mirror of
https://github.com/opnsense/docs.git
synced 2026-04-15 21:49:34 -04:00
Firewall - add some missing content. closes https://github.com/opnsense/docs/issues/702
o traffic shaping in rules o details and purpose of logging/overview
This commit is contained in:
parent
da2cd89298
commit
d781e5b728
2 changed files with 46 additions and 2 deletions
|
|
@ -103,9 +103,15 @@ to pass traffic, it's much harder to spoof traffic.
|
|||
this can be configured in :menuselection:`Firewall --> Settings --> Firewall Maximum States`.
|
||||
(The help text shows the default number of states on your platform)
|
||||
|
||||
States can also be quite convenient to find the active top users on your firewall at any time, as of 21.7 we added
|
||||
States can also be quite convenient to find the active top users on your firewall at any time, we added
|
||||
an easy to use "session" browser for this purpose. You can find it under :menuselection:`Firewall --> Diagnostics --> Sessions`.
|
||||
|
||||
.. Tip::
|
||||
|
||||
States also play an important rule into protecting services against (distributed) denial of service attacks (DDOS).
|
||||
Relevant topics available in our documentation are "syncproxy" states, connection limits and `syncookies <firewall_settings.html#enable-syncookies>`__
|
||||
|
||||
|
||||
....................
|
||||
Action
|
||||
....................
|
||||
|
|
@ -271,6 +277,33 @@ Log Create a log entry when this rule applies,
|
|||
question (number of evaluations, number of active states and traffic counters).
|
||||
|
||||
|
||||
..........................
|
||||
Traffic shaping (Qos)
|
||||
..........................
|
||||
|
||||
When a firewall rule needs to be constraint in terms of the number of packets it may process over time,
|
||||
it's possible to combine the rule with the traffic shaper.
|
||||
|
||||
The process of shaping is explained in the :doc:`/manual/shaping` section of our documentation. Below you will find the
|
||||
relevant properties for the firewall rule.
|
||||
|
||||
|
||||
=====================================================================================================================
|
||||
|
||||
==================================== ===============================================================================
|
||||
Traffic shaping/rule direction Force packets being matched by this rule into the configured queue or pipe
|
||||
Traffic shaping/reverse direction Force packets being matched in the opposite direction
|
||||
into the configured queue or pipe
|
||||
==================================== ===============================================================================
|
||||
|
||||
|
||||
.. Tip::
|
||||
|
||||
Filter rules are more flexible than the ones specified in the shaper section itself as these can be combined with
|
||||
aliases as well. Although this feature is quite new, it's certainly worth looking at when in need of a traffic shaper.
|
||||
|
||||
|
||||
|
||||
.....................
|
||||
Less commonly used
|
||||
.....................
|
||||
|
|
@ -436,7 +469,7 @@ One of the most common mistakes is traffic doesn't match the rule and/or the ord
|
|||
for whatever reason.
|
||||
|
||||
With the use of the "inspect" button, one can easily see if a rule is being evaluated and traffic did pass using
|
||||
this rule. As of 21.7 it's also possible to jump directly into the attached states to see if your host is in the list
|
||||
this rule. It's also possible to jump directly into the attached states to see if your host is in the list
|
||||
as expected.
|
||||
|
||||
Another valuable tool is the live log viewer, in order to use it, make sure to provide your rule with an easy to
|
||||
|
|
|
|||
|
|
@ -49,3 +49,14 @@ Detailed information for a specific rule can be provided using the info button a
|
|||
Since log lines are stored on the system without an exact match to the rule in question, we do need to translate the sequence
|
||||
in the file back to the rule definition stored in the system. Due to this fact, the information is less accurate
|
||||
historically if the firewall was reconfigured. (labels may be incorrect when looking at older data)
|
||||
|
||||
|
||||
Overview
|
||||
--------------------
|
||||
|
||||
The logging overview page shows the distribution of the firewall log lines over a set of different properties, but is limited
|
||||
in the amount of rules it will evaluate (5000).
|
||||
|
||||
Although it may help to spot some clear patterns from the top of your log stash, the number of relevant use-cases
|
||||
is likely limited.
|
||||
|
||||
|
|
|
|||
Loading…
Reference in a new issue