|
||||||||||||||||||||||||||||||||||||||||||||||||||||
1. Solaris TCPIP Protocol Suite (Overview) 2. Planning an IPv4 Addressing Scheme (Tasks 3. Planning an IPv6 Addressing Scheme (Overview) 4. Planning an IPv6 Network (Tasks) 5. Configuring TCP/IP Network Services and IPv4 Addressing (Tasks) 6. Administering Network Interfaces (Tasks) 7. Enabling IPv6 on a Network (Tasks) 8. Administering a TCP/IP Network (Tasks) 9. Troubleshooting Network Problems (Tasks) 10. TCP/IP and IPv4 in Depth (Reference) 12. About Solaris DHCP (Overview) 13. Planning for DHCP Service (Tasks) 14. Configuring the DHCP Service (Tasks) 15. Administering DHCP (Tasks) 16. Configuring and Administering DHCP Clients 17. Troubleshooting DHCP (Reference) 18. DHCP Commands and Files (Reference) 19. IP Security Architecture (Overview) 21. IP Security Architecture (Reference) 22. Internet Key Exchange (Overview) 24. Internet Key Exchange (Reference) 25. Solaris IP Filter (Overview) How to Enable Solaris IP Filter How to Re-Enable Solaris IP Filter How to Enable Loopback Filtering Deactivating and Disabling Solaris IP Filter How to Deactivate Packet Filtering How to Disable Packet Filtering Displaying Statistics and Information for Solaris IP Filter How to View State Tables for Solaris IP Filter How to View State Statistics for Solaris IP Filter How to View NAT Statistics for Solaris IP Filter How to View Address Pool Statistics for Solaris IP Filter Working With Log Files for Solaris IP Filter How to Set Up a Log File for Solaris IP Filter How to View Solaris IP Filter Log Files How to Flush the Packet Log File How to Save Logged Packets to a File Creating and Editing Solaris IP Filter Configuration Files How to Create a Configuration File for Solaris IP Filter 28. Administering Mobile IP (Tasks) 29. Mobile IP Files and Commands (Reference) 30. Introducing IPMP (Overview) 31. Administering IPMP (Tasks) Part VI IP Quality of Service (IPQoS) 32. Introducing IPQoS (Overview) 33. Planning for an IPQoS-Enabled Network (Tasks) 34. Creating the IPQoS Configuration File (Tasks) 35. Starting and Maintaining IPQoS (Tasks) 36. Using Flow Accounting and Statistics Gathering (Tasks) |
Working With Solaris IP Filter Rule SetsThe following task map identifies the procedures associated with Solaris IP Filter rule sets. Table 26-3 Working With Solaris IP Filter Rule Sets (Task Map)
Managing Packet Filtering Rule Sets for Solaris IP FilterWhen Solaris IP Filter is enabled, both active and inactive packet filtering rule sets can reside in the kernel. The active rule set determines what filtering is being done on incoming packets and outgoing packets. The inactive rule set also stores rules. These rules are not used unless you make the inactive rule set the active rule set. You can manage, view, and modify both active and inactive packet filtering rule sets. How to View the Active Packet Filtering Rule Set
The following example shows output from the active packet filtering rule set that is loaded in the kernel. # ipfstat -io empty list for ipfilter(out) pass in quick on dmfe1 from 192.168.1.0/24 to any pass in all block in on dmfe1 from 192.168.1.10/32 to any How to View the Inactive Packet Filtering Rule Set
The following example shows output from the inactive packet filtering rule set. # ipfstat -I -io pass out quick on dmfe1 all pass in quick on dmfe1 all How to Activate a Different or Updated Packet Filtering Rule SetUse the following procedure if you want to perform either of the following tasks:
The following example shows how to replace one packet filtering rule set with another packet filtering rule set in a separate configuration file, /etc/ipf/ipf.conf. # ipfstat -io empty list for ipfilter(out) pass in quick on dmfe all # ipf -Fa -f /etc/ipf/ipf.conf # ipfstat -io empty list for ipfilter(out) block in log quick from 10.0.0.0/8 to anyExample 26-4 Reloading an Updated Packet Filtering Rule Set The following example shows how to reload a packet filtering rule set that is currently active and which is then updated. In this example, the file in use is /etc/ipf/ipf.conf. # ipfstat -io (Optional) empty list for ipfilter (out) block in log quick from 10.0.0.0/8 to any (Edit the /etc/ipf/ipf.conf configuration file.) # ip -Fa -f /etc/ipf/ipf.conf # ipfstat -io (Optional) empty list for ipfilter (out) block in log quick from 10.0.0.0/8 to any block in quick on elx10 from 192.168.0.0/12 to any How to Remove a Packet Filtering Rule Set
The following example shows how to remove all filtering rules from the active filtering rule set. # ipfstat -io block out log on dmf0 all block in log quick from 10.0.0.0/8 to any # ipf -Fa # ipfstat -io empty list for ipfilter(out) empty list for ipfilter(in) How to Append Rules to the Active Packet Filtering Rule Set
The following example shows how to add a rule to the active packet filtering rule set from the command line. # ipfstat -io empty list for ipfilter(out) block in log quick from 10.0.0.0/8 to any # echo "block in on dmfe1 proto tcp from 10.1.1.1/32 to any" | ipf -f - # ipfstat -io empty list for ipfilter(out) block in log quick from 10.0.0.0/8 to any block in on dmfe1 proto tcp from 10.1.1.1/32 to any How to Append Rules to the Inactive Packet Filtering Rule Set
The following example shows how to add a rule to the inactive rule set from a file. # ipfstat -I -io pass out quick on dmfe1 all pass in quick on dmfe1 all # ipf -I -f /etc/ipf/ipf.conf # ipfstat -I -io pass out quick on dmfe1 all pass in quick on dmfe1 all block in log quick from 10.0.0.0/8 to any How to Switch Between Active and Inactive Packet Filtering Rule Sets
The following example shows how using the ipf -s command results in the inactive rule set becoming the active rule set and the active rule set becoming the inactive rule set.
How to Remove an Inactive Packet Filtering Rule Set From the Kernel
The following example shows how to flush the inactive packet filtering rule set so that all rules have been removed. # ipfstat -I -io empty list for inactive ipfilter(out) block in log quick from 10.0.0.0/8 to any block in on dmfe1 proto tcp from 10.1.1.1/32 to any # ipf -I -Fa # ipfstat -I -io empty list for inactive ipfilter(out) empty list for inactive ipfilter(in) Managing NAT Rules for Solaris IP FilterUse the following procedures to manage, view, and modify NAT rules. How to View Active NAT Rules
The following example shows the output from the active NAT rules set. # ipnat -l List of active MAP/Redirect filters: map dmfe0 192.168.1.0/24 -> 20.20.20.1/32 List of active sessions: How to Remove NAT Rules
The following example shows how to remove the entries in the current NAT rules. # ipnat -l List of active MAP/Redirect filters: map dmfe0 192.168.1.0/24 -> 20.20.20.1/32 List of active sessions: # ipnat -C 1 entries flushed from NAT list # ipnat -l List of active MAP/Redirect filters: List of active sessions: How to Append Rules to the NAT Rules
The following example shows how to add a rule to the NAT rule set from the command line. # ipnat -l List of active MAP/Redirect filters: List of active sessions: # echo "map dmfe0 192.168.1.0/24 -> 20.20.20.1/32" | ipnat -f - # ipnat -l List of active MAP/Redirect filters: map dmfe0 192.168.1.0/24 -> 20.20.20.1/32 List of active sessions: Managing Address Pools for Solaris IP FilterUse the following procedures to manage, view, and modify address pools. How to View Active Address Pools
The following example shows how to view the contents of the active address pool. # ippool -l table role = ipf type = tree number = 13 { 10.1.1.1/32, 10.1.1.2/32, 192.168.1.0/24; }; How to Remove an Address Pool
The following example shows how to remove an address pool. # ippool -l table role = ipf type = tree number = 13 { 10.1.1.1/32, 10.1.1.2/32, 192.168.1.0/24; }; # ippool -F 1 object flushed # ippool -l How to Append Rules to an Address Pool
The following example shows how to add an address pool to the address pool rule set from the command line. # ippool -l table role = ipf type = tree number = 13 { 10.1.1.1/32, 10.1.1.2/32, 192.168.1.0/24; }; # echo "table role = ipf type = tree number = 100 {10.0.0.0/32, 172.16.1.2/32, 192.168.1.0/24};" | ippool -f - # ippool -l table role = ipf type = tree number = 100 { 10.0.0.0/32, 172.16.1.2/32, 192.168.1.0/24; }; table role = ipf type = tree number = 13 { 10.1.1.1/32, 10.1.1.2/32, 192.168.1.0/24; }; |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|