Hello Everyone,
I am using IPFW to protect my web server on FreeBSD 12, my problem started after modifying the IPFW script /etc/ipfw.rules and trying to restart IPFW
As I understand from ipfw() adding
My first question is how I can keep my ssh session connected after invoking
My second question is which one is better from security perspective to use
Thanks for your continues support,
Amr
I am using IPFW to protect my web server on FreeBSD 12, my problem started after modifying the IPFW script /etc/ipfw.rules and trying to restart IPFW
# service ipfw restart
while I am connecting remotely to the web server using SSH I lose the connection to the server but fortunately I can reconnect again, after reading IPFW handbook and ipfw() I've found the solution not to lose the SSH session connection by adding $cmd 00102 allow tcp from any to any established
after $cmd 00101 check-state
, but unfortunately option setup limit src-addr 2 will not work.As I understand from ipfw() adding
$cmd 00102 allow tcp from any to any established
is good with setup option.My first question is how I can keep my ssh session connected after invoking
# service ipfw restart
and in the same time I can limit inbound connection with limit option?My second question is which one is better from security perspective to use
$cmd 00102 allow tcp from any to any established
or $cmd 00102 deny tcp from any to any established
? and not to care about SSH session.Thanks for your continues support,
Amr