Hi,
As explained in another thread I have created a minimal sys-wall
along with a sys-dns
using the structure explained in the documentation:
sys-net <--> sys-firewall <--> sys-dns <--> sys-wall <--> [client qubes]
Everything works as expected.
A problem arises when I add restricting rules for client qubes using the standard procedure: in the firewall tab of the qube I set the proper host, protocol and port (e.g. mybank.com
and TCP port 443
). Unlike the standard case with one firewall only (sys-firewall
) the result is: networking stops to work in the client qube. If I remove the restricting firewall rules of the qube everything works again. Of course, I can manually add custom firewall rules directly in sys-wall
(and its template), however I would like to have the easiness of using the GUI. I couldn’t find any information on how exactly rules set through GUI (or through qvm-firewall
) interact with underlying firewall software. When I look at the output of iptables -L -n -v
and nft list ruleset
in sys-firewall
I don’t see any of the IP addresses I use in the restricting rules, as if there is no interaction between what I set and the actual firewall.
My question is:
What is the right way to use restricting qvm-firewall
rules with the layout recommended in the docs (with a second sys-wall
)?