Monitoring includes viewing firewall service properties, viewing rules as they are running or viewing possible rule sets, and reviewing log files.
Before You Begin
You must become an administrator who is assigned the Network Firewall Management rights profile. For more information, see Using Your Assigned Administrative Rights in Securing Users and Processes in Oracle Solaris 11.3.
$ svcs -x firewall:default svc:/network/firewall:default (Network Firewall) State: disabled since Fri Apr 10 10:10:50 2015 Reason: Disabled by an administrator. See: http://oracle.com/msg/SMF-8000-05 See: pf.conf(5) See: /var/svc/log/network-firewall:default.log Impact: This service is not running.
$ svccfg -s firewall:default listprop | grep firewall firewall application firewall/fingerprints astring /etc/firewall/pf.os firewall/rules astring /etc/firewall/pf.conf firewall/value_authorization astring solaris.smf.value.network.firewall restarter/logfile astring /var/svc/log/network-firewall:default.log
The following example shows output from the packet filtering rule set that is loaded in the kernel.
# pfctl -s rules empty list for firewall(out) pass in quick on net1 from 198.51.100.0/27 to any pass in all block in on net1 from 198.51.100.10/27 to any
The following command checks the syntax of a rules file. This check does not load rules into the kernel.
# pfctl -n -f /test/firewall/pf.conf