A better way to ask my initial question is:
What is the best way to block all incoming traffic, even to open ports, while allowing traffic from a limited range of addresses access to a single port?

For example, say that I have port 22 open for ssh access.  With the default rule, if 92.63.194.18 tries to access any port other than 22 he will be dropped.  However, he can still connect to port 22.  By using dynamic blacklisting (for example, shorewall logdrop 92.0.0.0/8), he will be silently dropped even when he tries to connect to port 22.  There are only four blocks of IP addresses I need to allow, but they end up being a lot of logdrop entries. For example, to allow my first group of 70.56.0.0/14 I need six separate logdrop commands just to block all of the addresses before that range (0.0.0.0 - 70.55.255.255).  I need eight more commands to block from the end of the first group to the start of the second group.

On 2/5/2019 4:46 PM, Tom Eastep wrote:
On 2/5/19 1:29 PM, Brent Gordon wrote:
What is the best way to block most, but not all, incoming traffic?
There are four blocks of addresses I want to allow through for remote
administration.  Other than traffic from those four blocks I want to
drop all other traffic.

I am running Shorewall version 5.0.4 on a Ubuntu 16.04.5 LTS system.

All of the sample configurations
(http://www.shorewall.org/GettingStarted.html) block all traffic from
the external (net) zone by default. So, if you start with one of those,
you simply have to add entries in /etc/shorewall/rules for the incoming
connections that you want to allow.

-Tom




_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to