9 .Nd IP packet filter and traffic accounting
13 into the kernel, place the following option in the kernel configuration
15 .Bd -ragged -offset indent
16 .Cd "options IPFIREWALL"
19 Other kernel options related to
21 which may also be useful are:
22 .Bd -ragged -offset indent
23 .Cd "options IPFIREWALL_DEFAULT_TO_ACCEPT"
24 .Cd "options IPFIREWALL_FORWARD"
25 .Cd "options IPFIREWALL_VERBOSE"
26 .Cd "options IPFIREWALL_VERBOSE_LIMIT=100"
31 as a module at boot time, add the following line into the
34 .Bd -literal -offset indent
40 system facility allows filtering,
41 redirecting, and other operations on
43 packets travelling through
46 The default behavior of
48 is to block all incoming and outgoing traffic.
49 This behavior can be modified, to allow all traffic through the
51 firewall by default, by enabling the
52 .Dv IPFIREWALL_DEFAULT_TO_ACCEPT
54 This option may be useful when configuring
59 behavior is to allow everything, it is easier to cope with
60 firewall-tuning mistakes which may accidentally block all traffic.
62 To enable logging of packets passing through
65 .Dv IPFIREWALL_VERBOSE
68 .Dv IPFIREWALL_VERBOSE_LIMIT
71 from flooding system logs or causing local Denial of Service.
72 This option may be set to the number of packets which will be logged on
73 a per-entry basis before the entry is rate-limited.
75 Policy routing and transparent forwarding features of
78 .Dv IPFIREWALL_FORWARD
81 The user interface for
85 utility, so please refer to the
87 manpage for a complete description of the
89 capabilities and how to use it.