Michael Schwendt wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Tue, 11 Mar 2003 22:45:17 +0800, [EMAIL PROTECTED] wrote:
>
> > Hello to you,
> >
> > After the following "iptables-rules" on Linux Redhat 7.2 Server :
> >
> > /etc/rc.d/rc.local :
> > iptables -F
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags ALL ALL -j DROP
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j
> > DROP
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags ALL NONE -j DROP
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
> > iptables -A INPUT -i eth0 -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
> > iptables -A INPUT -i eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT
> >
> > iptables -A INPUT -i eth0 -p tcp --dport 80 -j ACCEPT
> > iptables -A INPUT -i eth0 -p tcp --dport 53 -j ACCEPT
> > iptables -A INPUT -i eth0 -p udp --dport 53 -j ACCEPT
> > iptables -A INPUT -i eth0 -m state --state NEW,INVALID -j DROP
> >
> > Then, the Internet users they can only to use the port numbers (
> > services ) : 80 ( Web ) and 53 ( DNS )...
> >
> > On Linux Redhat 6.x Server, we can only to use "ipchains-rules"
> > function  :
>
> You cannot compare iptables and ipchains easily, because in above
> rules you used features which are not available with ipchains.
>
> > ipchains -F
> > ipchains -A input -i eth0 -p tcp --dport 80 -j ACCEPT
> > ipchains -A input -i eth0 -p tcp --dport 53 -j ACCEPT
> > ipchains -A input -i eth0 -p udp --dport 53 -j ACCEPT
> >
> > But, how can we only allow users to use port numbers ( services ) : 80 (
> > Web ) and 53 ( DNS )... ?
>
> Be sure to look into setting the "default policies" or add rules at
> the end of a chain that drop all other traffic (DENY or REJECT).
>
> Observe that a connection has two end-points and that at each
> end-point, data are both received _and_ sent. In your example of a
> web server, your machine receives incoming traffic at _destination_
> port 80, but sends outgoing traffic from _source_ port 80. So, what
> you want is to disallow everything and allow only traffic _to_ and
> _from_ your ports 80 and 53.
>
> Add:
>
>   ipchains --policy input DENY
>   ipchains --policy output DENY
>   ## Allow outgoing traffic from your HTTP/DNS server.
>   ipchains -A output -i eth0 -p tcp --sport 80 -j ACCEPT
>   ipchains -A output -i eth0 -p tcp --sport 53 -j ACCEPT
>   ipchains -A output -i eth0 -p udp --sport 53 -j ACCEPT
>   ## Debugging rules.
>   ipchains -A input -s 0/0 -d 0/0 -l -j REJECT
>   ipchains -A output -s 0/0 -d 0/0 -l -j REJECT
>
> Note however, that your set of rules is incomplete, and you would
> want to allow access to the loopback device, for instance.

Hello,

I'm very hard to study Firewall ( setting )...
So, if I only allow the service ( eg :
www,smtp,pop3,imap,ftp,dns,telnet,ssh,auth ), how to setup the complete
ipchains-rules ?
Is there any sample post in here ?

Very thank for your help !

Edward.




-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to