Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

VCloud Director 5.1 RHEL Firewall Settings

2025-01-27 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

VCloud Director 5.1.1 installation Environment RHEL 6.2

/ etc/sysconfig/iptables content

# Generated by iptables-save v1.4.7 on Tue Mar 26 15:52:56 2013

* filter

: INPUT DROP [0:0]

: FORWARD DROP [0:0]

: OUTPUT DROP [0:0]

: RH-Firewall-1-INPUT-[0:0]

-An INPUT-j RH-Firewall-1-INPUT

-A FORWARD-j RH-Firewall-1-INPUT

-An OUTPUT-j RH-Firewall-1-INPUT

-A RH-Firewall-1-INPUT-I lo-j ACCEPT

-A RH-Firewall-1-INPUT-p icmp--icmp-type any-j ACCEPT

-A RH-Firewall-1-INPUT-p 50-j ACCEPT

-A RH-Firewall-1-INPUT-p 51-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state ESTABLISHED,RELATED-j ACCEPT

# Simple

# Begin listing vCloud Director Ports Needed

# vCloud WebServices & vCenter/ESX Connections

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 443-j ACCEPT

# vCloud Optional

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 80-j ACCEPT

# SSH

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 22-j ACCEPT

# vCloud Remote Console

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 902-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 903-j ACCEPT

# NFS

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 111j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- sport 111j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 111j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- sport 111j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 920-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- sport 920-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 920-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- sport 920-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 2049-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- sport 2049-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 2049-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- sport 2049-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 32803-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 32769-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 892-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 892-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 875-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 875-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 662-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 662-j ACCEPT

# DNS

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 53-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 53-j ACCEPT

# NTP

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 123-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 123-j ACCEPT

# LDAP

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 389-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 389-j ACCEPT

# SMTP

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 25-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 25-j ACCEPT

# Syslog

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 514-j ACCEPT

# vCenter & ESX

#-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 443-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 902-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 903-j ACCEPT

# Default Microsoft SQL Connections

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 1433-j ACCEPT

# Default Oracle Port Connections

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 1521-j ACCEPT

# AMQP Messaging (if Server exists)

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 5672-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m udp-p udp-- dport 5672-j ACCEPT

# ActiveMQ

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 61611-j ACCEPT

-A RH-Firewall-1-INPUT-m state-- state NEW-m tcp-p tcp-- dport 61616-j ACCEPT

# End listing vCloud Director Ports Needed

COMMIT

# Completed on Tue Mar 26 15:52:56 2013

Detailed description of the profile:

# Generated by iptables-save v1.4.7 on Tue Mar 26 15:52:56 2013

# Note description

* filter

# use filter table

: INPUT DROP [0:0]

: FORWARD DROP [0:0]

: OUTPUT DROP [0:0]

: RH-Firewall-1-INPUT-[0:0]

# the above four pieces define built-in INPUT, FORWAARD and ACCEPT chains, and create a new chain called RH-Firewall-1-INPUT

-An INPUT-j RH-Firewall-1-INPUT

# the above rule will be added to the INPUT chain, and all packets destined for the INPUT chain will jump to the RH-Firewall-1 chain.

-A FORWARD-j RH-Firewall-1-INPUT

# the above rule will be added to the FORWARD chain, and all packets destined for the FORWARD chain will jump to the RH-Firewall-1 chain.

-An OUTPUT-j RH-Firewall-1-INPUT

# the above rule will be added to the OUTPUT chain, and all packets destined for the OUTPUT chain will jump to the RH-Firewall-1 chain.

-A RH-Firewall-1-INPUT-I lo-j ACCEPT

# the above rule will be added to the RH-Firewall-1-input chain, it can match all packets, where the incoming interface (- I) is a loop interface (lo), all packets that match this rule will pass (ACCEPT), and no other rules will be used to compare with them.

-A RH-Firewall-1-INPUT-p icmp--icmp-type any-j ACCEPT

# the above rule allows all icmp packets, followed by protocols such as icmp, tcp, udp, and the port is followed by-p-sport source port,-- dport destination port, and-j actions after specifying the destination address of the packet, such as ACCEPT, DROP, QUEUE, etc.

-A RH-Firewall-1-INPUT-m state-- state ESTABLISHED,RELATED-j ACCEPT

The condition #-m state-- state ESTABLISHED,RELATED means that all packages in ESTABLISHED or RELATED state are accepted by policy.

-A RH-Firewall-1-INPUT-m state-- state NEW

#-A RH-Firewall-1-INPUT-m state-- state NEW is the policy when the state of the connection is initial connection (NEW).

For other strategies, see the notes.

Attachment: http://down.51cto.com/data/2362545

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report