Difference between revisions of "Firewall Management in Linux"

From Observer GigaFlow Support | VIAVI Solutions Inc.
Jump to: navigation, search
 
(3 intermediate revisions by one user not shown)
Line 24: Line 24:
 
  /etc/init.d/iptables save
 
  /etc/init.d/iptables save
  
Rules For '''Firewalld'''
+
Rules For '''Firewalld (Including Oracle Linux)'''
 
  firewall-cmd --zone=public --permanent --add-port=54321-54330/tcp
 
  firewall-cmd --zone=public --permanent --add-port=54321-54330/tcp
 
  firewall-cmd --zone=public --permanent --add-port=5432/tcp
 
  firewall-cmd --zone=public --permanent --add-port=5432/tcp
Line 42: Line 42:
 
  firewall-cmd --zone=public --permanent --add-port=8902/tcp
 
  firewall-cmd --zone=public --permanent --add-port=8902/tcp
 
  firewall-cmd --reload
 
  firewall-cmd --reload
 +
 +
Port forwarding from port 514 to 1514 for syslog ingestion
 +
firewall-cmd --zone=public --permanent --add-port=514/udp
 +
firewall-cmd --zone=public --permanent --add-forward-port=port=514:proto=udp:toport=1514
 +
firewall-cmd --reload
 +
  
 
Port forwarding from port 80 to 7902
 
Port forwarding from port 80 to 7902
Line 49: Line 55:
 
List Rules
 
List Rules
 
   firewall-cmd --list-all
 
   firewall-cmd --list-all
 +
 +
External Requirements For Blacklist, License and Stats Updating
 +
Outbound http to http://homeworld.anuviewsoftware.com/

Latest revision as of 20:20, 2 April 2024

Please note that ports 5432 and 54321:54330 provide access to the database and can be omitted.

Rules For Iptables

iptables -A INPUT -p tcp --dport 54321:54330 -j ACCEPT
iptables -A INPUT -p tcp --dport 5432 -j ACCEPT
iptables -A INPUT -p udp --dport 161 -j ACCEPT
iptables -A INPUT -p udp --dport 162 -j ACCEPT
iptables -A INPUT -p udp --dport 1812 -j ACCEPT
iptables -A INPUT -p udp --dport 1813 -j ACCEPT
iptables -A INPUT -p udp --dport 2055 -j ACCEPT
iptables -A INPUT -p udp --dport 53 -j ACCEPT
iptables -A INPUT -p udp --dport 514 -j ACCEPT
iptables -A INPUT -p udp --dport 1645 -j ACCEPT
iptables -A INPUT -p udp --dport 2050:2060 -j ACCEPT
iptables -A INPUT -p udp --dport 510:520 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -p tcp --dport 7902 -j ACCEPT
iptables -A INPUT -p tcp --dport 8902 -j ACCEPT
iptables -D INPUT -j REJECT --reject-with icmp-host-prohibited
/etc/init.d/iptables save
iptables -A INPUT -j REJECT --reject-with icmp-host-prohibited
/etc/init.d/iptables save

Rules For Firewalld (Including Oracle Linux)

firewall-cmd --zone=public --permanent --add-port=54321-54330/tcp
firewall-cmd --zone=public --permanent --add-port=5432/tcp
firewall-cmd --zone=public --permanent --add-port=5000/udp
firewall-cmd --zone=public --permanent --add-port=161/udp
firewall-cmd --zone=public --permanent --add-port=162/udp
firewall-cmd --zone=public --permanent --add-port=1812/udp
firewall-cmd --zone=public --permanent --add-port=1813/udp
firewall-cmd --zone=public --permanent --add-port=2055/udp
firewall-cmd --zone=public --permanent --add-port=53/udp
firewall-cmd --zone=public --permanent --add-port=514/udp
firewall-cmd --zone=public --permanent --add-port=1645/udp
firewall-cmd --zone=public --permanent --add-port=2050-2060/udp
firewall-cmd --zone=public --permanent --add-port=510-520/udp
firewall-cmd --zone=public --permanent --add-port=22/tcp
firewall-cmd --zone=public --permanent --add-port=7902/tcp
firewall-cmd --zone=public --permanent --add-port=8902/tcp
firewall-cmd --reload

Port forwarding from port 514 to 1514 for syslog ingestion

firewall-cmd --zone=public --permanent --add-port=514/udp
firewall-cmd --zone=public --permanent --add-forward-port=port=514:proto=udp:toport=1514
firewall-cmd --reload


Port forwarding from port 80 to 7902

firewall-cmd --zone=public --permanent --add-forward-port=port=80:proto=tcp:toport=7902
firewall-cmd --reload

List Rules

 firewall-cmd --list-all

External Requirements For Blacklist, License and Stats Updating

Outbound http to http://homeworld.anuviewsoftware.com/