Qortal Project

The future of blockchain platforms

User Tools

Site Tools


hardware_-_firewall_rules

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
hardware_-_firewall_rules [10/09/2019 02:35] gfactorhardware_-_firewall_rules [02/20/2023 19:08] (current) – code formatting quickmythril
Line 1: Line 1:
-====== === Netfilter Tutorial -  How To Secure Your QORT Router and Network Devices Connected To It ===+====== Netfilter Tutorial -  How To Secure Your Qortal Router and Network Devices Connected To It ===
 \\ ====== \\ ======
  
Line 5: Line 5:
 Iptables Linux firewall is used to monitor incoming and outgoing traffic to a computer and filter it based on user-defined rules to prevent anyone from accessing the computer or IP masqueraded devices. Using iptables you can define rules which will allow only selective traffic on your computer or the router itself. Iptables Linux firewall is used to monitor incoming and outgoing traffic to a computer and filter it based on user-defined rules to prevent anyone from accessing the computer or IP masqueraded devices. Using iptables you can define rules which will allow only selective traffic on your computer or the router itself.
  
-===== ==What You Will Need== =====+===== What You Will Need =====
  
 Before you begin with Iptables tutorial, you will need the following: Before you begin with Iptables tutorial, you will need the following:
Line 11: Line 11:
 A local machine with SSH client installed. Putty [[https://www.putty.org/]] is your best option for Windows OS while SSH client comes pre-installed on Linux OS. A local machine with SSH client installed. Putty [[https://www.putty.org/]] is your best option for Windows OS while SSH client comes pre-installed on Linux OS.
  
-===== ==Understand The Basics== =====+===== Understand The Basics =====
  
  
Line 26: Line 26:
 {{ :iptabes-tutorial-input-forward-output.jpg?400 |}} {{ :iptabes-tutorial-input-forward-output.jpg?400 |}}
  
-===== == The Only Few Commands You Will Ever Need == =====+===== The Only Few Commands You Will Ever Need =====
  
  
-This section assumes that you are already SSH'ed into the QORT router. Look at Getting Started [[hardware_-_getting_started|Getting Started]]+This section assumes that you are already SSH'ed into the Qortal router. Look at Getting Started [[hardware_-_getting_started|Getting Started]]
  
 * iptables -L -v (list current firewall rules) \\ * iptables -L -v (list current firewall rules) \\
 * iptables -F (flush all rules) \\ * iptables -F (flush all rules) \\
-* iptables-save > /etc/iptables.rules (saves your custom rules) OR you can edit the file with nano editor /etc/rc.local and paste your rules there. Do "nano /etc/rc.local", paste the rules and Ctrl + X to save and edit.+* iptables-save > /etc/iptables.rules (saves your custom rules) OR you can edit the file with nano editor /etc/rc.local and paste your rules there. Do ''nano /etc/rc.local'', paste the rules and Ctrl + X to save and edit.
  
-===== == Adding Your Firewall Rules == =====+===== Adding Your Firewall Rules =====
  
  
-These rules are copy and paste. Simply paste them at the QORT terminal via SSH and save. \\+These rules are copy and paste. Simply paste them at the Qortal terminal via SSH and save. \\
  
 //**Block outgoing port:**// /sbin/iptables -A OUTPUT -p tcp --dport {PORT-NUMBER-HERE} -j DROP. //For example, you want to block telnet port 21 then put 21 after --dport. It will be /sbin/iptables -A OUTPUT -p tcp --dport 21 -j DROP . Similary, if you wish to block a DNS then it's port 53. Look at common used ports by services on Wikipedia [[https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers]]// \\ //**Block outgoing port:**// /sbin/iptables -A OUTPUT -p tcp --dport {PORT-NUMBER-HERE} -j DROP. //For example, you want to block telnet port 21 then put 21 after --dport. It will be /sbin/iptables -A OUTPUT -p tcp --dport 21 -j DROP . Similary, if you wish to block a DNS then it's port 53. Look at common used ports by services on Wikipedia [[https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers]]// \\
Line 48: Line 48:
 //**Block Outoing DNS**// /sbin/iptables -A OUTPUT -p udp  --dport 53 -j DROP \\  //**Block Outoing DNS**// /sbin/iptables -A OUTPUT -p udp  --dport 53 -j DROP \\ 
  
-//**Block incoming port:**// /sbin/iptables -A INPUT -p tcp --destination-port {PORT-NUMBER-HERE} -j DROP. //It works same as outgoing port syntax. Simply enter port numbers of running services you do not want accessed outside your network.// +//**Block incoming port:**// /sbin/iptables -A INPUT -p tcp --destination-port {PORT-NUMBER-HERE} -j DROP. //It works same as outgoing port syntax. Simply enter port numbers of running services you do not want accessed outside your network. If you wish to allow only a particular IP on any port or service then use -s IP_Address after DROP // 
  
 Examples: \\ Examples: \\
Line 54: Line 54:
 //**Block HTTP**// /sbin/iptables -A INPUT -p tcp --destination-port 80 -j DROP \\ //**Block HTTP**// /sbin/iptables -A INPUT -p tcp --destination-port 80 -j DROP \\
 //**Block HTTPS**// /sbin/iptables -A INPUT -p tcp --destination-port 443 -j DROP \\ //**Block HTTPS**// /sbin/iptables -A INPUT -p tcp --destination-port 443 -j DROP \\
 +//**Block HTTPS**// /sbin/iptables -A INPUT -p tcp -s IP_to_Block --destination-port 443 -j DROP \\
  
-==== == Monitoring Traffic Flow on Router == ====+==== Monitoring Traffic Flow on Router ====
  
  
-It is fairly simple to view what is happening on the router. The pre-installed utility "tcpdump" does all that in a human readable view. The QORT Router comes ready with either your own recursive DNS or a DNS forwarded and to monitor all your DNS lookups, you simple paste this command in terminal: \\+It is fairly simple to view what is happening on the router. The pre-installed utility "tcpdump" does all that in a human readable view. The Qortal Router comes ready with either your own recursive DNS or a DNS forwarded and to monitor all your DNS lookups, you simple paste this command in terminal: \\
  
  //tcpdump port 53 and '(tcp-syn|tcp-ack)!=0'  //tcpdump port 53 and '(tcp-syn|tcp-ack)!=0'
 // \\ // \\
  
-Note that port 53 is used for DNS queries. If you want to see the web site traffic, replace it with port 80.+Note that port 53 is used for DNS queries. If you want to see the web site traffic, replace it with port 80. \\
  
-==== == Monitoring Tor Flow on Router == =====+Example for more custom firewall rules, traffic monitoring can be obtained from official Discord. 
  
 +==== Monitoring Tor Flow on Router =====
  
-The QORT Router comes ready with your own Tor dedicated gateway. You can use it for all types of internet traffic on the router itself and on connected devices such as browsers, QT wallets, Torrents for safety and privacy which is a big deal these days.\\+ 
 + 
 +The Qortal Router comes ready with your own Tor dedicated gateway. You can use it for all types of internet traffic on the router itself and on connected devices such as browsers, QT wallets, Torrents for safety and privacy which is a big deal these days.\\
 {{ :nyx.png?400 |}} {{ :nyx.png?400 |}}
  
 For details on Tor access and it's utilization for connected, head over to [[hardware_-_service_access|Service Access]] For details on Tor access and it's utilization for connected, head over to [[hardware_-_service_access|Service Access]]
hardware_-_firewall_rules.1570602944.txt.gz · Last modified: 10/09/2019 02:35 by gfactor