1. | Why is communication between two interfaces in the same zone not working? |
For security reasons, no network may communicate to another until
configured otherwise. Even if both are "trusted" internal networks.
You can allow full traffic with
| |
2. | Some service does not work when the firewall is enabled. How do I find out what's wrong? |
Enable logging of all dropped packets and disable the log limit in
FW_LOG_DROP_CRIT="yes" FW_LOG_DROP_ALL="yes" FW_LOG_LIMIT="no"
Run SuSEfirewall2 again.
You may also run SuSEfirewall2 in test mode: SuSEfirewall2 test. Then try to connect to the service in a way which failed before. It will work because SuSEfirewall2 does not actually filter any packets this time. However, it will still log all packets it normally would have dropped. If everything works again don't forget to set the log options back to normal to not fill up you log files. | |
3. | Some web site that offers port scanning claims my system is not protected properly as it still responds to ICMP echo requests (ping) |
ICMP echo requests are harmless however they are a fundametal means to determine whether hosts are still reachable. Blocking them would seriously impact the ability to track down network problems. It is therefore not considered nice behaviour for an internet citizen to drop pings. | |
4. | Can't the evil guys detect whether my host is online if it responds to ICMP echo requests? |
Yes but they can detect that anyways. The router at your provider behaves different depending on whether someone is dialed in or not. | |
5. | SuSEfirewall2 drops most packets but it doesn't fully hide the presence of my machine. Isn't that a security hole? |
You machine is never fully invisible, see previous question. The purpose of dropping packets is not to hide your machine but to slow down port scans. | |
6. |
The |
Set the variable FW_IPSEC_TRUST="int" FW_SERVICES_EXT_IP="esp" FW_SERVICES_EXT_UDP="isakmp" FW_PROTECT_FROM_INT="no"
| |
7. | Why is SuSEfirewall2 so slow? / Can't you just use iptables-restore? |
| |
8. | Enabling drbd blocks the boot process. How to get around that? |
During boot process all incoming traffic is blocked
unconditionally. The very last boot script then sets up
the configured firewall rules. The problem is that drbd
blocks the boot process while waiting for incoming
connection from other nodes. Therefore configuring the
drbd port in
| |
9. | My wireless LAN network interface is configured for the external zone. Sometimes I need to connect to trusted networks that offer e.g. printing or file sharing. How can I solve that without opening ports in the external zone? |
The Firewall Zone Switcher applet allows desktop users to switch zones with only few mouse clicks. It's included in openSUSE since version 11.2. |