Renamed iptables to firewall

This commit is contained in:
Sun Knudsen 2021-11-27 11:18:46 -05:00
parent 24ca5df635
commit d3e6c0c7e1
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
4 changed files with 11 additions and 11 deletions

View File

@ -313,7 +313,7 @@ apt update
#### Install `iptables-persistent` and Vim #### Install `iptables-persistent` and Vim
When asked to save current IPv4 or IPv6 rules, answer `Yes`. When asked to save current IPv4 or IPv6 rules, answer “Yes”.
```shell ```shell
apt install -y iptables-persistent vim apt install -y iptables-persistent vim
@ -371,7 +371,7 @@ EOF
sysctl -p sysctl -p
``` ```
### Step 28: configure iptables ### Step 28: configure firewall
```shell ```shell
iptables -N SSH_BRUTE_FORCE_MITIGATION iptables -N SSH_BRUTE_FORCE_MITIGATION
@ -434,7 +434,7 @@ ip6tables -P INPUT DROP
ip6tables -P OUTPUT DROP ip6tables -P OUTPUT DROP
``` ```
### Step 29: log out and log in to confirm iptables didnt block SSH ### Step 29: log out and log in to confirm firewall didnt block SSH
#### Log out #### Log out
@ -457,7 +457,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi
sudo su - sudo su -
``` ```
### Step 31: make iptables rules persistent ### Step 31: make firewall rules persistent
```shell ```shell
iptables-save > /etc/iptables/rules.v4 iptables-save > /etc/iptables/rules.v4

View File

@ -105,7 +105,7 @@ ssh pi@10.0.1.248 -i ~/.ssh/pi
su - su -
``` ```
### Step 4: configure iptables ### Step 4: configure firewall
> Heads-up: input rules are likely already configured (run `iptables-save` and `ip6tables-save` to check). > Heads-up: input rules are likely already configured (run `iptables-save` and `ip6tables-save` to check).
@ -125,7 +125,7 @@ ip6tables -A OUTPUT -p udp --dport 500 -m state --state NEW -j ACCEPT
ip6tables -A OUTPUT -p udp --dport 4500 -m state --state NEW -j ACCEPT ip6tables -A OUTPUT -p udp --dport 4500 -m state --state NEW -j ACCEPT
``` ```
#### Make iptables rules persistent #### make firewall rules persistent
```shell ```shell
iptables-save > /etc/iptables/rules.v4 iptables-save > /etc/iptables/rules.v4

View File

@ -249,13 +249,13 @@ $ source ~/.bashrc
### Step 17: install iptables-persistent ### Step 17: install iptables-persistent
When asked to save current IPv4 or IPv6 rules, answer `Yes`. When asked to save current IPv4 or IPv6 rules, answer “Yes”.
```shell ```shell
apt install -y iptables-persistent apt install -y iptables-persistent
``` ```
### Step 18: configure iptables ### Step 18: configure firewall
```shell ```shell
iptables -N SSH_BRUTE_FORCE_MITIGATION iptables -N SSH_BRUTE_FORCE_MITIGATION
@ -334,7 +334,7 @@ ip6tables -P INPUT DROP
ip6tables -P OUTPUT DROP ip6tables -P OUTPUT DROP
``` ```
### Step 19: log out and log in to confirm iptables didnt block SSH ### Step 19: log out and log in to confirm firewall didnt block SSH
#### Log out #### Log out
@ -361,7 +361,7 @@ When asked, enter root password.
su - su -
``` ```
### Step 20: make iptables rules persistent ### Step 20: make firewall rules persistent
```shell ```shell
iptables-save > /etc/iptables/rules.v4 iptables-save > /etc/iptables/rules.v4

View File

@ -102,7 +102,7 @@ Setting up trezor-bridge (2.0.30) ...
Created symlink /etc/systemd/system/multi-user.target.wants/trezord.service → /usr/lib/systemd/system/trezord.service. Created symlink /etc/systemd/system/multi-user.target.wants/trezord.service → /usr/lib/systemd/system/trezord.service.
``` ```
### Step 9: configure iptables ### Step 9: configure firewall
```console ```console
$ sudo iptables -I OUTPUT 3 -o lo -s 127.0.0.1/32 -d 127.0.0.1/32 -p tcp --dport 21325 --syn -m owner --uid-owner amnesia -m conntrack --ctstate NEW -j ACCEPT $ sudo iptables -I OUTPUT 3 -o lo -s 127.0.0.1/32 -d 127.0.0.1/32 -p tcp --dport 21325 --syn -m owner --uid-owner amnesia -m conntrack --ctstate NEW -j ACCEPT