# kldstat
Id Refs Address Size Name
1 3 0xffffffff80200000 15f0430 kernel
2 1 0xffffffff81a12000 4cc39 ipl.ko
起動時に有効化するよう設定。(以下を追記)
/boot/loader.conf
1
ipl_load="YES"
2. IP Filter 有効化
マシン起動時に IP Filter が有効化するよう設定。(以下を追記)
/etc/rc.conf
12345
ipfilter_enable="YES"# <= IP Filter の有効化ipfilter_rules="/etc/ipf.rules"# <= IP Filter ルール設定ファイルの指定ipfilter_flags=""# <= IP Filter 実行時オプションの指定ipmon_enable="YES"# <= IP Filter ログ機能の有効化ipmon_flags="-D /var/log/ipflog"# <= IP Filter ログ機能実行時オプションの指定
## The following routes should be configured, if not already:##block in log quick from any to any with ipopts
block in log quick proto tcp from any to any with short
pass out on em0 all head 150
block out from 127.0.0.0/8 to any group 150
block out from any to 127.0.0.0/8 group 150
pass in on em0 all head 100
block in from 127.0.0.0/8 to any group 100
## The following routes should be configured, if not already:### 不正なIPパケットを全て拒否してログに記録block in log quick from any to any with ipopts
block in log quick proto tcp from any to any with short
# ========================================# 外部 => 内部 (Group: 100)# ----------------------------------------pass in on em0 all head 100
# アドレス偽装防止block in from 127.0.0.0/8 to any group 100
block in from 192.168.11.102/32 to any group 100
# UDP パケットはデフォルトで拒否block in proto udp all group 100
# 接続が確立されたパケットの通過を許可pass in quick proto tcp all flags A/A group 100
# IDENT には答えないblock return-rst in quick proto tcp from any to any port=113 group 100
# FTP (20, 21) を公開する場合pass in quick proto tcp from any to any port=20 flags S/SA keep state group 100
pass in quick proto tcp from any to any port=21 flags S/SA keep state group 100
# SSH (22) を公開する場合pass in quick proto tcp from any to any port=22 flags S/SA group 100
# SMTP (25) を公開する場合pass in quick proto tcp from any to any port=25 flags S/SA group 100
# DNS (53) を公開する場合pass in quick proto tcp from any to any port=53 flags S/SA group 100
pass in quick proto udp from any to any port=53 group 100
# HTTP (80) を公開する場合pass in quick proto tcp from any to any port=80 flags S/SA group 100
# POP3 (110) を公開する場合pass in quick proto tcp from any to any port=110 flags S/SA group 100
# IMAP (143) を公開する場合pass in quick proto tcp from any to any port=143 flags S/SA group 100
# HTTPS (443) を公開する場合pass in quick proto tcp from any to any port=443 flags S/SA group 100
# SMTPS (465) を公開する場合pass in quick proto tcp from any to any port=465 flags S/SA group 100
# IMAPS (993) を公開する場合pass in quick proto tcp from any to any port=993 flags S/SA group 100
# POP3S (995) を公開する場合pass in quick proto tcp from any to any port=995 flags S/SA group 100
# FTP PASV (4000 - 4005) を公開する場合pass in quick proto tcp from any to any port 4000 >< 4005 flags S/SA keep state group 100
# その他の外部からの TCP 接続を拒否&ログ出力block in log quick proto tcp all flags S/SA group 100
# DNS (53) - 外部 DNS からの戻りパケットpass in proto udp from any port=53 to any group 100
# NTP (123) - 外部 NTP からの戻りパケットpass in proto udp from any port=123 to any group 100
# 内部 => 外部 ping を許可block in log quick proto icmp all group 100
pass in log quick proto icmp all icmp-type 0 group 100
# RFC2979pass in proto icmp all icmp-type 3 group 100
# ========================================# 内部 => 外部 (Group: 150)# ----------------------------------------pass out on em0 all head 150
# アドレス偽装防止block out from 127.0.0.0/8 to any group 150
block out from any to 127.0.0.0/8 group 150
block out from any to 192.168.11.102/32 group 150
# ========================================# Loopback (Group: 0)# ----------------------------------------pass in quick on lo0 all
pass out quick on lo0 all
# ipfstat -io
pass out on em0 all head 150
pass out quick on lo0 all
block out inet from 127.0.0.0/8 to any group 150
block out inet from any to 127.0.0.0/8 group 150
block out inet from any to 192.168.11.102/32 group 150
block in log quick from any to any with ipopts
block in log quick proto tcp from any to any with short
pass in on em0 all head 100
pass in quick on lo0 all
block in inet from 127.0.0.0/8 to any group 100
block in inet from 192.168.11.102/32 to any group 100
block in proto udp from any to any group 100
pass in quick proto tcp from any to any flags A/A group 100
block return-rst in quick proto tcp from any to any port = auth group 100
pass in quick proto tcp from any to any port = ftp-data flags S/SA keep state group 100
pass in quick proto tcp from any to any port = ftp flags S/SA keep state group 100
pass in quick proto tcp from any to any port = 22 flags S/SA group 100
pass in quick proto tcp from any to any port = smtp flags S/SA group 100
pass in quick proto tcp from any to any port = domain flags S/SA group 100
pass in quick proto udp from any to any port = domain group 100
pass in quick proto tcp from any to any port = http flags S/SA group 100
pass in quick proto tcp from any to any port = pop3 flags S/SA group 100
pass in quick proto tcp from any to any port = imap flags S/SA group 100
pass in quick proto tcp from any to any port = https flags S/SA group 100
pass in quick proto tcp from any to any port = smtps flags S/SA group 100
pass in quick proto tcp from any to any port = imaps flags S/SA group 100
pass in quick proto tcp from any to any port = pop3s flags S/SA group 100
pass in quick proto tcp from any to any port 4000 >< 4005 flags S/SA keep state group 100
block in log quick proto tcp from any to any flags S/SA group 100
pass in proto udp from any port = domain to any group 100
pass in proto udp from any port = ntp to any group 100
block in log quick proto icmp from any to any group 100
pass in log quick inet proto icmp from any to any icmp-type echorep group 100
pass in inet proto icmp from any to any icmp-type unreach group 100
7. フィルタリングルールを削除する場合
1234
# ipf -Fa
# ipfstat -io
# empty list for ipfilter(out)
# empty list for ipfilter(in)