mirror of
https://github.com/sunknudsen/privacy-guides.git
synced 2025-02-23 01:03:59 +00:00
Renamed iptables to firewall
This commit is contained in:
parent
24ca5df635
commit
d3e6c0c7e1
@ -313,7 +313,7 @@ apt update
|
||||
|
||||
#### Install `iptables-persistent` and Vim
|
||||
|
||||
When asked to save current IPv4 or IPv6 rules, answer `Yes`.
|
||||
When asked to save current IPv4 or IPv6 rules, answer “Yes”.
|
||||
|
||||
```shell
|
||||
apt install -y iptables-persistent vim
|
||||
@ -371,7 +371,7 @@ EOF
|
||||
sysctl -p
|
||||
```
|
||||
|
||||
### Step 28: configure iptables
|
||||
### Step 28: configure firewall
|
||||
|
||||
```shell
|
||||
iptables -N SSH_BRUTE_FORCE_MITIGATION
|
||||
@ -434,7 +434,7 @@ ip6tables -P INPUT DROP
|
||||
ip6tables -P OUTPUT DROP
|
||||
```
|
||||
|
||||
### Step 29: log out and log in to confirm iptables didn’t block SSH
|
||||
### Step 29: log out and log in to confirm firewall didn’t block SSH
|
||||
|
||||
#### Log out
|
||||
|
||||
@ -457,7 +457,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi
|
||||
sudo su -
|
||||
```
|
||||
|
||||
### Step 31: make iptables rules persistent
|
||||
### Step 31: make firewall rules persistent
|
||||
|
||||
```shell
|
||||
iptables-save > /etc/iptables/rules.v4
|
||||
|
@ -105,7 +105,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi
|
||||
su -
|
||||
```
|
||||
|
||||
### Step 4: configure iptables
|
||||
### Step 4: configure firewall
|
||||
|
||||
> Heads-up: input rules are likely already configured (run `iptables-save` and `ip6tables-save` to check).
|
||||
|
||||
@ -125,7 +125,7 @@ ip6tables -A OUTPUT -p udp --dport 500 -m state --state NEW -j ACCEPT
|
||||
ip6tables -A OUTPUT -p udp --dport 4500 -m state --state NEW -j ACCEPT
|
||||
```
|
||||
|
||||
#### Make iptables rules persistent
|
||||
#### make firewall rules persistent
|
||||
|
||||
```shell
|
||||
iptables-save > /etc/iptables/rules.v4
|
||||
|
@ -249,13 +249,13 @@ $ source ~/.bashrc
|
||||
|
||||
### Step 17: install iptables-persistent
|
||||
|
||||
When asked to save current IPv4 or IPv6 rules, answer `Yes`.
|
||||
When asked to save current IPv4 or IPv6 rules, answer “Yes”.
|
||||
|
||||
```shell
|
||||
apt install -y iptables-persistent
|
||||
```
|
||||
|
||||
### Step 18: configure iptables
|
||||
### Step 18: configure firewall
|
||||
|
||||
```shell
|
||||
iptables -N SSH_BRUTE_FORCE_MITIGATION
|
||||
@ -334,7 +334,7 @@ ip6tables -P INPUT DROP
|
||||
ip6tables -P OUTPUT DROP
|
||||
```
|
||||
|
||||
### Step 19: log out and log in to confirm iptables didn’t block SSH
|
||||
### Step 19: log out and log in to confirm firewall didn’t block SSH
|
||||
|
||||
#### Log out
|
||||
|
||||
@ -361,7 +361,7 @@ When asked, enter root password.
|
||||
su -
|
||||
```
|
||||
|
||||
### Step 20: make iptables rules persistent
|
||||
### Step 20: make firewall rules persistent
|
||||
|
||||
```shell
|
||||
iptables-save > /etc/iptables/rules.v4
|
||||
|
@ -102,7 +102,7 @@ Setting up trezor-bridge (2.0.30) ...
|
||||
Created symlink /etc/systemd/system/multi-user.target.wants/trezord.service → /usr/lib/systemd/system/trezord.service.
|
||||
```
|
||||
|
||||
### Step 9: configure iptables
|
||||
### Step 9: configure firewall
|
||||
|
||||
```console
|
||||
$ sudo iptables -I OUTPUT 3 -o lo -s 127.0.0.1/32 -d 127.0.0.1/32 -p tcp --dport 21325 --syn -m owner --uid-owner amnesia -m conntrack --ctstate NEW -j ACCEPT
|
||||
|
Loading…
x
Reference in New Issue
Block a user