Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
efw:settings [2017/11/08 11:09] Bernard Condrauefw:settings [2025/07/30 15:57] (current) – [Phishtank] Bernard Condrau
Line 2: Line 2:
  
 ===== Configuration ===== ===== Configuration =====
- 
   - Run //Network configuration// in Menu **System**. Make sure you assign the correct red interface which is passed to the vm from the physical Server.   - Run //Network configuration// in Menu **System**. Make sure you assign the correct red interface which is passed to the vm from the physical Server.
   - //Edit hosts// in Menu **Network**. Add all hosts with static IPs here.   - //Edit hosts// in Menu **Network**. Add all hosts with static IPs here.
Line 13: Line 12:
  
 ===== SSH Server ===== ===== SSH Server =====
- 
 You need to enable the SSH Server to be able to login remotely without password. You need to enable the SSH Server to be able to login remotely without password.
   - run ssh-keygen on your host   - run ssh-keygen on your host
Line 20: Line 18:
   - in the box' web interface, set __Allow public key based authentication__ only in //SSH access// in Menu **System**   - in the box' web interface, set __Allow public key based authentication__ only in //SSH access// in Menu **System**
  
-===== Firewall (iptables) =====+===== Phishtank ===== 
 +You might want to disable phishtank to avoid false positives, for example on www.google.com 
 +  - Disable //Proxy --> DNS --> Anti-Spyware// in efw settings via web interface, then clear the proxy cache if proxy was enabled in //Proxy --> HTTP --> Cache-Management// 
 +  - Modify the script which downloads the malware definitions from phishtank, add the following before the script code:<code>vim /usr/local/bin/getblackholedns 
 +import sys 
 +sys.exit(0)</code>The script normally gets invoked once a day through an entry in /etc/anacron.daily. Removing that entry does not help, as it is reestablished after a reboot. 
 +  - Delete the malware definitions file, or modify the file to avoid the false positives:<code>rm /var/signatures/dnsmasq/phishtank.csv</code> 
 +  - Remove the content of the conf file for dnsmasq. This file will be overwritten at next reboot, but because of the missing phishtank.csv it will be empty, however, it's necessary for a successful start of dnsmasq:<code>vim /var/signatures/dnsmasq/blackholedns.conf 
 +:d9999d 
 +:wq</code>
  
 +===== Firewall =====
 +==== SSH port forwarding ====
 +  * add hosts to be accessed from within the LAN to //Custom hosts// in menu //Network//
 +  * port forwards from RED to GREEN work for hosts behind a fixed ip address on RED when accessed from LAN
 +  * port forwards from RED to GREEN do not work for hosts behind a ddns ip address on RED when accessed from LAN. Make sure incoming and forward port range is the same to allow access from within the LAN.
 +==== iptables ====
 Check whether the firewall is set and hit on a specific port with:<code>iptables -t nat -L -v -n</code> Check whether the firewall is set and hit on a specific port with:<code>iptables -t nat -L -v -n</code>
  
-==== Interesting articles ==== +===== Links =====
   * [[http://www.endian.com/fileadmin/documentation/efw-admin-guide/en/efw-admin-guide.html|Administrative Guide]]   * [[http://www.endian.com/fileadmin/documentation/efw-admin-guide/en/efw-admin-guide.html|Administrative Guide]]
   * [[http://www.yougetsignal.com/tools/open-ports/|Port Forwarding Tester]]   * [[http://www.yougetsignal.com/tools/open-ports/|Port Forwarding Tester]]