This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision Next revision Both sides next revision | ||
сервис_firewall [2020/07/16 08:05] val [CentOS] |
сервис_firewall [2020/12/01 16:34] val [Debian/Ubuntu (iptables)] |
||
---|---|---|---|
Line 14: | Line 14: | ||
=== Настройка фильтра === | === Настройка фильтра === | ||
<code> | <code> | ||
- | root@gate:~# cat firewall.sh | + | root@clientN:~# cat firewall.sh |
</code><code> | </code><code> | ||
iptables --flush | iptables --flush | ||
Line 21: | Line 21: | ||
iptables -A INPUT -j DROP | iptables -A INPUT -j DROP | ||
</code><code> | </code><code> | ||
- | root@gate:~# sh firewall.sh | + | root@clientN:~# sh firewall.sh |
</code> | </code> | ||
=== Просмотр правил фильтра === | === Просмотр правил фильтра === | ||
<code> | <code> | ||
- | root@gate:~# iptables -t filter -n -L -v --line-numbers | + | # iptables -t filter -n -L -v --line-numbers |
или | или | ||
- | root@gate:~# iptables -n -L -v --line-numbers | + | # iptables -n -L -v --line-numbers |
</code> | </code> | ||
Line 36: | Line 36: | ||
<code> | <code> | ||
- | # cat /proc/net/ip_conntrack | ||
- | |||
# apt install conntrack | # apt install conntrack | ||
Line 45: | Line 43: | ||
=== Сохранение состояния iptables === | === Сохранение состояния iptables === | ||
<code> | <code> | ||
- | root@gate:~# iptables-save > /etc/iptables.rules | + | # iptables-save > /etc/iptables.rules |
</code> | </code> | ||
=== Восстановление состояния iptables === | === Восстановление состояния iptables === | ||
<code> | <code> | ||
- | root@gate:~# iptables-restore < /etc/iptables.rules | + | # iptables-restore < /etc/iptables.rules |
</code> | </code> | ||
Line 57: | Line 55: | ||
== Debian/Ubuntu == | == Debian/Ubuntu == | ||
<code> | <code> | ||
- | root@gate:~# cat /etc/network/interfaces | + | # cat /etc/network/interfaces |
</code><code> | </code><code> | ||
... | ... | ||
Line 167: | Line 165: | ||
iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 53 -j ACCEPT | iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 53 -j ACCEPT | ||
#iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 25 -j REJECT | #iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 25 -j REJECT | ||
- | iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 25 -j ACCEPT | + | #iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 25 -j ACCEPT |
+ | #iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 465 -j ACCEPT | ||
+ | #iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 587 -j ACCEPT | ||
+ | #iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 143 -j ACCEPT | ||
iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 80 -j ACCEPT | iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 80 -j ACCEPT | ||
- | iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 143 -j ACCEPT | + | iptables -A FORWARD -i eth1 -p tcp -d 192.168.X.10 --dport 5222 -j ACCEPT |
- | #iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 5006 -j ACCEPT | + | |
+ | #iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 5060 -j ACCEPT | ||
#iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 4569 -j ACCEPT | #iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 4569 -j ACCEPT | ||
#iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 10000:20000 -j ACCEPT | #iptables -A FORWARD -i eth1 -p udp -d 192.168.X.10 --dport 10000:20000 -j ACCEPT | ||
Line 187: | Line 189: | ||
conntrack -F | conntrack -F | ||
</code><code> | </code><code> | ||
+ | root@gate:~# apt install conntrack | ||
+ | |||
root@gate:~# sh firewall.sh | root@gate:~# sh firewall.sh | ||
Line 291: | Line 295: | ||
</code><code> | </code><code> | ||
... | ... | ||
- | iptables -A FORWARD -j LOG --log-prefix "iptables denied: " --log-level 7 | + | iptables -A ... -j LOG --log-prefix "iptables denied: " --log-level 7 |
- | + | iptables -A ... -j DROP | |
- | iptables -A FORWARD -j DROP | + | |
</code><code> | </code><code> | ||
root@gate:~# sh firewall.sh | root@gate:~# sh firewall.sh | ||
Line 387: | Line 390: | ||
</code><code> | </code><code> | ||
iptables --flush | iptables --flush | ||
- | |||
- | #### for brute force #### | ||
- | iptables -I FORWARD -p tcp --dport 22 -i eth1 -m conntrack --ctstate NEW -m recent --set | ||
- | iptables -I FORWARD -p tcp --dport 22 -i eth1 -m conntrack --ctstate NEW -m recent --update --seconds 60 --hitcount 4 -j DROP | ||
... | ... | ||
+ | iptables -A FORWARD -p tcp --dport 80 -i eth1 -m conntrack --ctstate NEW -m recent --update --seconds 60 --hitcount 4 -j LOG | ||
+ | iptables -A FORWARD -p tcp --dport 80 -i eth1 -m conntrack --ctstate NEW -m recent --update --seconds 60 --hitcount 4 -j DROP | ||
+ | iptables -A FORWARD -p tcp --dport 80 -i eth1 -m conntrack --ctstate NEW -m recent --set | ||
+ | ... | ||
+ | </code><code> | ||
+ | root@gate:~# tail -f /var/log/syslog | ||
+ | |||
+ | root@gate:~# cat /proc/net/xt_recent/DEFAULT | ||
+ | |||
+ | root@gate:~# echo -10.5.7.1 >/proc/net/xt_recent/DEFAULT | ||
+ | |||
+ | root@gate:~# echo / >/proc/net/xt_recent/DEFAULT | ||
</code> | </code> | ||
+ | |||
==== FreeBSD (pf) ==== | ==== FreeBSD (pf) ==== | ||