Improve company productivity with a Business Account.Sign Up

x
?
Solved

How to check the below rules applied in my firewall?

Posted on 2008-06-26
12
Medium Priority
?
247 Views
Last Modified: 2010-04-09
-A INPUT -i eth1 -p tcp --destination-port 25 -j REJECT
-A INPUT -i eth1 -p tcp --destination-port 5432 -j REJECT
-A INPUT -i eth1 -p tcp --destination-port 22 -j ACCEPT
-A INPUT -i eth1 -p tcp --destination-port 80 -j ACCEPT
-A INPUT -i eth1 -p tcp --destination-port 443 -j ACCEPT
-A OUTPUT -i eth1 -p tcp --destination-port 25 -j ACCEPT

It shouldn't let to expose 25 and 5432 through the firewall.
 unblock ports 22 for ssh, 80 for http and 443 for https.
25 should be kept open for outgoing traffic only
0
Comment
Question by:jaisonshereen
  • 6
  • 6
12 Comments
 
LVL 13

Accepted Solution

by:
MicheleMarcon earned 2000 total points
ID: 21874564
0
 

Author Comment

by:jaisonshereen
ID: 21874596
I am getting this output:      


    * It appears that your IP address, 203.145.173.2, is listed in the Spamhaus Exploits Block List which is a list of IP addresses of hijacked PC's infected by illegal 3rd party exploits, open proxies (HTTP, socks, AnalogX, wingate, etc), worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
    * Until your IP address has been removed your IP address will not be able to use this service.
    * Please please be sure to get your IP address removed from the Spamhaus Exploits Block List before using this service again.
0
 
LVL 13

Assisted Solution

by:MicheleMarcon
MicheleMarcon earned 2000 total points
ID: 21881415
http://www.spamhaus.org/xbl/

input your IP address on the box on the left side.
0
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

 

Author Comment

by:jaisonshereen
ID: 21881422
IP Address Lookup

            74.XX.XX.71+ is not a valid IP address.



If the IP you are checking is not in our database, but you are receiving bounce messages saying it is, then it is probable the IP has been removed from our database but DNS servers around the internet have not yet updated. In this case, wait 1-2 hours and the blocking should clear by itself.

This lookup tool is for manual (non-automated) lookups only. Any perceived use of automated tools to access this system will result in firewalling or other countermeasures.
0
 
LVL 13

Expert Comment

by:MicheleMarcon
ID: 21881842
203.145.173.2 is your IP address.
0
 

Author Comment

by:jaisonshereen
ID: 21881891
no
0
 
LVL 13

Expert Comment

by:MicheleMarcon
ID: 21882583
Anyway 74.XX.XX.71 is not an IP Addess.

There should be some numbers instead of XX
0
 

Author Comment

by:jaisonshereen
ID: 21882625
i cannot provide it ..because its confidential
0
 
LVL 13

Expert Comment

by:MicheleMarcon
ID: 21883306
You don't need to tell it to me, you need to insert it on the spamhaus website.

If you do this way your IP will be removed from the block list and finally you will be able to use the port scanner on the first post.
0
 

Author Comment

by:jaisonshereen
ID: 21883331
that result i shown u above!
0
 

Author Comment

by:jaisonshereen
ID: 21883390
and i donno y it is showing like this ....203.145.173.2
actully i put the original ip and its showing some different ip as above
0
 
LVL 13

Assisted Solution

by:MicheleMarcon
MicheleMarcon earned 2000 total points
ID: 21883872
OK, then try with this software:

http://www.cafeaulait.org/course/week12/16.html
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This article will show you step-by-step instructions to build your own NTP CentOS server.  The network diagram shows the best practice to setup the NTP server farm for redundancy.  This article also serves as your NTP server documentation.
Welcome back to our beginners guide of the popular Unix tool, cron. If you missed part one where we introduced this tool, the link is below. We left off learning how to build a simple script to schedule automatic back ups. Now, we’ll learn how to se…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question