Table of Contents
SUSEfirewall2
is a shell script wrapper for the Linux
firewall setup tool (iptables
). It's controlled by a
human readable configuration file.
Main features of SUSEfirewall2:
sets up secure filter rules by default
easy to configure
requires only a small configuration effort
zone based setup. Interfaces are grouped into zones
supports an arbitrary number of zones
supports forwarding, masquerading, port redirection
supports RPC services with dynamically assigned ports
allows special treatment of IPsec packets
IPv6 support
allows insertion of custom rules through hooks
graphical zone switcher applet for desktop use
The YaST2 firewall module is the recommended tool for configuring SUSEfirewall2. It offers the most common features with a nice user interface and help texts. It also takes care of proper activation of the init scripts. You can directly start the YaST2 firewall configuration via yast2 firewall.
Enable the SUSEfirewall2 systemd unit:
systemctl enable SuSEfirewall2
Edit /etc/sysconfig/SuSEfirewall2
with your
favorite editor. Read the commented lines carefully. They give you
many hints and tips for the configuration. You need to at least add one
network interface to FW_DEV_EXT
for SUSEfirewall2 to
do anything. If you are stuck or need additional hints, take a look at
EXAMPLES
file in
/usr/share/doc/packages/SuSEfirewall2
After you are finished with the configuration you can explicitly start
the firewall via systemd:
systemctl start SuSEfirewall2
SUSEfirewall2 is a frontend for iptables which sets up kernel packet filters, nothing more and nothing less. This means that you are not automatically protected from all security hazards by using SUSEfirewall2. To minimize security risks on a networked system obey the following rules:
Run only those services you actually need. Think twice before opening them to the internet.
Use only software which has been designed with security in mind (like postfix, vsftpd, OpenSSH).
Do not expose services that are designed for use in a LAN to the internet (like e.g. samba, NFS, cups).
Do not run untrusted software. (philosophical question, can you trust SUSE or any other software distributor?)
Run YaST Online Update on a regular basis or enable it's automatic mode to get the latest security fixes.
Subscribe to the opensuse-security-announce mailinglist to keep yourself informed about new and upcoming security issues.
If you are using a server as a firewall/bastion host to the internet for an internal network, try to run proxy services for everything and disable routing on that machine.
If you run DNS on the firewall: disable untrusted zone transfers and either don't allow access to it from the internet or run it split-brained.
Check your log files regularly for unusual entries.
Source code is available at Github
Report any problems via Bugzilla. For discussion about SUSEfirewall2 join the opensuse-security mailinglist.