Anyone who can help,

My problem seems to be fairly basic, but I cannot find any documentation
that addresses my situation. I've also tried searching the archives, but
haven't found any answers yet.

I have tried to configure the firewall so that all traffic to port 80 will
be dropped. However, a simple Port Scan conducted at www.grc.com reveals
http, https, ssh to be OPEN as well as ALL OTHER ports to be "CLOSED", not
"STEALTH" , indicating that at the least the following command may not be
configured properly:

 firewall {
        name "from-external" {
            rule 10 {
                protocol: "tcp"
                action: "drop"
                destination {
                    port-number 80

I realize I have "webgui" enabled, which opens tcp 80 and 8080. I would like
to keep this functionality on the INSIDE, but NOT on the OUTSIDE. I would
prefer only SSH for outside inbound configuration access.

So my questions are:

1.  Does the process of enabling "webgui" preclude, or take effect before,
any firewall rule that would otherwise close access to port 80?
2.  If so, then how can I still enable webui on the inside, while
blocking/stealthing tcp 80 on the outside?
3.  I'd also like to place all other tcp ports in a condition that causes
them to "stealthily" DROP packets from the outside, unless
intentionally/administratively opened. How do I accomplish that?

I've also included my full config to help those who may need further
insight. I appreciate anyone who can help!

Thanks,
Josh

@vyagw# show
    protocols {
        static {
            route 0.0.0.0/0 {
                next-hop: xx.xx.xx.33
            }
            route 10.5.203.0/24 {
                next-hop: 10.5.201.253
            }
        }
    }
    policy {
    }
    interfaces {
        loopback lo {
            address 10.5.5.252 {
                prefix-length: 24
            }
        }
        ethernet eth0 {
            description: "OUTSIDE"
            hw-id: 00:05:5d:29:f7:45
            address xx.xx.xx.42 {
                prefix-length: 28
            }
            firewall {
                in {
                    name: "from-external"
                }
            }
        }
        ethernet eth1 {
            description: "Inside"
            hw-id: 00:06:5b:01:5c:36
            address 10.5.50.252 {
                prefix-length: 24
            }
            address 10.5.201.252 {
                prefix-length: 24
            }
        }
        ethernet eth2 {
            hw-id: 00:05:5d:52:1b:75
        }
    }
    service {
        nat {
            rule 10 {
                type: "masquerade"
                outbound-interface: "eth0"
                protocols: "all"
                source {
                    network: " 10.5.201.0/24"
                }
                destination {
                    network: "0.0.0.0/0"
                }
            }
            rule 11 {
                type: "masquerade"
                outbound-interface: "eth0"
                protocols: "all"
                source {
                    network: " 10.5.50.0/24"
                }
                destination {
                    network: "0.0.0.0/0"
                }
            }
        }
        ssh {
        }
        webgui {
        }
    }
    firewall {
        name "from-external" {
            rule 10 {
                protocol: "tcp"
                action: "drop"
                destination {
                    port-number 80
                }
            }
            rule 30 {
                protocol: "tcp"
                state {
                    established: "enable"
                    new: "disable"
                    related: "enable"
                    invalid: "disable"
                }
                action: "accept"
            }
        }
    }
    system {
        host-name: "vyagw"
        name-server 151.164.1.8
        name-server 151.164.11.201
        time-zone: "GMT-6"
        ntp-server "69.59.150.135"
        login {
            user root {
                authentication {
                    encrypted-password: "xxxxxxxxxxx"
                    plaintext-password: ""
                }
            }
            user xxxxxxxxxxxx {
                authentication {
                    encrypted-password: "xxxxxxxxxxx"
                    plaintext-password: ""
                }
            }
        }
        package {
            repository community {
                component: "main"
                url: " http://archive.vyatta.com/vyatta";
            }
        }
    }

[edit]
 --More-- (END)
_______________________________________________
Vyatta-users mailing list
Vyatta-users@mailman.vyatta.com
http://mailman.vyatta.com/mailman/listinfo/vyatta-users

Reply via email to