Firewall configuration
Digi TransPort User Guide
660
Example:
Suppose your local network is on subnet
192.168.*.*
and you want to block any packets received
on
PPP 0
that were pretending to be on the local network, and log the receipt of any such packets
to the
FWLOG.TXT
file and to a syslog server. The filter rule is constructed as follows:
block in log syslog break end on ppp 0 from 192.168.0.0/16 to any
break
When the
break
option is specified it must be followed by a user-defined label name or the
predefined end keyword. When followed by a label, the rule processor jumps to that label to
continue processing. When followed by the
end
keyword, rule processing is terminated and
the packet is treated according to the last matching rule.
Example:
break ppp_label: on ppp 0
# insert rule processing here for packets that are not on ppp 0
break end
ppp_label:
# insert rule processing here for packets that are on ppp 0
on
The interface to which the rule applies; must be followed by a valid interface name. For
example, if you were only interested in applying a particular rule to packets being transmitted
or received by
PPP 0
, you would include
ppp 0
in the rule. Valid interface-names are
eth n
,
tun n
or
ppp n
, where
n
is the instance number.
oneroute
A rule will only match packets associated with the specified eroute. For example, including the
option
oneroute 2
causes the rule to only match on packets transmitted or received over
Eroute 2. The
oneroute
option can be followed with the keyword
any
, which will match if the
packet is on any eroute.
routeto
When the
routeto
option is specified and the firewall is processing a received packet, if the
rule is the last matching rule, the packet is tagged as being required to be routed to the
specified interface.