User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:18] lucycreate_custom_firewall_rules_iptables_in_lucy [2019/07/25 12:49] (current) – external edit 127.0.0.1
Line 1: Line 1:
-LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf +===== Firewall settings in LUCY < 3.2 ===== 
-The script that reads iptables rules is located in /etc/network/if-up.d/iptables.+LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/opt/phishing/config/iptables.conf". 
 +The script that reads iptables rules is located in "/etc/network/if-up.d/iptables".
  
-Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F"+Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F".
  
  
-LUCY > 3.2In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.+===== Firewall settings in LUCY > 3.2 ===== 
 +In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.
  
create_custom_firewall_rules_iptables_in_lucy.1479712724.txt.gz · Last modified: 2019/07/25 12:51 (external edit)