writing extended state information ... Des
fact: 1 http://ftp.rediris.es etch / main gawk 1:3.1.5. Dfsg-4 [694kb]
Des: 2 http://ftp.rediris.es etch / main arno-iptables-firewall 1.8.8.c-1 [97.7 kB] Downloaded
792kb in 44s (17.8 kB / s).
Once installed, the following window will appear that asks if you want to configure the package with debconf.
3.
Now we specify that we need to have TCP ports open on our firewall.
our router's firewall must also open these ports.
5.
6.
The following window should only set it in case we have multiple network cards (eth0, eth1 ...) and one of them is set to our local network to which we allow any connection to our team.
Finally we started our firewall.
configure packages ... Selecting
package arno-iptables-firewall previously selected.
arno-iptables-firewall (1.8.8.c-1) ...
Passed Sanity checks ... OK
Setting the max. amount of simultaneous connections to 16384
Enabling protection against source routed packets
Setting default conntrack timeouts
Enabling reduction of the DoS'ing ability
Setting Default TTL=64
Disabling ECN (Explicit Congestion Notification)
Enabling support for dynamic IP's
Flushing route table
/proc/ setup done...
Flushing rules in the filter table
Setting default (secure) policies
Using loglevel "info" for syslogd
Setting up firewall rules:
-------------------------------------------------------------------------------
Accepting packets from the local loopback device
Enabling setting the maximum packet size via MSS
Enabling mangling TOS
Logging of stealth scans (nmap probes etc.) enabled
Logging of packets with bad TCP-flags enabled
Logging of INVALID packets disabled
Logging of fragmented packets enabled
Logging of access from reserved addresses enabled
Setting up anti-spoof rules
Reading custom IPTABLES rules from /etc/arno-iptables-firewall/custom-rules
Loading (user) plugins
Setting up INPUT policy for the external net (INET):
Enabling support for a DHCP assigned IP on external interface(s): eth0
Logging of explicitly blocked hosts enabled
Logging of denied local output connections enabled
Packets will NOT be checked for private source addresses
Allowing the whole world to connect to TCP port(s): 4661 22
Allowing the whole world to connect to UDP port(s): 4664
Denying the whole world to send ICMP-requests(ping)
Logging of dropped ICMP-request(ping) packets enabled
Logging of dropped other ICMP packets enabled
Logging of possible stealth scans enabled
Logging of (other) connection attempts to PRIVILEGED TCP ports enabled
Logging of (other) connection attempts to PRIVILEGED UDP ports enabled
Logging of (other) connection Attempts to TCP ports enabled UNPRIVILEGED
Logging of (other) connection Attempts to UNPRIVILEGED UDP ports enabled Logging of
Other IP protocols (non TCP / UDP / ICMP) connection Attempts
enabled Logging of ICMP flooding enabled
Applying INET policy to external (INET) interface: eth0 (without an external subnet Specified)
Security is ENFORCED for external interface (s) in the FORWARD chain
23:36:20
April 1902 Applied All firewall rules .
We'll have our firewall configured.
We re-run the firewall configuration to following command: # dpkg-reconfigure arno-iptables-firewall
If we want to temporarily disable the firewall:
# / etc / init.d / arno-iptables-firewall stop
To enable it again :
#
/ etc / init.d / arno-iptables-firewall start With package # tar-zxvf arno-iptables-firewall_1.9.2m.tar.gz
# cd arno-iptables-firewall_1.9.2m # cd
arno-iptables-firewall_1.9.2m # iptables-L-n
# / etc / init.d / arno-iptables-firewall start