Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/share/examples/npf remove file that did not go before.



details:   https://anonhg.NetBSD.org/src/rev/a4f2636bfff2
branches:  trunk
changeset: 787644:a4f2636bfff2
user:      christos <christos%NetBSD.org@localhost>
date:      Thu Jun 27 14:52:58 2013 +0000

description:
remove file that did not go before.

diffstat:

 share/examples/npf/l2tp-gw.conf |  146 ----------------------------------------
 1 files changed, 0 insertions(+), 146 deletions(-)

diffs (150 lines):

diff -r 3c4ad976369a -r a4f2636bfff2 share/examples/npf/l2tp-gw.conf
--- a/share/examples/npf/l2tp-gw.conf   Thu Jun 27 14:51:30 2013 +0000
+++ /dev/null   Thu Jan 01 00:00:00 1970 +0000
@@ -1,146 +0,0 @@
-# ex0 - (internal) network interface
-#      192.168.2.254/24
-# hme0 - (external) connection to Two Sigma
-#      74.66.0.142/24
-
-$int_if = "sk0"
-$ext_if = "bge0"
-
-alg "icmp"
-
-#
-# NAT for all.
-#
-map $ext_if dynamic 192.168.1.0/24 -> inet4($ext_if)
-
-#table <1> type tree file "/etc/npf_problem_sites"
-
-procedure "log" {
-       log: npflog0
-}
-
-group (name "external", interface $ext_if) {
-       #
-       # Allow DHCP requests (even to reserved addresses).
-       #
-       pass out final proto udp from any port bootpc to any port bootps
-       pass in final proto udp from any port bootps to any port bootpc
-       pass in final proto udp from any port bootps to 255.255.255.255 port bootpc
-       #
-       # Allow DNS queries
-       #
-       pass stateful out final proto udp to any port domain
-
-       # Problem sites.
-       #block in final from <1> apply "log"
-
-       #
-       # Block IANA-reserved addresses from entering or exiting
-       #
-       block in final from 10.0.0.0/8 apply "log"
-       block in final from 172.16.0.0/12 apply "log"
-       block in final from 192.168.0.0/16 apply "log"
-       #
-       block out final to 10.0.0.0/8 apply "log"
-       block out final to 172.16.0.0/12 apply "log"
-       block out final to 192.168.0.0/16 apply "log"
-       #
-       pass stateful out final proto tcp all
-       pass stateful out final proto udp all
-       pass stateful out final proto icmp all
-       pass stateful out final proto ipv6-icmp all
-
-       block in final proto tcp to 192.168.2.255 apply "log"
-
-       #
-       # Prevent IP spoofing attacks on the firewall.
-       #
-       block in final from 127.0.0.1 apply "log"
-
-       #
-       # L2TP/IPSEC-NAT-T Tunnels.
-       #
-       pass in final proto udp from any to inet4($ext_if) port isakmp
-       pass in final proto esp from any to inet4($ext_if)
-       pass out final proto esp from any to inet4($ext_if)
-       pass in final proto ah from any to inet4($ext_if)
-       pass in final from any to inet4($ext_if) port "ipsec-nat-t"
-
-       #
-       # Pass multicast.
-       # IGMP uses 224.0.0.1.
-       #
-       pass in final proto igmp all
-       pass in final from any to 224.0.0.0/4
-
-       #
-       # Pass established connections.
-       #
-       pass in final proto tcp flags A/A all
-       pass in final proto tcp flags R/R all
-       #
-       # VNC
-       #
-       pass in final proto tcp from any to any port 5500
-
-       #
-       # Web servers
-       #
-       #pass in final proto tcp from any to <A>/<M> port http
-
-       #
-       # Services on localhost.
-       #
-       #pass in final proto udp from any port ntp
-       #pass in final to any port imap
-       #pass in final to any port domain
-       #pass in final proto tcp to any port smtp
-       #pass in final proto tcp to any port auth
-       #pass in final proto tcp to any port ssh
-       #pass in final proto tcp to any port bgp
-       #pass in final proto tcp to any port ftp
-       #pass in final proto tcp to any port "ftp-data"
-       #pass in final proto udp to any port isakmp
-       #pass in final proto udp to any port 8001
-       #pass in final proto tcp to inet4($ext_if) port www
-
-       #
-       # Handle traceroute gracefully for up-to 30 hops away.
-       # FIXME: port-unr for ICMP is not yet supported.
-       #
-       block return-icmp in final proto udp to any port 33433-33524 apply "log"
-
-       #
-       # Only allow selected ICMP types.
-       #
-       pass in final proto icmp icmp-type echo all
-       pass in final proto icmp icmp-type timxceed all
-       pass in final proto icmp icmp-type unreach all
-       pass in final proto icmp icmp-type echoreply all
-       pass in final proto icmp icmp-type sourcequench all
-       pass in final proto icmp icmp-type paramprob all
-       pass in final proto ipv6-icmp all
-
-       #
-       # Send back a reset for new connections on tcp.
-       #
-       block return-rst in final proto tcp flags S/SA all apply "log"
-}
-
-group (name "internal", interface $int_if) {
-       # Pass everything to internal networks,
-       # should be ok, because we are nat'ed.
-       pass final all
-}
-
-group (default) {
-       # Loopback interface should allows packets to traverse it.
-       pass final on lo0 all
-       # For one L2TP tunnel, needs interface pre-created, post-destroyed
-       pass final on ppp0 all
-
-       #
-       # Block everything by default.
-       #
-       block final all apply "log"
-}



Home | Main Index | Thread Index | Old Index