mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Merge branch 'awokd-patch-1'
This commit is contained in:
commit
3f097140fd
@ -32,6 +32,11 @@ Manager and press the "firewall" button:
|
|||||||
|
|
||||||
![r2b1-manager-firewall.png](/attachment/wiki/QubesFirewall/r2b1-manager-firewall.png)
|
![r2b1-manager-firewall.png](/attachment/wiki/QubesFirewall/r2b1-manager-firewall.png)
|
||||||
|
|
||||||
|
*R4.0 note:* ICMP and DNS are no longer accessible in the GUI, but can be changed
|
||||||
|
via `qvm-firewall` described below. Connections to Updates Proxy are no longer made
|
||||||
|
over network so can not be allowed or blocked with firewall rules
|
||||||
|
(see [R4.0 Updates proxy](https://www.qubes-os.org/doc/software-update-vm/) for more detail.
|
||||||
|
|
||||||
Note that if you specify a rule by DNS name it will be resolved to IP(s)
|
Note that if you specify a rule by DNS name it will be resolved to IP(s)
|
||||||
*at the moment of applying the rules*, and not on the fly for each new
|
*at the moment of applying the rules*, and not on the fly for each new
|
||||||
connection. This means it will not work for servers using load balancing. More
|
connection. This means it will not work for servers using load balancing. More
|
||||||
@ -52,7 +57,28 @@ by putting appropriate rules in `/rw/config`. See [below](#where-to-put-firewall
|
|||||||
In complex cases, it might be appropriate to load a ruleset using `iptables-restore`
|
In complex cases, it might be appropriate to load a ruleset using `iptables-restore`
|
||||||
called from `/rw/config/rc.local`.
|
called from `/rw/config/rc.local`.
|
||||||
|
|
||||||
Reconnecting VMs after a NetVM reboot
|
Reconnecting VMs after a NetVM reboot (R4.0)
|
||||||
|
----------------------------------------
|
||||||
|
|
||||||
|
Normally Qubes doesn't let the user stop a NetVM if there are other qubes
|
||||||
|
running which use it as their own NetVM. But in case the NetVM stops for
|
||||||
|
whatever reason (e.g. it crashes, or the user forces its shutdown via qvm-kill
|
||||||
|
via terminal in Dom0), Qubes R4.0 will often automatically repair the
|
||||||
|
connection. If it does not, then there is an easy way to restore the connection to
|
||||||
|
the NetVM by issuing:
|
||||||
|
|
||||||
|
` qvm-prefs <vm> netvm <netvm> `
|
||||||
|
|
||||||
|
Normally qubes do not connect directly to the actual NetVM which has networking
|
||||||
|
devices, but rather to the default sys-firewall first, and in most cases it would
|
||||||
|
be the NetVM that will crash, e.g. in response to S3 sleep/restore or other
|
||||||
|
issues with WiFi drivers. In that case it is only necessary to issue the above
|
||||||
|
command once, for the sys-firewall (this assumes default VM-naming used by the
|
||||||
|
default Qubes installation):
|
||||||
|
|
||||||
|
` qvm-prefs sys-firewall netvm sys-net `
|
||||||
|
|
||||||
|
Reconnecting VMs after a NetVM reboot (R3.2)
|
||||||
----------------------------------------
|
----------------------------------------
|
||||||
|
|
||||||
Normally Qubes doesn't let the user stop a NetVM if there are other qubes
|
Normally Qubes doesn't let the user stop a NetVM if there are other qubes
|
||||||
@ -70,7 +96,7 @@ issues with WiFi drivers. In that case it is only necessary to issue the above
|
|||||||
command once, for the sys-firewall (this assumes default VM-naming used by the
|
command once, for the sys-firewall (this assumes default VM-naming used by the
|
||||||
default Qubes installation):
|
default Qubes installation):
|
||||||
|
|
||||||
` qvm-prefs sys-firewall -s netvm netvm `
|
` qvm-prefs sys-firewall -s netvm sys-net `
|
||||||
|
|
||||||
Enabling networking between two qubes
|
Enabling networking between two qubes
|
||||||
--------------------------------------
|
--------------------------------------
|
||||||
@ -344,7 +370,17 @@ fi
|
|||||||
This time testing should allow connectivity to the service as long as the
|
This time testing should allow connectivity to the service as long as the
|
||||||
service is up :-)
|
service is up :-)
|
||||||
|
|
||||||
Where to put firewall rules
|
Where to put firewall rules (R4.0)
|
||||||
|
---------------------------
|
||||||
|
|
||||||
|
Implicit in the above example [scripts](/doc/config-files/), but worth
|
||||||
|
calling attention to: for all qubes *except* AppVMs supplying networking,
|
||||||
|
iptables commands should be added to the `/rw/config/rc.local` script. For
|
||||||
|
AppVMs supplying networking (`sys-firewall` inclusive),
|
||||||
|
iptables commands should be added to
|
||||||
|
`/rw/config/qubes-firewall-user-script`.
|
||||||
|
|
||||||
|
Where to put firewall rules (R3.2)
|
||||||
---------------------------
|
---------------------------
|
||||||
|
|
||||||
Implicit in the above example [scripts](/doc/config-files/), but worth
|
Implicit in the above example [scripts](/doc/config-files/), but worth
|
||||||
|
Loading…
Reference in New Issue
Block a user