This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
create_custom_firewall_rules_iptables_in_lucy [2016/11/21 08:19] lucy |
create_custom_firewall_rules_iptables_in_lucy [2019/07/25 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
===== Firewall settings in LUCY < 3.2 ===== | ===== Firewall settings in LUCY < 3.2 ===== | ||
- | LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in /opt/phishing/config/iptables.conf | + | LUCY comes with a set of firewall rules build into linux (iptables) to restrict access from the network. The firewall config is restored on each reboot. The rules are stored in "/opt/phishing/config/iptables.conf". |
- | The script that reads iptables rules is located in /etc/network/if-up.d/iptables. | + | The script that reads iptables rules is located in "/etc/network/if-up.d/iptables". |
- | Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F" | + | Using [[recover_your_root_password|root access]] you can either edit the rules in the file, or change/remove the script that reads them on each reboot. To remove the currently applied iptables rules and clear the firewall table you need to run a command "iptables -F". |