.Dd November 16, 1994 .Dt IPFW 8 SMM .Os FreeBSD .Sh NAME .Nm ipfw .Nd controlling utility for IP firewall / IP accounting facilities. .Sh SYNOPSIS .Nm .Oo .Fl n .Oc .Ar entry_action chain_entry_pattern .Nm ipfw .Oo .Fl ans .Oc .Ar chain_action chain[s]_type .\" ipfw [-n] .\" ipfw [-ans] .Sh WARNING This manual page is out of date! .Sh DESCRIPTION In the first synopsis form, .Nm controls the firewall and accounting chains. In the second synopsis form, .Nm sets the global firewall / accounting properties and show the chain list's contents. .Pp The following options are available: .Bl -tag -width flag .It Fl a While listing, show counter values. This option is the only way to see accounting records. Works only with .Fl s .It Fl n Do not resolve anything. When setting entries, do not try to resolve a given address. When listing, display addresses in numeric form. .It Fl s Short listing form. By default, the listing format is compatible with .Nm input string format, so you can save listings to file and then reuse them. With this option list format is much more short but incompatible with the .Nm syntax. .El .Pp These are the valid .Ar entry_actions : .Bl -hang -offset flag -width 1234567890123456 .It Nm addf[irewall] add entry to firewall chain. .It Nm delf[irewall] remove entry from firewall chain. .It Nm adda[ccounting] add entry to accounting chain. .It Nm dela[ccounting] remove entry from accounting chain. .It Nm clr[accounting] clear counters for accounting chain entry. .El .Pp If no .Ar entry_action is specified, it will default to .Nm addf[irewall] or .Nm adda[ccounting] , depending on the .Ar chain_entry_pattern specified. .Pp The valid .Ar chain_actions are: .Bl -hang -offset flag -width 123456789 .It Nm f[lush] remove all entries in firewall / accounting chains. .It Nm l[ist] display all entries in firewall / accounting chains. .It Nm z[ero] clear chain counters (accounting only). .It Nm p[olicy] set default policy properties. .El .Pp The .Ar chain_entry_pattern structure is: .Pp .Dl [keyword] [protocol] [address pattern] .Pp For the firewall chain, valid .Em keywords are: .Bl -hang -offset flag -width 12345678 .It Nm reject Reject the packet, and send an .Tn ICMP HOST_UNREACHABLE packet to the source. .It Nm lreject The same as .Nm reject , but also log the packets details. .It Nm deny Reject the packet. .It Nm ldeny The same as .Nm deny , but also log the packets details. .It Nm log Accept the packet, and log it. .It Nm accept Accept the packet (obviously). .It Nm pass A synonym for accept. .El .Pp For the accounting chain, valid .Em keywords are: .Bl -tag -width flag .It Nm single Log packets matching entry. .It Nm bidirectional Log packets matching entry and also those going in the opposite direction (from .Dq dst to .Dq src ) . .El .Pp Each keyword will be recognized by the shortest unambiguous prefix. .Pp Recognized .Em protocols are: .Bl -hang -offset flag -width 123456 .It Nm all Matches any IP packet. .It Nm icmp Matches ICMP packets. .It Nm tcp Matches TCP packets. .It Nm udp Matches UDP packets. .It Nm syn Matches the TCP SYN packet used in initiating a TCP connection. It does not match the packet returned from a destination machine which has the SYN and ACK bits set. .El .Pp The .Em address pattern is: .Pp .Dl from
[ports] to
] .Pp You can only specify .Em ports with .Em protocols which actually have ports (TCP, UDP and SYN). .Pp The order of .Sq from/to/via keywords is unimportant. You can skip any of them, which will be then substituted by default entry matching any .Sq from/to/via packet kind. .Pp The .Em
is defined as: .Pp .Dl [/mask_bits|:mask_pattern] .Pp .Em mask bits is the decimal number of bits set in the address mask. .Em mask pattern has the form of an IP address to be AND'ed logically with the address given. The keyword .Em any can be used to specify .Dq any IP . The IP address or name given is .Em NOT checked, and the wrong value causes the entry to not match anything. .Pp The .Em ports to be blocked are specified as: .Dl Ns port Ns Op ,port Ns Op ,... or: .Dl port:port .Pp to specify a range of ports. The name of a service (from .Pa /etc/services ) can be used instead of a numeric port value. .Pp The .Em via entry is optional and may specify IP address/domain name of local IP interface, or interface name (e.g. .Em ed0 ) to match only packets coming through this interface. The keyword .Em via can be substituted by .Em on , for readability reasons. .Pp The .Em l[ist] command may be passed: .Pp .Dl f[irewall] | a[ccounting] .Pp to list specific chain or none to list all of chains. The long output format (default) is compatible with the syntax used by the .Nm utility. .Pp The .Em f[lush] command may be passed: .Pp .Dl f[irewall] | a[ccounting] .Pp to remove all entries from firewall or from accounting chain. Without an argument it will remove all entries from both chains. .Pp The .Em z[ero] command needs no arguments. This command clears all counters for the entire accounting chain. .Pp The .Em p[olicy] command can be given .Pp .Dl a[ccept] | d[eny] .Pp to set default policy as denial/acceptance. Without an argument, the current policy status is displayed. .Sh EXAMPLES This command adds an entry which denies all tcp packets from .Em hacker.evil.org to the telnet port of .Em wolf.tambov.su from being forwarded by the host: .Pp .Dl ipfw addf deny tcp from hacker.evil.org to wolf.tambov.su telnet .Pp This one disallows any connection from the entire hackers network to my host: .Pp .Dl ipfw addf deny all from 123.45.67.0/24 to my.host.org .Pp Here is good usage of list command to see accounting records: .Pp .Dl ipfw -sa list accounting .Pp or in short form .Pp .Dl ipfw -sa l a .Pp Many more examples can be found in the file: .Dl Pa /usr/share/FAQ/ipfw.FAQ (missing for the moment) .Sh SEE ALSO .Xr gethostbyname 3 , .Xr getservbyport 3 , .Xr ip 4 , .Xr ipfirewall 4 , .Xr ipaccounting 4 , .Xr reboot 8 , .Xr syslogd 8 .Sh BUGS Currently there is no method for filtering out specific types of ICMP packets. Either you don't filter ICMP at all, or all ICMP packets are filtered. .Pp The system has an optional rule weighting system for the firewall chain. This means that rules are not used in the order that they are specified. To enable this feature, you need to recompile your kernel, see the .I LINT configuration for details. In general you do not want that. .Pp To see what rule ordering is used, use the .Em list command. .Pp .Em WARNING!!WARNING!!WARNING!!WARNING!!WARNING!!WARNING!!WARNING!! .Pp This program can put your computer in rather unusable state. When using it for the first time, work on the console of the computer, and do .Em NOT do anything you don't understand. .Pp Remember that .Dq ipfw flush can solve all the problems. Bear in mind that .Dq ipfw policy deny combined with some wrong chain entry (possible the only entry, which is designed to deny some external packets), can close your computer from the outer world for good (or at least until you can get to the console). .Sh HISTORY Initially this utility was written for BSDI by: .Pp .Dl Daniel Boulet .Pp The FreeBSD version is written completely by: .Pp .Dl Ugen J.S.Antsilevich .Pp while the synopsis is partially compatible with the old one.