I’m looking at a sample firewall rule for a workstation and it has this line:
# activate the following line to accept common local services
#tcp dport { 22, 80, 443 } ct state new accept
Local to what? The machine or domain?
This is a standalone machine that doesn’t provide anything to a network so there shouldn’t be a need for incoming requests.
I’m trying to get these messages to stop:
[90378.652440] FW6 REJECT (input): IN=enp1s0 OUT= MAC=33:33:00:00:00:01:48:4e:fc:f0:69:b8:86:dd SRC=fe80:0000:0000:0000:4a4e:fcff:fef0:69b8 DST=ff02:0000:0000:0000:0000:0000:0000:0001 LEN=168 TC=0 HOPLIMIT=255 FLOWLBL=356592 PROTO=ICMPv6 TYPE=134 CODE=0
I believe they’re multicast messages which would be solved by adding this:
# ICMPv6 packets which must not be dropped, see https://tools.ietf.org/html/rfc4890#section-4.4.1
meta nfproto ipv6 icmpv6 type { destination-unreachable, packet-too-big, time-exceeded, parameter-problem, echo-reply, echo-request, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, 148, 149 } accept
ip6 saddr fe80::/10 icmpv6 type { 130, 131, 132, 143, 151, 152, 153 } accept
I’m also unsure about this line:
# accept traffic originated from us
ct state established,related accept
us as in USA or us as in the domain?
That I’m aware of I should be able to just drop all incoming traffic (except what is required for IP6 to work) and allow all outgoing traffic.