User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:18] lucycreate_custom_firewall_rules_iptables_in_lucy [2019/03/01 15:30] lucy
Line 1: Line 1:
-LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf +===== Firewall settings in LUCY < 3.2 ===== 
-The script that reads iptables rules is located in /etc/network/if-up.d/iptables.+LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/opt/phishing/config/iptables.conf". 
 +The script that reads iptables rules is located in "/etc/network/if-up.d/iptables".
  
-Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F"+Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F".
  
  
-LUCY > 3.2In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.+===== Firewall settings in LUCY > 3.2 ===== 
 +In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.
  
create_custom_firewall_rules_iptables_in_lucy.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1