Tuesday, August 3, 2021
Thursday, June 24, 2021
Persist firewal changes iptables redhat 7 across restart ?
Persist iptables redhat 7 ?
https://www.thegeekdiary.com/centos-rhel-how-to-make-iptable-rules-persist-across-reboots/
[IMPORTANT]
https://serverfault.com/questions/708728/iptables-not-starting-upon-reboot
https://www.tecmint.com/linux-firewall-iptables-interview-questions-and-answers/ [IMP]
https://linuxconfig.org/how-to-change-a-runlevel-on-rhel-7-linux-system
Typically the location of iptables configuration lies at ‘/etc/sysconfig/iptables‘ whereas firewalld configuration lies at ‘/etc/firewalld/‘, which is a set of XML files.
EDIT
/etc/firewalld/zones/public.xml
sudo systemctl status firewalld
sudo /sbin/service iptables status
sudo /sbin/service iptables save
sudo less /etc/sysconfig/iptables
sudo iptables -S
sudo iptables -A IN_public_allow -p tcp -m tcp --dport 27017 -m conntrack --ctstate NEW,UNTRACKED -j ACCEPT
-A IN_public_allow -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW,UNTRACKED -j ACCEPT
-A IN_public_allow -p tcp -m tcp --dport 8080 -m conntrack --ctstate NEW,UNTRACKED -j ACCEPT
<service name="ssh"/>
<service name="dhcpv6-client"/>
<port protocol="tcp" port="8080"/>
Friday, June 18, 2021
Add Rules Iptables
https://kerneltalks.com/virtualization/how-to-reset-iptables-to-default-settings
https://upcloud.com/community/tutorials/configure-iptables-centos/
https://forums.centos.org/viewtopic.php?t=68917
IPTABLES
- Tables
- Chains
- Rules
Refresh IPTables to factory Settings - Reset Iptables
https://kerneltalks.com/virtualization/how-to-reset-iptables-to-default-settings
https://upcloud.com/community/tutorials/configure-iptables-centos/
https://forums.centos.org/viewtopic.php?t=68917
IPTABLES
- Tables
- Chains
- Rules
In our last post, we saw iptables basics, where we learned about how iptables works, what are the policies, and how to configure iptables policies.
While working on iptables, if you get confused about policies and you need to start afresh then you need to reset iptables to default settings. By default, I mean to set accept all policy and flush any existing configured rules from settings.
In this article, we will walk through a set of commands to reset iptables to default settings. This can also be treated as how to reset firewall in Linux like ubuntu, centos, Redhat, Debian, etc. It’s a pretty simple 2 steps process.
Step 1 : Set accept all policy to all connections
Using the below set of commands you will set accept rule for all types of connections.
root@kerneltalks # iptables -P INPUT ACCEPT root@kerneltalks # iptables -P OUTPUT ACCEPT root@kerneltalks # iptables -P FORWARD ACCEPT |
This will confirm, iptables gonna accept all requests for all types of connections.
Step 2 : Delete all existing rules.
Using below set of commands, delete your currently configured rules from iptables.
root@kerneltalks # iptables -F INPUT root@kerneltalks # iptables -F OUTPUT root@kerneltalks # iptables -F FORWARD |
Or you can do it in single command –
root@kerneltalks # iptables -F |
That’s it! Your iptables are reset to default settings i.e. accept all! Now, neatly and carefully design your policies and configure them.
Persist IpTables (firewall) Linux Redhat
iptables-services-0:1.4.21-35.el7.x86_64
iptables-1.4.21-33.el7.x86_64
https://kerneltalks.com/virtualization/how-to-reset-iptables-to-default-settings
https://upcloud.com/community/tutorials/configure-iptables-centos/
https://forums.centos.org/viewtopic.php?t=68917
IPTABLES
- Tables
- Chains
- Rules
Once installed, start and enable the service.
sudo systemctl enable iptables
Afterwards, you can simply save the current rules using the following command.
sudo service iptables save
/etc/sysconfig/iptables
ip6tables
ip6tables-config
iptables
iptables-config
network-scripts
Monday, June 14, 2021
IPTABLES, Firewall, Actual Firewall + Security Group - AWS
https://www.tecmint.com/fix-no-route-to-host-ssh-error-in-linux/
https://www.cyberciti.biz/faq/how-to-list-all-iptables-rules-in-linux/
sudo nmap -p 6900,25,22,8080,21000,7856,9084 10.79.197.70
sudo iptables -S
sudo nmap -p 6900,25,22,8080,21000,7856,9084 10.79.197.70
sudo iptables -D IN_public_allow -p tcp -m tcp --dport 7856 -m conntrack --ctstate NEW,UNTRACKED -j ACCEPT
sudo iptables -A IN_public_allow -p tcp -m tcp --dport 7856 -m conntrack --ctstate NEW,UNTRACKED -j ACCEPT
Azure - Pipeline - Add Approver for Stage
https://learn.microsoft.com/en-us/azure/devops/pipelines/process/approvals?view=azure-devops&tabs=check-pass
-
https://www.baeldung.com/spring-properties-file-outside-jar https://docs.spring.io/spring-boot/docs/current/reference/html/spring-boot-featu...
-
https://learn.microsoft.com/en-us/azure/devops/pipelines/process/approvals?view=azure-devops&tabs=check-pass
-
The decision was made to block such external HTTP repositories by default https://stackoverflow.com/questions/66980047/maven-build-failure-d...