User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:18] lucycreate_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:19] lucy
Line 1: Line 1:
 +===== Firewall settings in LUCY < 3.2 =====
 LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf
 The script that reads iptables rules is located in /etc/network/if-up.d/iptables. The script that reads iptables rules is located in /etc/network/if-up.d/iptables.
Line 5: Line 6:
  
  
-LUCY > 3.2In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.+===== Firewall settings in LUCY > 3.2 ===== 
 +In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.
  
create_custom_firewall_rules_iptables_in_lucy.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1