I read this Wiki >>> https://docs.freebsd.org/en/books/handbook/firewalls/#firewalls-ipfw
I have presently applied the workstation type by using the command
This is the my present configuration
Is the above configuration the same as I was using under Linux that is deny all in and allow all out ?
I don't need a single incoming port to be open. This is my desktop. I want IPFW to be as restrictive as possible. If IPFW blocks any outgoing ports which does not interfere with my daily activities like web browsing, email (thunderbird), IRC (pidgin) I don't have any issues with that.
Under Linux I was using ufw to configure iptables. I was using the policy deny all in & allow all out.To use one of the default firewall types provided by FreeBSD, add another line which specifies the type:
# sysrc firewall_type="open"
The available types are:
- open: passes all traffic.
- client: protects only this machine.
- simple: protects the whole network.
- closed: entirely disables IP traffic except for the loopback interface.
- workstation: protects only this machine using stateful rules.
- UNKNOWN: disables the loading of firewall rules.
I have presently applied the workstation type by using the command
Code:
sysrc firewall_type=workstation
This is the my present configuration
Code:
~> sudo ipfw show
Password:
00100 62 8626 allow ip from any to any via lo0
00200 0 0 deny ip from any to 127.0.0.0/8
00300 0 0 deny ip from 127.0.0.0/8 to any
00400 0 0 deny ip from any to ::1
00500 0 0 deny ip from ::1 to any
00600 0 0 allow ipv6-icmp from :: to ff02::/16
00700 0 0 allow ipv6-icmp from fe80::/10 to fe80::/10
00800 0 0 allow ipv6-icmp from fe80::/10 to ff02::/16
00900 0 0 allow ipv6-icmp from any to any icmp6types 1
01000 0 0 allow ipv6-icmp from any to any icmp6types 2,135,136
01100 0 0 check-state :default
01200 0 0 allow tcp from me to any established
01300 60 16846 allow tcp from me to any setup keep-state :default
01400 144 13683 allow udp from me to any keep-state :default
01500 0 0 allow icmp from me to any keep-state :default
01600 0 0 allow ipv6-icmp from me to any keep-state :default
01700 0 0 allow udp from 0.0.0.0 68 to 255.255.255.255 67 out
01800 0 0 allow udp from any 67 to me 68 in
01900 0 0 allow udp from any 67 to 255.255.255.255 68 in
02000 0 0 allow udp from fe80::/10 to me 546 in
02100 0 0 allow icmp from any to any icmptypes 8
02200 0 0 allow ipv6-icmp from any to any icmp6types 128,129
02300 0 0 allow icmp from any to any icmptypes 3,4,11
02400 0 0 allow ipv6-icmp from any to any icmp6types 3
65000 5 800 count ip from any to any
65100 0 0 deny { tcp or udp } from any to any 135-139,445 in
65200 0 0 deny { tcp or udp } from any to any 1026,1027 in
65300 0 0 deny { tcp or udp } from any to any 1433,1434 in
65400 0 0 deny ip from any to 255.255.255.255
65500 1 32 deny ip from any to 224.0.0.0/24 in
65500 0 0 deny udp from any to any 520 in
65500 0 0 deny tcp from any 80,443 to any 1024-65535 in
65500 4 768 deny ip from any to any
65535 0 0 allow ip from any to any
Is the above configuration the same as I was using under Linux that is deny all in and allow all out ?
I don't need a single incoming port to be open. This is my desktop. I want IPFW to be as restrictive as possible. If IPFW blocks any outgoing ports which does not interfere with my daily activities like web browsing, email (thunderbird), IRC (pidgin) I don't have any issues with that.