| ▲ | cyberax 8 hours ago | |||||||
This is BS. "Default deny" or "default accept" makes no practical difference with NAT. You can leave the "default accept" rule with NAT and you'll be perfectly fine except in some weird edge cases. That's because it's exploitable only if you control the next hop from the NAT router, which is typically within the ISP infrastructure. So the attacker will need to either hack your ISP or mess with your NAT router's physical uplink. Both cases require a very dedicated attacker. | ||||||||
| ▲ | johnmaguire 8 hours ago | parent [-] | |||||||
A default deny firewall is a good idea to protect services everywhere in your network, including those which run on the router itself (e.g. many routers run a local DNS server.) Without NAT, packets are not dropped, they simply do not have their destination rewritten to another device on the network. The traffic is still destined for the router and will be processed by it. This is why routers ship with a default-deny firewall rule. NAT is not a firewall. It is address translation. It will not drop packets. | ||||||||
| ||||||||