Start qubes-firewall (which will add "DROP by default" rule) before enabling IP forwarding, to not leave a time slot where some connection could go around configured firewall. QubesOS/qubes-issues#3269
		
			
				
	
	
		
			12 lines
		
	
	
		
			242 B
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
			
		
		
	
	
			12 lines
		
	
	
		
			242 B
		
	
	
	
		
			Desktop File
		
	
	
	
	
	
| [Unit]
 | |
| Description=Qubes firewall updater
 | |
| ConditionPathExists=/var/run/qubes-service/qubes-firewall
 | |
| After=qubes-iptables.service
 | |
| Before=qubes-network.service
 | |
| 
 | |
| [Service]
 | |
| ExecStart=/usr/sbin/qubes-firewall
 | |
| 
 | |
| [Install]
 | |
| WantedBy=multi-user.target
 |