Skip to content

Commit

Permalink
Updated README to more clearly describe outbound filter setup.
Browse files Browse the repository at this point in the history
  • Loading branch information
r-caamano committed Jul 19, 2024
1 parent 514787b commit 8aaad5b
Showing 1 changed file with 6 additions and 1 deletion.
7 changes: 6 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,15 +20,20 @@ edge-routers.
there is no need to statically configure high port ranges for return traffic. The assumption is
if you enable inbound ports you want to allow the stateful reply packets for udp and tcp.

An egress filter must be attached to the interface
An egress filter must be attached to the interface , ```-b, --outbound-filter <ifname>``` needs to be set ,and at least one interface needs to have had an ingress filter applied.

From cli:

```
sudo zfw -X ens33 -O /opt/openziti/bin/zfw_tc_ingress.o -z ingress
sudo zfw -X ens33 -O /opt/openziti/bin/zfw_tc_outbound_track.o -z egress
sudo /opt/openziti/bin/zfw --outbound-filter ens33
```

The above should result in all outbound traffic except for arp and icmp to be dropped on ens33 (icmp echo-reply
will also be dropped unless ```sudo zfw -e ens33 is set```). ssh return traffic will also be allowed outbound
unless ```ssh -x ens33 is set```.

In order to survive reboot you must have "OutboundPassThroughTrack": true which is default for ExternalInterfaces
but can also be explicitly set for InternalInterfaces. If per interface rules is not false then the egress rules would
need explicit -N <interface name added> for each rule in the same manner as ingress rules.
Expand Down

0 comments on commit 8aaad5b

Please sign in to comment.