[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 188
  • Last Modified:

jlivie firewall script

hi you gave me a script a while back and i was wondering where i put my ip address for the line below from file call ./iptables-gw

# Uncomment the following  if the inside machines are trustworthy and
# there are services on the firewall, like DNS, web, etc., that they need to
# access. And remember to change the  IP to be that of the INSIDE interface
# of the firewall.
#
$IPT -A INPUT -i $INSIDE -d $INSIDE_IP -j ACCEPT


and
at the moment i only what one LOCAL PC to login via SSH on the internal LAN is this done in the script or SSHD_CONFIG file
0
jaxxman
Asked:
jaxxman
  • 5
  • 5
1 Solution
 
jlevieCommented:
INSIDE_IP is defined near the top of the file after the initial comment block.

If you only want a single IP on the inside to be able to use ssh you could use:

$IPT -A INPUT -i $INSIDE -s ssh-machine-ip -d $INSIDE_IP -p tcp --dport 22 -j ACCEPT

instead of allowing any machine on the inside to connect on any protocol, which is what the line in the question above does.
0
 
jaxxmanAuthor Commented:
Sorry its took so long for me to get back i am a bit confussed this bit in the line
ssh-machine-ip
Is this the IP address of the PC which is going to connect to the SSH machine
or is this the PC with SSH on it.
by the way i am using SSH to connect to the firewall

Could you please remind me on something.
the iptables-gw file, i edit this file then run it and it updates my iptables. could you please tell me how the system knows that when i execute ./iptables-gw how does it know to update iptables
0
 
jlevieCommented:
"-s ssh-machine-ip" would be the IP of the inside machine that will initiate the ssh connection.

> could you please tell me how the system knows that when i execute ./iptables-gw how does it know to update iptables

When you execute ./iptables-gw it will remove all existing iptables rules and set then back up again.
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 
jaxxmanAuthor Commented:
if i renamed iptables-gw will it still work.

still a bit confussed about SSH

the inside ip address of the firewall is 192.168.253.3 and this is the PC which i want to connect to which is running SSH
my windoes PC ip is 192.168.253.35
so in the script i would use this one 192.168.253.35
0
 
jlevieCommented:
You'd set:

INSIDE=192.168.253.3

in the script and add:

$IPT -A INPUT -i $INSIDE -s  192.168.253.35 -d $INSIDE_IP -p tcp --dport 22 -j ACCEPT

to iptables-gw. After running the script you'd be able to go to the windows box at 192.168.253.35 , start putty or some other ssh clinet and connect via ssh to your Linux firewall.

And no it doesn't matter what the name of the script file is. You could name it /root/have-a-nice-day and then execute it as ./have-a-nice-day from root's login.
0
 
jaxxmanAuthor Commented:
thanks.
just as a matter of interest is that your picture the one with the woman with sun glasses on. because its a really cool pic of you.
0
 
jlevieCommented:
No, that's a made image of a non-existant person.
0
 
jaxxmanAuthor Commented:
oh sorry, now i am lost as to what you look like but that not important as you are able to answer all my problems.

0
 
jlevieCommented:
I really need to get a picture and turn it in...
0
 
jaxxmanAuthor Commented:
yes that would be a good idea
0

Featured Post

Microsoft Certification Exam 74-409

VeeamĀ® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

  • 5
  • 5
Tackle projects and never again get stuck behind a technical roadblock.
Join Now