Pieter,

Based on your message here's what I have. Problem is I still can't do 
anything from the local machine. Can't www, ftp,  ping, etc. Can you take a 
quick look?

Couple other questions:
-What is EXTLAN? Doesn't appear to be used anywhere.

-If I wanted to open up some specific ports, like 10000-10500, would this 
be correct?
-ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 
10000:10500 -j ACCEPT

-What about Virtual IPs? Let's say I have a virtual IP of 192.168.1.9. Just 
add another set of rules for each?

Thanks,
James


echo Loading IPChains
insmod ipchains
echo Settings Vars

#NICs
ANY="any/0"
EXT="eth0"
LPB="lo"

#IP Address
EXTIP="192.168.1.8"

#IP Ranges
EXTLAN="192.168.1.0/24"

PRIVPORTS="0:1023"
UNPRIVPORTS="1024:65535"
ALLPORTS="0:65535"

echo Clearing Firewall Rules
ipchains -F

echo Setting Default Rules - Deny All
ipchains -P input DENY
ipchains -P output DENY
ipchains -P forward DENY

#echo Setting IP Kernel Options and Loading Modules - If you want to
#depmod -a
#modprobe ip_masq_ftp
#modprobe ip_masq_raudio
#modprobe ip_masq_quake 26000,27000,27910,27960
#echo "1" > /proc/sys/net/ipv4/ip_always_defrag
#echo "1" > /proc/sys/net/ipv4/tcp_syncookies
#echo "1" > /proc/sys/net/ipv4/ip_forward

echo Setting Loopback Rules - Allow All
ipchains -A input -i $LPB -j ACCEPT
ipchains -A output -i $LPB -j ACCEPT

#Allow your machine to send data to *ANYWHERE* on *ANY* port
ipchains -A output -i $EXT -s $EXTIP -d $ANY -j ACCEPT

#Allow incoming traffic
ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 22 -j ACCEPT
ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 80 -j ACCEPT
ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 443 -j ACCEPT

#If you want to see the traffic that makes it pass
#the Firewall (denied traffic) then uncomment these
#lines.

#ipchains -A input -i $ANY -j DENY -l
#ipchains -A output -i $ANY -j DENY -l

#use tail -f /var/log/messages to check the messages
#I would disable it because your logs might fill up quickly !


At 05:42 PM 1/2/2002 +0200, you wrote:
>Hello James,
>
>Ok here goes and this is from the top of my head so please use
>"plug-and-prey"
>
>create a file called /etc/rc.d/rc.firewall
>
>Edit rc.local and below fi add
>/etc/rc.d/rc.firewall
>
>Edit rc.firewall and add the following lines
>--snip--
>echo Loading IPChains
>insmod ipchains
>echo Settings Vars
>
>#NICs
>ANY="any/0"
>EXT="eth0"
>LPB="lo"
>
>#IP Address
>EXTIP="192.168.0.1"
>
>#IP Ranges
>EXTLAN="192.168.0.0/24"
>
>PRIVPORTS="0:1023"
>UNPRIVPORTS="1024:65535"
>ALLPORTS="0:65535"
>
>#Darn Rulz !!! - For some people grin
>
>echo Clearing Firewall Rulz
>ipchains -F
>
>echo Setting Default Rulz - Deny All
>ipchains -P input DENY
>ipchains -P output DENY
>ipchains -P forward DENY
>
>echo Setting IP Kernel Options and Loading Modules - If you want to
>depmod -a
>modprobe ip_masq_ftp
>modprobe ip_masq_raudio
>modprobe ip_masq_quake 26000,27000,27910,27960
>echo "1" > /proc/sys/net/ipv4/ip_always_defrag
>echo "1" > /proc/sys/net/ipv4/tcp_syncookies
>echo "1" > /proc/sys/net/ipv4/ip_forward
>
>echo Setting Loopback Rulz - Allow All
>ipchains -A input -i $LPB -j ACCEPT
>ipchains -A output -i $LPB -j ACCEPT
>
>#Allow your machine to send data to *ANYWHERE* on *ANY* port
>ipchains -A output -i $EXT -s $EXTIP -d $ANY -j ACCEPT
>
>#Allow incoming traffic
>ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 22 -j ACCEPT
>ipchains -A input -i $EXT -p tcp -s $ANY $UNPRIVPORTS -d $EXTIP 80 -j ACCEPT
>ipchains -A input -i $EXT -p tcp -S $ANY $UNPRIVPORTS -d $EXTIP 443 -j
>ACCEPT
>
>#If you want to see the traffic that makes it pass
>#the Firewall (denied traffic) then uncomment these
>#lines.
>
>#ipchains -A input -i $ANY -j DENY -l
>#ipchains -A output -i $ANY -j DENY -l
>
>#use tail -f /var/log/messages to check the messages
>#I would disable it because your logs might fill up quickly !
>--snip--
>
>to start the firewall once you on the box and havn't reboot type /etc/rc
>This should do what you want. Sorry I don't know the firewall-config-tool !
>
>Cheers,
>
>Pieter De Wit
>
>-----Original Message-----
>From: James Pifer [mailto:[EMAIL PROTECTED]]
>Sent: Wednesday, January 02, 2002 2:51 PM
>To: [EMAIL PROTECTED]
>Subject: firewall-config tool
>
>
>Is anyone familar with the firewall-config tool that comes installed with
>7.2? I have a system that I need to put on the internet so obviously I need
>to lock it down. I only want the following incoming ports open: 22, 80, and
>443. When on the machine, either on the console or through an x-session,  I
>want it to have no restrictions going out. I've shut all the services down
>that I could, but I'd still like to lock it down as an extra safety measure.
>
>It's not a firewall and has only one NIC. I'm trying to use the
>firewall-config tool to configure it, but it doesn't look right to me when
>I do ipchains -L. I'd be happy to send screen shots of the firewall-config
>settings directly to anyone if that will help.
>
>I'm also not sure what options I should use on the Options tab.
>
>Here's the ipchains -L output:
>[root]# ipchains -L
>Chain input (policy ACCEPT):
>target     prot opt     source                destination           ports
>icmp       icmp ------  anywhere             anywhere              any ->
>any
>ACCEPT     tcp  ------  anywhere             anywhere              any ->
>any
>ACCEPT     udp  ------  anywhere             anywhere              any ->
>any
>ACCEPT     tcp  ------  anywhere             anywhere              ssh ->
>ssh
>ACCEPT     udp  ------  anywhere             anywhere              ssh ->
>ssh
>ACCEPT     tcp  ------  anywhere             anywhere              http
>->   http
>ACCEPT     udp  ------  anywhere             anywhere              http
>->   http
>ACCEPT     tcp  ------  anywhere             anywhere              https
>->   https
>ACCEPT     udp  ------  anywhere             anywhere              https
>->   https
>REJECT     tcp  ------  anywhere             anywhere              any ->
>any
>REJECT     udp  ------  anywhere             anywhere              any ->
>any
>Chain forward (policy DENY):
>Chain output (policy ACCEPT):
>Chain icmp (1 references):
>target     prot opt     source                destination           ports
>ACCEPT     icmp
>------  anywhere             anywhere              destination-unreachable
>ACCEPT     icmp
>------  anywhere             anywhere              source-quench
>ACCEPT     icmp
>------  anywhere             anywhere              time-exceeded
>ACCEPT     icmp
>------  anywhere             anywhere              parameter-problem
>ACCEPT     icmp ------  anywhere             anywhere
>echo-request
>ACCEPT     icmp ------  anywhere             anywhere
>echo-reply
>DENY       all  ------  anywhere             anywhere              n/a
>[root]#
>
>My first rule is that I allow 192.168.1.8(the current Ip address of the
>machine itself) to go anywhere. Eventually this will get changed to a real
>internet address. Instead of listing the ip address I entered, ipchains -L
>has "any" for the source. It looks wide open to me based on the second and
>third rule listed.
>
>Any help on this is greatly appreciated.
>
>James
>
>
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to