summaryrefslogtreecommitdiffstats
path: root/sbin/ipfw/ipfw.8
Commit message (Collapse)AuthorAgeFilesLines
* Mention affect of securelevel 3 and higher on attempts to change filter lists.ghelmer1998-12-161-0/+6
| | | | Prompted by: PR docs/7785
* Disallow ipfw "tee" rules until it is actually implemented.archie1998-12-071-0/+2
| | | | PR: bin/8471
* Preprocessor support for `ipfw [-q] ... file'.joerg1998-11-231-1/+32
| | | | | | | | | | | | | | | | | | | This allows for more flexible ipfw configuration files using `variables' to describe frequently used items in the file, like the local IP address(es), interface names etc. Both m4 and cpp are useful and supported; with m4 being a little more unusual to the common C programmer, things like automatic rule numbering can be achieved fairly easy. While i was at it, i've also untangled some of the ugly style inside main(), and fixed a bug or two (like not being able to use blank lines when running with -q). A typical call with preprocessor invocation looks like ipfw -p m4 -Dhostname=$(hostname) /etc/fwrules Someone should probably add support for this feature to /etc/rc.firewall.
* PR: 7475thepish1998-08-041-2/+5
| | | | | Added support for -q (suppress output) when firewall rules are taken from a file. Solves PR 7475
* Support for IPFW based transparent forwarding.julian1998-07-061-1/+25
| | | | | | | | | | | | | | Any packet that can be matched by a ipfw rule can be redirected transparently to another port or machine. Redirection to another port mostly makes sense with tcp, where a session can be set up between a proxy and an unsuspecting client. Redirection to another machine requires that the other machine also be expecting to receive the forwarded packets, as their headers will not have been modified. /sbin/ipfw must be recompiled!!! Reviewed by: Peter Wemm <peter@freebsd.org> Submitted by: Chrisy Luke <chrisy@flix.net>
* Reminded by: Alex Nashdanny1998-05-191-3/+3
| | | | Bring man page up to date with -q flag behaviour.
* Typo fix.max1998-05-191-1/+1
|
* (evil) hackers -> crackerscracauer1998-04-081-3/+3
|
* .Sh AUTHOR -> .Sh AUTHORS. Use .An/.Aq.charnier1998-03-191-5/+7
|
* Alter ipfw's behavior with respect to fragmented packets when the packetalex1998-02-121-0/+16
| | | | | | | | | | | | | | | | | | | offset is non-zero: - Do not match fragmented packets if the rule specifies a port or TCP flags - Match fragmented packets if the rule does not specify a port and TCP flags Since ipfw cannot examine port numbers or TCP flags for such packets, it is now illegal to specify the 'frag' option with either ports or tcpflags. Both kernel and ipfw userland utility will reject rules containing a combination of these options. BEWARE: packets that were previously passed may now be rejected, and vice versa. Reviewed by: Archie Cobbs <archie@whistle.com>
* Support listing/showing specific rules supplied on the command line.alex1998-01-071-0/+2
| | | | Use error codes from <sysexits.h>.
* Allow ipfw to accept comments and blank lines.julian1997-12-051-0/+2
| | | | This makes ipfw config files a LOT more readable.
* Sort cross refereces in section SEE ALSO.wosch1997-09-291-3/+3
|
* Mention the IPFIREWALL_DEFAULT_TO_ACCEPT option and it's effect onpeter1997-09-101-2/+14
| | | | rule 65535
* Fix typo (65434 -> 65534)peter1997-09-101-1/+1
|
* Bring comment on '-a' flag in line with reality.danny1997-08-211-2/+1
|
* Allow ipfw to look up service names from /etc/services (or NIS if turned on)julian1997-06-231-7/+8
| | | | | | note.. this would be dangerous if your ipfw was blocking NIS access :) Submitted by: archie@whistle.com (Archie Cobbs)
* Submitted by: Whistle Communications (archie Cobbs)julian1997-06-021-33/+150
| | | | | | | | | | | | | | | these are quite extensive additions to the ipfw code. they include a change to the API because the old method was broken, but the user view is kept the same. The new code allows a particular match to skip forward to a particular line number, so that blocks of rules can be used without checking all the intervening rules. There are also many more ways of rejecting connections especially TCP related, and many many more ... see the man page for a complete description.
* Typo.max1997-05-151-1/+1
| | | | | PR: 3600 Submitted by: Josh Gilliam <soil@quick.net>
* Minor rewording of the examples section.alex1997-05-151-2/+3
|
* Add '-q' quiet flag for flush/add/zero commands; add 'show' command asdanny1997-02-101-1/+29
| | | | | | | synonym for '-a list'; stop SEGV when specifying 'via' with no interface; change 2 instances of strcpy() to strncpy(). This is a candidate for 2.2
* implement "not" keyword for inverting the address logicadam1997-01-161-10/+11
|
* Minor mdoc/style fixes.mpp1996-12-231-48/+39
|
* Fix a spelling error.jdp1996-11-051-1/+1
| | | | 2.2 Candidate.
* Note that -N is only effective when ipfw is displaying chain entries.alex1996-09-151-1/+1
|
* Because 'ipfw flush' is such a dangerous command (given that mostnate1996-08-311-1/+6
| | | | | | | | | | | | | | firewalls are remote, and this command will kill the network connection to them), prompt the user for confirmation of this command. Also, add the '-f' flag which ignores the need for confirmation the command, and if there is no controlling tty (isatty(STDIN_FILENO) !=0) assume '-f'. If anyone is using ipfw flush in scripts it shouldn't affect them, but you may want to change the script to use a 'ipfw -f flush'. Reviewed by: alex
* Use the .Fx macro where appropriate.mpp1996-08-231-1/+2
|
* Completely rewrite handling of protocol field for firewalls, things arepst1996-08-131-25/+17
| | | | | | | | | | | | | | | | | now completely consistent across all IP protocols and should be quite a bit faster. Use getprotoname() extensively, performed minor cleanups of admin utility. The admin utility could use a good kick in the pants. Basicly, these were the minimal changes I could make to the code to get it up to tollerable shape. There will be some future commits to clean up the basic architecture of the firewall code, and if I'm feeling ambitious, I may pull in changes like NAT from Linux and make the firewall hooks comletely generic so that a user can either load the ipfw module or the ipfilter module (cf Darren Reed). Discussed with: fenner & alex
* Filter by IP protocol.alex1996-08-051-8/+13
| | | | | | Submitted by: fenner (with modifications by me) Bring in the interface unit wildcard flag fix from rev 1.15.4.8.
* Adding changes to ipfw and the kernel to support ip packet diversion..julian1996-07-101-12/+42
| | | | | | This stuff should not be too destructive if the IPDIVERT is not compiled in.. be aware that this changes the size of the ip_fw struct so ipfw needs to be recompiled to use it.. more changes coming to clean this up.
* Correct definition of 'established' keyword.alex1996-07-021-1/+1
|
* Fix port specification syntax.alex1996-06-291-1/+1
| | | | Submitted by: nate
* Fix a typo in the view accounting records example.alex1996-06-151-1/+1
|
* Bring the man page more into line with reality.alex1996-06-151-259/+94
|
* Update to match kernel code.phk1996-02-241-29/+194
|
* Update -current ipfw program as well.phk1996-02-231-0/+2
| | | | I hope it all compiles...
* Document that the firewall will no longer reorder the rules.phk1996-02-131-3/+8
|
* Fix a bunch of spelling errors.mpp1996-01-291-3/+3
|
* Convert manpage to -mandoc macros.nate1995-10-261-130/+307
| | | | | | Submitted by: Gary Palmer <gary@palmer.demon.co.uk> Minor cleanup by me in the English.
* Correct minor nit - to filter out SYN packets, the keyword isgpalmer1995-08-311-1/+1
| | | | | `syn' not `tcpsyn' (which matches `tcp' which blocks all tcp packets)
* Update manpage..BTW,if somebody wit good Englishugen1995-03-031-8/+21
| | | | would go through it and fix it would be a really good idea.
* Fixed manpage..ldeny,lreject and log options are thereugen1995-02-271-3/+2
| | | | | and others not.. Submitted by: torstenb@FreeBSD.ORG
* Change utility to accept interface nameugen1995-02-241-5/+6
| | | | along with IP as "via" argument
* Finally document "via" feature..ugen1995-02-171-5/+9
|
* Ok..at least this man page is up to date nowugen1995-02-091-67/+63
| | | | To be continued..
* Changed a reboot(1) to a reboot(8).ats1994-12-111-1/+1
|
* New man pages from Ugen. Delete my old, first attempt. I only hopejkh1994-11-171-0/+128
that the english in Ugen's two replacement pages is not too impenetrable! :-) [Note: Poul - please pull these into the BETA branch along with the other firewall changes] Submitted by: ugen
OpenPOWER on IntegriCloud