Blacklist and Whitelist pf Firewall FreeBSD

Blacklist and Whitelist pf Firewall FreeBSD

pada file pf.conf

Tambahkan Rule :

table <white-list> persist file "/etc/pf/white-list"
table <black-list> persist file "/etc/pf/black-list"

block in from { <black-list> } to any

pass in quick from { <white-list> } to any port 22 (Jika izinkan port 22)

pass in quick from { <white-list> } to any (Jika seluruh port)

Tambahkan IP pada file whitelist atau blacklist

atau bisa menggunakan perintah :

pfctl t white-list T add 23.23.11.0/24

untuk melihat hasilnya :

pfctl t white-list T show

Untuk menghapus :

pfctl t white-list T delete 23.23.11.0/24

Membaca log :

# tcpdump -n -e -ttt -r /var/log/pflog
Note that using tcpdump to watch the pflog file does not give a real-time display. A real-time display of logged packets is achieved by using the pflog0 interface:
# tcpdump -n -e -ttt -i pflog0
When examining the logs, special care should be taken with tcpdump’s verbose protocol decoding (activated via the -v command line option). tcpdump’s protocol decoders do not have a perfect security history. At least in theory, a delayed attack could be possible via the partial packet payloads recorded by the logging device. It is recommended practice to move the log files off of the firewall machine before examining them in this way.
Additional care should also be taken to secure access to the logs. By default, pflogd will record 160 bytes of the packet in the log file. Access to the logs could provide partial access to sensitive packet payloads.

Filtering Log Output
Because pflogd logs in tcpdump binary format, the full range of tcpdump features can be used when reviewing the logs. For example, to only see packets that match a certain port:
# tcpdump -n -e -ttt -r /var/log/pflog port 80
This can be further refined by limiting the display of packets to a certain host and port combination:
# tcpdump -n -e -ttt -r /var/log/pflog port 80 and host 192.168.1.3
The same idea can be applied when reading from the pflog0 interface:
# tcpdump -n -e -ttt -i pflog0 host 192.168.4.2

Referensi :

https://www.openbsd.org/faq/pf/logging.html

https://www.zenarmor.com/docs/network-security-tutorials/freebsd-firewall-configuration-with-pf#how-to-create-pf-ruleset-for-a-web-server

Posted on: July 11, 2023, by :  | 17 views
https://serang.ut.ac.id/css/css/slot88/ https://tinjut.bagkeu.dikdasmen.kemdikbud.go.id/slot-maxwin/ https://dpm.polinema.ac.id/slot-gacor/ https://akademik.ft.unm.ac.id/slot-dana/ https://ppdb.probolinggokab.go.id/slot-5000/ https://bkad.sulselprov.go.id/assets/ https://ojs.balidwipa.ac.id/docs/slot-gacor/ http://korpri.pekalongankab.go.id/api/slot-gacor/ https://elang.umpp.ac.id/foto/farmasi/-/asset/ http://rsud-kelet.jatengprov.go.id/wp-content/-/asset/ https://kusdhianto-fe.staff.ugm.ac.id/slot88/ http://ppdb.probolinggokab.go.id/judi-bola/ https://bapenda.labuhanbatukab.go.id/racikan-sbobet/ http://rsud-kelet.jatengprov.go.id/wp-content/-/data/ https://agenda.riau.go.id/-/judi-bola/ https://balapan.padang.go.id/sbobet88/ http://jdih.wakatobikab.go.id/sbobet88/ http://kph.menlhk.go.id/sbobet88/ https://bkad.sulselprov.go.id/data/ https://dpm.polinema.ac.id/slot-gacor/ https://dinkes.jemberkab.go.id/storage/attachments/