Solved

Need a basic IPTables script for multihomed Linux box with simple packet filter

Posted on 2008-10-22
8
1,229 Views
Last Modified: 2013-11-16
Hi,

I need to configure a simple firewall on a Centos 5 Linux box using IPTables.

The box is multihomed with eth0 being LAN and eth1 being WAN.

All I want to block is all inbound traffic on the WAN apart from UDP Port 4569 (IAX2 protocol).

Not using NAT or routing, no problem with all outbound WAN traffic being allowed either.

Thanks
0
Comment
Question by:EricTViking
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 1

Expert Comment

by:jupike
ID: 22779208

Replace the 0.0.0.0/24 with your internal network range

then the script should allow all traffic from the internal network
allow traffic to UDP port 4569
and block all other incoming traffic
#!/bin/bash
iptables -t filter -A INPUT -s 0.0.0.0/24 -j ACCEPT
iptables -t filter -A INPUT -p udp --destination-port 4569 -j ACCEPT
iptables -t filter -P INPUT DROP

Open in new window

0
 
LVL 11

Author Comment

by:EricTViking
ID: 22942402
Hi, sorry for the delay in responding, have not had access to the linux box for some time...

I tried the script above and it seems to also block internal traffic. Sorry I can't be more specific on what is blocked internally as I don't know where to find the logs from iptables to see what it is blocking.
0
 
LVL 1

Expert Comment

by:jupike
ID: 22943907
it should be correct
you are sure that you changed the iprange to your internal range?

below some adjustments that should log to your systemlog.
#!/bin/bash
/sbin/iptables -t filter -F ACCEPTLOG
/sbin/iptables -t filter -A ACCEPTLOG -j LOG --log-prefix "ACCEPTLOG :"
/sbin/iptables -t filter -A ACCEPTLOG -j ACCEPT
 
/sbin/iptables -t filter -F DROPLOG
/sbin/iptables -t filter -A DROPLOG -j LOG --log-prefix "ACCEPTLOG :"
/sbin/iptables -t filter -A DROPLOG -j DROP
 
iptables -t filter -A INPUT -s 0.0.0.0/24 -j ACCEPTLOG
iptables -t filter -A INPUT -p udp --destination-port 4569 -j ACCEPTLOG
iptables -t filter -A INPUT -s 0.0.0.0/0 -j DROPLOG

Open in new window

0
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

 
LVL 11

Author Comment

by:EricTViking
ID: 22948733
Thanks for the update :-)

Yes, I changed the 0.0.0.0/24 in line 10 to 192.168.99.0/24 which is my internal IP range.

When I try to run the script I get the following:

iptables v1.3.5: Couldn't load target `ACCEPTLOG':/lib/iptables/libipt_ACCEPTLOG.so: cannot open shared object file: No such file or directory

Also, should the 0.0.0.0/0 in line 12 be replaced with my public IP?
0
 
LVL 1

Expert Comment

by:jupike
ID: 22953310
Np
the 0.0.0.0/0 should stay that way it just says block everything that was not handled by previous rules

I added the command to create both the droplog and acceptlog chains
And now i saw what was causing the problem.
With the state related, established  rule the problem should be resolved.

You can turn logging on or off like you wish by replacing the ACCEPTLOG or DROPLOG in the last 3 commands by ACCEPT or DROP.

cheers,
#!/bin/bash
/sbin/iptables -t filter -N ACCEPTLOG
/sbin/iptables -t filter -N DROPLOG
/sbin/iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 
 
/sbin/iptables -t filter -F ACCEPTLOG
/sbin/iptables -t filter -A ACCEPTLOG -j LOG --log-prefix "ACCEPTLOG :"
/sbin/iptables -t filter -A ACCEPTLOG -j ACCEPT
 
/sbin/iptables -t filter -F DROPLOG
/sbin/iptables -t filter -A DROPLOG -j LOG --log-prefix "ACCEPTLOG :"
/sbin/iptables -t filter -A DROPLOG -j DROP
 
iptables -t filter -A INPUT -s 0.0.0.0/24 -j ACCEPTLOG
iptables -t filter -A INPUT -p udp --destination-port 4569 -j ACCEPTLOG
iptables -t filter -A INPUT -s 0.0.0.0/0 -j DROPLOG

Open in new window

0
 
LVL 11

Author Comment

by:EricTViking
ID: 22953939
Hi,

Thanks for that, the script sets up iptables Ok now, but I'm not sure it's working quite right.

When I try to access a web site on the Linux box from the LAN parts of it fail to load and it runs very slowly.

if i do dmesg I can see iptables logs but only ACCEPTLOG, even if I try to access a blocked external port I don't appear to get any DROPLOG messages.

External access does seem to be being blocked correctly though.
0
 
LVL 1

Accepted Solution

by:
jupike earned 500 total points
ID: 22954570
ow i see i added 2 times ACCEPTLOG as log-prefix
changed that and alowing localhost trafic to now.
I guess he was blocking the site connecting to its database.


He might complain about the fact that the ACCEPTLOG and DROPLOG chains already exist. you can ignore that.
#!/bin/bash
/sbin/iptables -t filter -N ACCEPTLOG
/sbin/iptables -t filter -N DROPLOG
/sbin/iptables -t filter -F INPUT
/sbin/iptables -t filter -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT 
 
/sbin/iptables -t filter -F ACCEPTLOG
/sbin/iptables -t filter -A ACCEPTLOG -j LOG --log-prefix "ACCEPTLOG :"
/sbin/iptables -t filter -A ACCEPTLOG -j ACCEPT
 
/sbin/iptables -t filter -F DROPLOG
/sbin/iptables -t filter -A DROPLOG -j LOG --log-prefix "DROPLOG :"
/sbin/iptables -t filter -A DROPLOG -j DROP
 
iptables -t filter -A INPUT -s 127.0.0.0/24 -j ACCEPT
iptables -t filter -A INPUT -s 0.0.0.0/24 -j ACCEPTLOG
iptables -t filter -A INPUT -p udp --destination-port 4569 -j ACCEPTLOG
iptables -t filter -A INPUT -s 0.0.0.0/0 -j DROPLOG

Open in new window

0
 
LVL 11

Author Closing Comment

by:EricTViking
ID: 31508838
Jupike, thanks for a brilliant answer! I appreciate you taking the time to fine tune the script for me - it is now working perfectly and my original question has been fully answered. Here's 2000 points well earned :-)
0

Featured Post

Are Your IoT Devices Out to Get You?

IoT business is booming, with manufacturers connecting any and every “thing” to the Internet. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security a priority? Join our webinar on June 29th for the answer.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question