mirror of
https://git.dn42.dev/wiki/wiki.git
synced 2024-12-01 14:58:11 +01:00
Update 'howto/vyos1.4.x.md'
Replace ambiguous Unicode apostrophes `’` with real Unicode apostrophe `'`. (If the apostrophe is to be "smartened," it should be up to the renderer and browser. This fixes a warning message in the Gitea interface.)
This commit is contained in:
parent
5b1c89e377
commit
135a7af01f
@ -4,7 +4,7 @@ VyOS is an open source software router. It is feature rich and supports multipl
|
||||
It can be downloaded here <https://www.vyos.io/rolling-release/>.
|
||||
|
||||
## Firewall Baseline
|
||||
We will configure firewall access lists for inbound connections on our peer Wireguard interfaces as well as block all inbound connections to our router with the exception of BGP. This should be a good baseline firewall ruleset to filter inbound traffic on your network’s edge. Modifications may be needed depending on your specific goals. If your router has an uplink back to a larger internal network (outside of DN42), an outbound firewall ruleset will need to be applied to that interface.
|
||||
We will configure firewall access lists for inbound connections on our peer Wireguard interfaces as well as block all inbound connections to our router with the exception of BGP. This should be a good baseline firewall ruleset to filter inbound traffic on your network's edge. Modifications may be needed depending on your specific goals. If your router has an uplink back to a larger internal network (outside of DN42), an outbound firewall ruleset will need to be applied to that interface.
|
||||
|
||||
By default, VyOS is a **stateless** firewall. To enable **stateful** packet inspection globally enter the following commands.
|
||||
```
|
||||
@ -12,7 +12,7 @@ set firewall state-policy established action 'accept'
|
||||
set firewall state-policy related action 'accept'
|
||||
```
|
||||
|
||||
We also need to accept invalids on our network’s edge. However, this should not become common practice elsewhere.
|
||||
We also need to accept invalids on our network's edge. However, this should not become common practice elsewhere.
|
||||
```
|
||||
set firewall state-policy invalid action 'accept'
|
||||
```
|
||||
|
Loading…
Reference in New Issue
Block a user