User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:19]
lucy
create_custom_firewall_rules_iptables_in_lucy [2019/03/01 15:30] (current)
lucy
Line 1: Line 1:
 ===== Firewall settings in LUCY < 3.2 ===== ===== Firewall settings in LUCY < 3.2 =====
-LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /​opt/​phishing/​config/​iptables.conf +LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/​opt/​phishing/​config/​iptables.conf". 
-The script that reads iptables rules is located in /​etc/​network/​if-up.d/​iptables.+The script that reads iptables rules is located in "/​etc/​network/​if-up.d/​iptables".
  
-Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/​remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "​iptables -F"+Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/​remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "​iptables -F".
  
  
create_custom_firewall_rules_iptables_in_lucy.1479712772.txt.gz · Last modified: 2016/11/21 08:19 by lucy