create_custom_firewall_rules_iptables_in_lucy
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:18] – lucy | create_custom_firewall_rules_iptables_in_lucy [2019/03/01 15:30] – lucy | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in / | + | ===== Firewall settings in LUCY < 3.2 ===== |
- | The script that reads iptables rules is located in / | + | LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/ |
+ | The script that reads iptables rules is located in "/ | ||
- | Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/ | + | Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/ |
- | LUCY > 3.2: In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI. | + | ===== Firewall settings in LUCY > 3.2 ===== |
+ | In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI. | ||
create_custom_firewall_rules_iptables_in_lucy.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1