matthew Dillon
-and first appeared
+and first appeared
in
.Fx 4.3 ,
May 2001.
OpenPOWER on IntegriCloud