This is an old revision of the document!
We originally went with PCX Firewall on our test/development server, as James Pattie was most familiar with it. When we built the production servers, we decided to go with something more standard, so that others would be able to work with it later, if James isn't around. (And he wasn't around when we built the production servers.) So we decided to go with Shorewall. Shorewall also has the advantage that we don't need to provide the IP addresses of the system – it determines them dynamically. So when we change IP addresses, we don't have to re-configure the firewall.
Shorewall doesn't seem to have any requirements, except perhaps a working network stack.
All we want from the firewall is basic host protection. (We don't do any routing, so we don't need to worry about packets going through the system.) We want to allow all outbound connections, and allow inbound connections to only the following ports:
Install shorewall (and its documentation):
apt-get install shorewall shorewall-doc
In /etc/default/shorewall, set shorewall to run by changing this line:
startup=1
Install default config files for systems with one interface:
cd /tmp tar xfz /usr/share/doc/shorewall-doc/examples/one-interface.tgz cp one-interface/* /etc/shorewall/
In /etc/shorewall/shorewall.conf, set some configuration options:
LOGFILE=/var/log/shorewall.log LOGRATE=10/minute LOGBURST=5 IPTABLES=/sbin/iptables
Edit /etc/shorewall/rules to add some rules to allow various ports inbound:
ACCEPT net fw tcp 22 ACCEPT net fw tcp 25 ACCEPT net fw tcp 80 ACCEPT net fw tcp 110 ACCEPT net fw udp 123 ACCEPT net fw tcp 143 ACCEPT net fw tcp 443 ACCEPT net fw tcp 993 ACCEPT net fw tcp 995 ACCEPT net fw tcp 10000
Start shorewall:
touch /var/log/shorewall.log /etc/init.d/shorewall start
To check whether Shorewall is running, check what IP Tables are configured:
iptables -L -vn
This should show a large number of tables.
If Shorewall is not running, check the /var/log/shorewall-init.log
file for details.
The firewall was (originally) constructed with the PCXFirewall Toolkit available here: http://pcxfirewall.sourceforge.net/ After determining list of services to be offered, a list of open ports was created. The following list enumerates that list.
Admin instructions on how to access PCXFirewall
https://63.252.5.3/pcxfirewall/
username – admin
Firewall Config – budlight1
Config Options
Validity Check:
Zones:
Special Protocol Modules:
Rate Limit:
Logging:
Dynamic Interfaces:
Index | Host | LimitTo | Active | Comment |
---|---|---|---|---|
10.0.0.0/8 | false | Class A | ||
192.168.0.0/16 | false | Class C | ||
127.0.0.0/8 | true | Local machine | ||
172.16.0.0/12 | false | Class B | ||
224.0.0.0/4 | false | Class D Multicast | ||
240.0.0.0/5 | true | Class E Reserved | ||
0.0.0.0/8 | false | Illegal except for DHCP | ||
169.254.0.0/16 | true | Link Local Networks | ||
192.0.2.0/24 | false | TEST-NET |
Existing services were left as preconfigured.
Added : POP3s
in | out | ip | source | dest | action | service | active |
---|---|---|---|---|---|---|---|
firewallToExternal | |||||||
* | ALL | ALL | ACCEPT | DNS, SSH, IDENT, SMTP, ICMP, TRACEROUTE, SQUID, HTTP, FTP, BOOTP, NTP, RSYNC | true | ||
externalToFirewall | |||||||
* | ALL | ALL | ACCEPT | SSH, SMTP, POP3, IMAP, ICMP-limited, HTTP, HTTPS, BOOTP, IMAPS, POP3S | true | ||
* | ALL | ALL | Reject | IDENT | true | ||
external | ALL | ALL | Drop No Log | SMB | true | ||
external | ALL | ALL | ACCEPT | Webmin | true | ||
externalBroadcast | |||||||
* | ALL | ALL | ACCEPT | BOOTP | true |
get this from PCXFirewall instructions and put here
Please post changes here in the format of: [H4] date|your name [/H4] [CR]description of chages made
Added Path to allow Webmin access. This was added as a seperate path to allow an easier way to turn the path on or off as needed.
The initial installation
Changed Zone "external" to current static IP address
Remove info regarding PCX Firewall.
Determine if our port list is correct for what we need open. We might want to open up additional ports for LMTP, SMTP w/ SSL, and SMTP w/ forced STARTTLS. Perhaps Squid caching and Rsync as well. We might want to remove Webmin and some of the other ports.
Is Shorewall configured to start on boot at the proper time? Is there a window of time where the network starts up (and there are services running) before Shorewall is protecting the system?
How can we back up our configuration on a regular basis?
How much ICMP do we block? How much do we want to block?
Shorewall was initially installed and configured by Jeff Muse on 2005-07-30. Craig Buchek assisted and documented.
PCX Firewall was initially installed, configured, and documented on the test/development system by James Pattie and Carl Fitch, 2005-02-19.