Home PC Games Linux Windows Database Network Programming Server Mobile  
  Home \ Server \ Linux firewall settings -DNS server articles     - PostgreSQL Stream Configuration (Database)

- Use Bosh deploy CloudFoundry problems encountered on OpenStack (Server)

- Oracle 12C modify spfile path (Database)

- rsync server set up (Server)

- Comparison of C # and Java (Programming)

- How Linux system password security guarantee (Linux)

- How to install Visual Studio Code on Ubuntu (Linux)

- How VirtualBox and VMware virtual machine conversion (Linux)

- How comprehensive resist attacks from the network (Linux)

- Ubuntu GCC, G ++ and fortran Version Switch (Linux)

- Linux Shell Understanding and Learning (Linux)

- 6 common PHP security attacks (Linux)

- Ubuntu 14.04 installation and configuration environment variable JDK1.8.0_25 (Linux)

- The traffic monitoring system: cacti (Linux)

- Learning and Practice (Linux)

- Linux Apache server configure to protect system security (Linux)

- Java String and StringBuffer and StringBuilder Comments (Programming)

- Linux Live CD lets your PC is no longer secure (Linux)

- Raspberry Pi 2 to install the latest version of the FPC and Lazarus 1.5 (Linux)

- SSH configuration under Linux (Linux)

  Linux firewall settings -DNS server articles
  Add Date : 2018-11-21      
  Just set up a DNS server, you need to open the firewall but do not know how to set up a friend, you can refer to the following, or directly use my script given below.

If the server is a DNS server used for the vast majority of cases, in order to turn on the firewall while normally provide related services, general settings are as follows:

[1] The first step: clear the default firewall rules

iptables -F
iptables -X
iptables -Z
Parameter Description:

-F: Clear all the rules that have been developed

-X: Clear all user-defined chain (it should be said that the tables)

(Extension: table - iptables Linux firewall default, there are three tables, Filter, NAT and Mangle, of course, the custom Filter which is the default form, chain-- chain, such as filter there is INPUT, OUTPUT, FORWARD three chains)

-Z: All the chain counts and cleared traffic statistics

Set reasons:

filter of three chains, the default policies are ACCEPT, apparently for INPUT, this is very dangerous, you can use the command iptables -L -n to view the default settings, or use the iptables-save command (listed in more detail firewall configuration information).

[2] The second step: setting policy

iptables -P INPUT DROP
Set reasons:

DROP to drop, From 1, INPUT DROP strategy formulation is only relatively safe.


[3] The third step: the development of the rules according to the required service


(1) Set the machine as a trusted device

iptables -A INPUT -i lo -j ACCEPT
(2) the development of a remote ssh connection rules

iptables -A (add) INPUT (link) -p (specify the protocol) tcp (specified as the TCP protocol) --dport (specify the destination port number) 22 (specify the destination port number is 22) -j (designated operation) ACCEPT ( specify the action to accept)
(3) develop dns service rules

iptables -A INPUT -p tcp --dport 53 -j ACCEPT
iptables -A INPUT -p udp --dport 53 -j ACCEPT
iptables -A INPUT -p tcp --sport 53 -j ACCEPT
iptables -A INPUT -p udp --sport 53 -j ACCEPT

It allows new dns requests, while allowing to nslookup way to query to the server that is the source port 53 to query dns information.

(4) the development of other rules

iptables -A INPUT -p icmp -j ACCEPT

Can not, but in order to facilitate the detection server network connectivity, they still add.


[4] write firewall profiles

/etc/init.d/iptables save

To save, otherwise the above configuration will be made after the failure to restart the server.

Full implementation of the script is as follows:

#! / Bin / bash
PATH = / sbin: / bin: / usr / sbin: / usr / bin; export PATH
iptables -F
iptables -X
iptables -Z

iptables -P INPUT DROP
iptables -A INPUT -i lo -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -p tcp --dport 53 -j ACCEPT
iptables -A INPUT -p udp --dport 53 -j ACCEPT
iptables -A INPUT -p tcp --sport 53 -j ACCEPT
iptables -A INPUT -p udp --sport 53 -j ACCEPT
iptables -A INPUT -p icmp -j ACCEPT

/etc/init.d/iptables save
Save as .sh file with administrator privileges can execute.

Other commonly used commands:

View firewall configuration summary

iptables -L -n
See detailed firewall configuration

Important note:

    The firewall configuration must be careful, especially when done in the remote configuration, if not carefully defined rules clear, again the default rule is set to INPUT DROP, then there is no way to connect remotely, and with particular attention to this point .
- Several Ceph performance optimization of new methods and ideas (2015 SH Ceph Day after flu reference) (Server)
- Git large file storage will help handle large binary files (Linux)
- Shell script to crawl through AWR SQL Report Problems (Database)
- Hutchison DG standby database CPU consumption reached bottleneck repair (Database)
- Oracle VirtualBox Problem Solving Case (Linux)
- Linux Workstation Security Checklist - from the Linux Foundation Internal (Linux)
- How to monitor Nginx (Database)
- How to enable fbcon in Debian (Linux)
- Installation CD audio file extraction tool Flacon (Linux)
- Linux modify the network interface name (Linux)
- AngularJS - Custom instructions (Programming)
- Linux basis: a comprehensive study pwd command (Linux)
- JavaScript function definition mode (Programming)
- It is time to upgrade your gulp 4.0 (Programming)
- OpenvSwitch 2.1.2 shell script to start and stop (Linux)
- Inxi: Get Linux system and hardware information (Linux)
- RabbitMQ user roles and access control (Linux)
- Tip: Use Cryptsetup U disk encryption (Linux)
- Use Docker / LXC quickly launch a desktop system (Linux)
- Python3 multi-thread download codes (Programming)
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.