User Tools

Site Tools


create_custom_firewall_rules_iptables_in_lucy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:18]
lucy
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:19] (current)
lucy
Line 1: Line 1:
 +===== Firewall settings in LUCY < 3.2 =====
 LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /​opt/​phishing/​config/​iptables.conf LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /​opt/​phishing/​config/​iptables.conf
 The script that reads iptables rules is located in /​etc/​network/​if-up.d/​iptables. The script that reads iptables rules is located in /​etc/​network/​if-up.d/​iptables.
Line 5: Line 6:
  
  
-LUCY > 3.2In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.+===== Firewall settings in LUCY > 3.2 ===== 
 +In LUCY > 3.2 you [[firewall_security_settings|can set custom access control lists]] within the GUI.
  
create_custom_firewall_rules_iptables_in_lucy.txt · Last modified: 2016/11/21 08:19 by lucy