User Tools

Site Tools


wiki:firewall

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
wiki:firewall [2018/09/26 12:06]
ghi [Example]
— (current)
Line 1: Line 1:
-====== Firewall ====== 
- 
-The Linux iptables/​ip6tables firewalls are enabled by default. ​ 
- 
-===== Default configuration ===== 
- 
-The Wirnet iBTS firewall has some characteristics:​ 
- 
-  * The automatic acceptance of incoming packets which are analyzed by the kernel as belonging to the same (or some related) flow has been removed. The removed rule was: 
- 
-<​code>​ 
-iptables -A INPUT -m state --state ESTABLISHED,​RELATED -j ACCEPT 
-</​code>​ 
- 
-  * ICMP incoming traffic is accepted, and all outgoing traffic for any protocol is also accepted by default. 
-  * Rules also apply for IPv6, which benefits from the same filtering rules as IPv4.  
-  * Firewall has rejection rules at the end of the INPUT and OUTPUT chains, to properly disallow non-matching trafic. This implies that new rules appended to the chain will never be matched. 
- 
-If you want to add new rules, either make sure to add them to a file in ''/​etc/​firewall.d/'',​ or if you add them in your application,​ prepend them to the chain by using "​-I"​ (insert) instead of "​-A"​ (append). 
- 
-By default, the flows allowed, for IPv4 and IPv6, are: DHCP, DNS, ICMP, SSH, NTP, HTTP (TCP/80), HTTPS. 
- 
-===== Custom rules ===== 
- 
-==== Modify/Add rules ==== 
- 
-Custom rules can be added in ''/​etc/​firewall.d/'',​ in the ''​iptables-save/​dump''​ format.\\ 
-Four tables are already created with default rules. These files can be edited by the user to add or remove rules. Files named ''​*.rules''​ are used for IPv4, and ''​*.v6rules''​ for IPv6. 
- 
-  * 00_default.rules 
-  * 00_default.v6rules 
-  * zz_reject.rules 
-  * zz_reject.v6rules 
- 
-==== Apply new rules ==== 
- 
-To apply new rules, reboot the gateway or restart the firewall with the command ''/​etc/​init.d/​firewall restart''​. 
- 
-==== Check rules applied ==== 
- 
-To check the rules, launch the command: ''​iptables -L''​ for IPv4 rules and ''​ip6tables -L''​ for IPv6 rules. 
- 
-===== Example ===== 
- 
-These rules can allow UDP traffic to go through and from remote port 1600 on UDP: 
- 
-<​code>​ 
--A INPUT -p udp --sport 1600 -j ACCEPT 
--A OUTPUT -p udp --dport 1600 -j ACCEPT 
-</​code>​ 
- 
-Add these rules in the ''/​etc/​firewall.d/​00_default.rules''​ file. 
- 
-<code bash> 
-# Default IPv4 firewall rules for Keros 
-* filter 
-# Open output port for DNS request 
--A OUTPUT -p udp --dport domain -j ACCEPT 
--A INPUT  -p udp --sport domain -j ACCEPT 
--A OUTPUT -p tcp --dport domain -j ACCEPT 
--A INPUT  -p tcp --sport domain ! --syn -j ACCEPT 
- 
-# Allows loopback 
--A INPUT  -i lo -j ACCEPT 
--A OUTPUT -o lo -j ACCEPT 
- 
-# SSH 
--A OUTPUT -p tcp --dport ssh -j ACCEPT 
--A INPUT  -p tcp --sport ssh ! --syn -j ACCEPT 
--A OUTPUT -p tcp --sport ssh -j ACCEPT 
--A INPUT  -p tcp --dport ssh -j ACCEPT 
- 
-# NTP Out 
--A OUTPUT -p udp --dport ntp -j ACCEPT 
--A INPUT  -p udp --sport ntp -j ACCEPT 
- 
-# outbound HTTP + HTTPS 
--A OUTPUT -p tcp --dport http -j ACCEPT 
--A INPUT  -p tcp --sport http ! --syn -j ACCEPT 
--A OUTPUT -p tcp --dport https -j ACCEPT 
--A INPUT  -p tcp --sport https ! --syn -j ACCEPT 
- 
-# ICMP 
--A OUTPUT -p icmp -j ACCEPT 
--A INPUT  -p icmp -j ACCEPT 
- 
-# TCP resets that we use to REJECT connection attempts 
--A OUTPUT -p tcp --tcp-flags RST RST -j ACCEPT 
-# or that we receive (useful to terminate connection if no symmetric rule exist on INPUT) 
--A INPUT  -p tcp --tcp-flags RST RST -j ACCEPT 
- 
-# DHCP client and server 
--A INPUT -p udp --dport bootps:​bootpc --sport bootps:​bootpc -j ACCEPT 
- 
-# My new rules  
--A OUTPUT -p udp --dport 1600 -j ACCEPT 
--A INPUT -p udp --sport 1600 -j ACCEPT 
- 
-COMMIT 
-</​code>​ 
- 
-Restart the firewall to apply the rules: 
- 
-<code bash> 
-# /​etc/​init.d/​firewall restart 
-Flushing iptable rules. 
-Set default policy to '​ACCEPT'​ 
-Flushing ip6table rules. 
-Setting default IPv6 policy to '​ACCEPT'​ 
-Flushing iptable rules. 
-Applying IPv4 firewall config file /​etc/​firewall.d//​00_default.rules 
-Applying IPv4 firewall config file /​etc/​firewall.d//​zz_reject.rules 
-Flushing ip6table rules. 
-Applying IPv6 firewall config file /​etc/​firewall.d//​00_default.v6rules 
-Applying IPv6 firewall config file /​etc/​firewall.d//​zz_reject.v6rules 
-root@klk-lpbs-04018B:/​user/​rootfs_rw/​etc/​firewall.d #  
-</​code>​ 
- 
-Check the result with: 
- 
-<code bash> 
-# iptables -L 
-Chain INPUT (policy ACCEPT) 
-target ​    prot opt source ​              ​destination ​         
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp spt:domain 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp spt:domain flags:​!FIN,​SYN,​RST,​ACK/​SYN 
-ACCEPT ​    ​all ​ --  anywhere ​            ​anywhere ​           ​ 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp spt:ssh flags:​!FIN,​SYN,​RST,​ACK/​SYN 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp dpt:ssh 
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp spt:ntp 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp spt:http flags:​!FIN,​SYN,​RST,​ACK/​SYN 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp spt:https flags:​!FIN,​SYN,​RST,​ACK/​SYN 
-ACCEPT ​    icmp --  anywhere ​            ​anywhere ​           ​ 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp flags:​RST/​RST 
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp spts:​bootps:​bootpc dpts:​bootps:​bootpc 
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp spt:1600 
-REJECT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            ​reject-with tcp-reset 
-REJECT ​    ​all ​ --  anywhere ​            ​anywhere ​            ​reject-with icmp-port-unreachable 
-Chain FORWARD (policy ACCEPT) 
-target ​    prot opt source ​              ​destination ​         
-Chain OUTPUT (policy ACCEPT) 
-target ​    prot opt source ​              ​destination ​         
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp dpt:domain 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp dpt:domain 
-ACCEPT ​    ​all ​ --  anywhere ​            ​anywhere ​           ​ 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp dpt:ssh 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp spt:ssh 
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp dpt:ntp 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp dpt:http 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp dpt:https 
-ACCEPT ​    icmp --  anywhere ​            ​anywhere ​           ​ 
-ACCEPT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            tcp flags:​RST/​RST 
-ACCEPT ​    ​udp ​ --  anywhere ​            ​anywhere ​            udp dpt:1600 
-REJECT ​    ​tcp ​ --  anywhere ​            ​anywhere ​            ​reject-with tcp-reset 
-REJECT ​    ​all ​ --  anywhere ​            ​anywhere ​            ​reject-with icmp-port-unreachable 
-</​code>​ 
  
wiki/firewall.1537956414.txt.gz · Last modified: 2019/01/17 10:01 (external edit)