1
mirror of https://git.dn42.dev/wiki/wiki.git synced 2024-12-01 14:58:11 +01:00

Update 'howto/vyos1.4.x.md'

Replace ambiguous Unicode apostrophes `’` with real Unicode apostrophe `'`.

(If the apostrophe is to be "smartened," it should be up to the renderer and browser. This fixes a warning message in the Gitea interface.)
This commit is contained in:
bri 2023-04-20 23:51:34 +01:00
parent 5b1c89e377
commit 135a7af01f

View File

@ -4,7 +4,7 @@ VyOS is an open source software router. It is feature rich and supports multipl
It can be downloaded here <https://www.vyos.io/rolling-release/>.
## Firewall Baseline
We will configure firewall access lists for inbound connections on our peer Wireguard interfaces as well as block all inbound connections to our router with the exception of BGP. This should be a good baseline firewall ruleset to filter inbound traffic on your networks edge. Modifications may be needed depending on your specific goals. If your router has an uplink back to a larger internal network (outside of DN42), an outbound firewall ruleset will need to be applied to that interface.
We will configure firewall access lists for inbound connections on our peer Wireguard interfaces as well as block all inbound connections to our router with the exception of BGP. This should be a good baseline firewall ruleset to filter inbound traffic on your network's edge. Modifications may be needed depending on your specific goals. If your router has an uplink back to a larger internal network (outside of DN42), an outbound firewall ruleset will need to be applied to that interface.
By default, VyOS is a **stateless** firewall. To enable **stateful** packet inspection globally enter the following commands.
```
@ -12,7 +12,7 @@ set firewall state-policy established action 'accept'
set firewall state-policy related action 'accept'
```
We also need to accept invalids on our networks edge. However, this should not become common practice elsewhere.
We also need to accept invalids on our network's edge. However, this should not become common practice elsewhere.
```
set firewall state-policy invalid action 'accept'
```