This lab will cover:
Example Firewall Rule: pass in log quick on wm0 proto tcp from 10.200.1.0/24 to 10.200.1.253 port = 22 keep state keep frags what this rule does: allow traffic that matches to pass through the firewall only matches inbound traffic traffic is logged if this rule is matched, further rules are not checked only matches packets that are: on the wm0 interface protocol TCP to 10.200.1.253 (our machine in this example) from 10.200.1.0/24 (our local subnet) on port 22 the firewall remembers 'state', this means that the firewall tracks this connection, and as long as it is open, packets that are a reply to traffic allow by this rule, are also allowed (dynamically) keep frags (don't reassemble packets, keep them in their original form)
What flags for ipmon did you use to make it log to a file rather than via syslog:
What was your firewall rule to allow access to any http/https sites?:
What is ment by SPI?:
What would happen if we had a default deny firewall, and didn't use SPI?:
Last updated: 2008-03-16
Updated by: Allan Jude
Written by: Allan Jude (2008)