IPFire comes with a default ruleset which restricts the traffic between the individual network zones. Default and strongly recommended setting is "Allowed" Default zone ruleset It does not affect forwarded traffic from the other local network zones except IPFire acts as proxy. The "Outgoing Firewall" offers a way to control traffic of the IPFire itself. You will then have to create firewall rules to re-allow desired packets between your internal network zones and the Internet. Please note, the traffic from internal zones to your IPFire's RED zone is also affected, but not the traffic of the IPFire system itself. When switching the "Forward Firewall" to "Blocked", the traffic will no longer be transfered between the zones. Such a rule can be added within basic zone policy or it can be customized to fit requirements for your various network zones. This means, in general, that any network packet is allowed to be forwarded to another network zone unless there is an existing rule preventing it. The default value for the "Forward Firewall" is "Allowed". The second section of the page, allows you to modify the Default firewall behaviour for the "Forward" or "Outgoing" connections. Destination network: 224.0.0.0/4 (IP range reserved for multicast purposes) Action: Drop. Could you try changing the rule (one should be sufficient) this way: Source network: RED.
0 Comments
Leave a Reply. |