Solved

How do I allow traffic only from a certain IP range and only allow access to the site through that range?

Posted on 2008-10-03
14
662 Views
Last Modified: 2013-11-16
I have a Linux Centos Server, where I only want to allow traffic through from a DDOS protection server, yet I still need to allow access to the site from all IP addresses, so I cannot use IP Block.
Is there a software firewall/nat product I can install on the server to do this? and how would I go about setting it up to allow traffic from only the ip range that i need?
0
Comment
Question by:leevee1606
  • 7
  • 7
14 Comments
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22639951
i am no sure if i understand question correctly:
you have a DDOS protection server
you have a CentOS linux server

You want connections only from DDOS protection server. If so check for iptables which is linux kernel software firewall/packet filter/nat.
0
 

Author Comment

by:leevee1606
ID: 22639993
ok - where exactly do i find the iptables file, and how do i setup the iptables? I have never setup iptables before. I have ssh access to the server.
0
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22640006
iptables is binary. SSH to CentOS server, su to root and run iptables -L.
You will see rules. Post back.
0
 
LVL 4

Accepted Solution

by:
jozef_mares earned 500 total points
ID: 22640009
oh an i forgot. Rule to allow access to server:

iptables -P INPUT DROP # drop everything
iptables -A INPUT -s 192.168.1.10 -j ACCEPT # allow connection from 192.168.1.10

Think before type because you can block yourself from machine.

0
 

Author Comment

by:leevee1606
ID: 22640057
seems to works the same as ipblock in cpanel?
the minute i use iptables -P INPUT DROP # drop everything, there is no access to the site, even though I have enabled access using the correct IPs in iptables -A INPUT -s 192.168.1.10 -j ACCEPT # allow connection from 192.168.1.10
i need to allow only traffic from the external ddos server, but still allow access to the site from all ip addresses ie: it mustn't work like an ip block
does that make sense?

0
 

Author Comment

by:leevee1606
ID: 22640064
iptables -L
Chain INPUT (policy DROP)
target     prot opt source               destination

ACCEPT     all  --  41.247.214.238       anywhere

ACCEPT     all  --  209.200.128.0/27     anywhere
0
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22640076
well that does not make sense for me. You have to choose if you want access from all hosts in network or from few. You can't have in same time disabled access and enabled.
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:leevee1606
ID: 22640087
ok - sure - sorry, i was a bit confusing there! :)
haven't had my cup of coffee this morning yet!
I need to allow access only from the external server, and then everyone else connects to the site only through that external server.
The problem is that I allow access only from the external server, and it blocks for everyone even when they connect through the external server, as if it is looking at their ip as the access ip
0
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22640124
oh then the problem looks like packet filter is checking source ip which is different from external server.
Simpliest solution is to forward address or ports from external server to CentOS site. This should be setup'ed in external server. On CentOS server than setup proper blocking and every request will go throught external server.
0
 

Author Comment

by:leevee1606
ID: 22640151
ok - makes sense - only the problem i have there is that i cannot do anything on the external server, as it is owned by someone else, and they operate it as a service.
the only other thing i can do, i guess, is setup packet filtering? (which i don't know how to do)
or to stop the packet filter from checking the source ip???
0
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22640165
well depends on how to the requests are processed from external server to your internal network. If they just forwards DNS requests to your internal server then you can enable packet filter and allow connections only from that external server.
But the problem is that i do not know nothing about request and network.
0
 

Author Comment

by:leevee1606
ID: 22640166
i have mod_security installed on the server - is there anything i can setup there?
0
 
LVL 4

Expert Comment

by:jozef_mares
ID: 22640193
mod_security is apache module which allows you to protect web application from common security problems like sql injection and XSS.
You can configure it but this strongly depends on web application. This module check and modifies web requests. Wrong configuration of mod_security can make applications to stop working correctly.

Let's start from beginning what you want to protect and from what. Than we can found hopefully better solution.
0
 

Author Comment

by:leevee1606
ID: 22640205
ok - sounds like i better leave the mod-security alone - i'll just leave the default settings on that.
I think your first solution of the iptables will work the best - i will use that, then just ask the owners of the external server to setup the server so that they just pass through the external requests as from their ip.
Thank you for your help.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now