User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:19] lucycreate_custom_firewall_rules_iptables_in_lucy [2019/07/25 12:49] (current) – external edit 127.0.0.1
Line 1: Line 1:
 ===== Firewall settings in LUCY < 3.2 ===== ===== Firewall settings in LUCY < 3.2 =====
-LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf +LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/opt/phishing/config/iptables.conf". 
-The script that reads iptables rules is located in /etc/network/if-up.d/iptables.+The script that reads iptables rules is located in "/etc/network/if-up.d/iptables".
  
-Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F"+Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F".
  
  
create_custom_firewall_rules_iptables_in_lucy.txt · Last modified: 2019/07/25 12:49 by 127.0.0.1