In this post we will learn about how to save iptables permanently on Ubuntu. We will use the package called iptables-persistent.
Step 1 – Update repositories.
root@mail:/# apt-get update
root@mail:/# apt-get upgrade
Configuration Iptables
Step 2 – Install iptables-persistentroot@mail:/# apt-get install iptables-persistent
Step 3 – The below given screen is for selecting IPv4.auto enp0s25 #iface enp0s25 inet dhcp iface enp0s25 inet static address 192.168.0.1 netmask 255.255.255.0 broadcast 192.168.0.255 gateway 192.168.0.254 dns-nameservers 8.8.8.8 8.8.4.4
Step 6 – Add iptables rules permanent – open network config file nano /etc/network/interfaces add the following line of the end. This is for ip version 4 if you want you can add ip version 6pre-up iptables-restore < /etc/iptables/rules.v4
Step 7 – If you want to block ip address, you can execute the following command.root@mail:/# iptables -I INPUT 1 -s 192.168.1.111/32 -j DROP
Step 8 – If you want to block ip address range, you can execute the following command.root@mail:/# iptables -I INPUT 1 -s 192.168.0.0/16 -j DROP
Step 9 – If you want to block ip address range but you want to allow access of one ip address from this range, you can execute the following commands.root@mail:/# iptables -I INPUT 1 -s 192.168.1.15/32 -j ACCEPT
root@mail:/# iptables -I INPUT 2 -s 192.168.0.0/16 -j DROP
Step 10 – Save iptablesroot@mail:/# iptables-save > /etc/iptables/rules.v4
Step 11 – Show iptablesroot@mail:/# iptables -L -n –line-numbers Chain INPUT (policy ACCEPT) target prot opt source destination 1 ACCEPT all — 192.168.1.15 0.0.0.0/0 2 DROP all — 192.168.0.0/16 0.0.0.0/0 3 DROP all — 192.168.0.0/16 0.0.0.0/0 4 DROP all — 192.168.1.111 0.0.0.0/0
Step 12 – Delete ip address from iptables. You must see number of ip address. For example I will remove 192.168.1.111root@mail:/# iptables -D INPUT 4
Step 13 – Save iptables agein.root@mail:/# iptables-save > /etc/iptables/rules.v4
Basic Configuration Fail2ban
Step 14 – Install Fail2banfail2ban.root@mail:/# apt-get install fail2ban
Step 15 – Backup config fileroot@mail:/# cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.conf.backup
Step 16 – Open config file.root@mail:/# nano /etc/fail2ban/jail.conf
Step 17 – Config DEFAULT section. 1 – ignoreip:, by default only 127.0.0.1 is whitelisted. You should also add your Local IP addresses into the ignoreip 2 – bantime: – the ban time (in seconds). You can use a negative number for permanent ban. 3 – maxretry – the number of failures before an IP get banned. 4 – destemail – the email to which the alerts will be sent. You should put your email address. Write ‘-1? for permanently bannedignoreip = 127.0.0.1/8 192.168.0.0/24 bantime = -1 maxretry = 3 destemail = mslavov@linux-sys-adm.com
Step 18 – Search SSH section and configure it. Your configuration must look like this below. If you want to disable, you must change true to false. In order to permanently ban ip address you have to add the bantime line. If you want to restore ip addresses after restart, you have to add the action line. Action rule ‘iptables-allports’ definition will be shown later in the tutorial.[sshd]
#port = ssh #logpath = %(sshd_log)s enabled = true port = ssh filter = sshd action = iptables-allports[name=ssh] logpath = /var/log/auth.log maxretry = 2 bantime = -1
Step 19 – Search vsFTPd section and configure. Your configuration must look like this.#port = ssh #logpath = %(sshd_log)s enabled = true port = ssh filter = sshd action = iptables-allports[name=ssh] logpath = /var/log/auth.log maxretry = 2 bantime = -1
[vsftpd] #port = ftp,ftp-data,ftps,ftps-data #logpath = %(vsftpd_log)s enabled = true logpath = /var/log/vsftpd.log port = ftp,ftp-data,ftps,ftps-data filter = vsftpd action = iptables-allports[name=vsftpd] maxretry = 3 bantime = -1
Step 20 – Restart fail2ban.root@mail:/# /etc/init.d/fail2ban restart
Advanced Configuration Fail2ban
Step 21 – Add banned ip address after restart. If you don’t do this after restart, you will lose banned ip address. Backup this config file /etc/fail2ban/action.d/iptables-allports.conf.root@mail:/# cp /etc/fail2ban/action.d/iptables-allports.conf /etc/fail2ban/action.d/iptables-allports.conf.backup
Step 22 – Open config file with nano /etc/fail2ban/action.d/iptables-allports.conf and change the script with my script. You can download the script iptables-allports.conf root@mail:/# nano /etc/fail2ban/action.d/iptables-allports.conf
Step 23 – Create a file in which you will save the banned ip address. root@mail:/# touch /etc/fail2ban/ip.blacklist
Step 24 – Show active fail2ban rules with fail2ban-client statusStep 27 – Show iptables and see number of ip address which you want to remove.
root@mail:/# iptables -L -n -–line-numbers
Step 28 – Remove ip address which you want. Firstroot@mail:/# iptables -D fail2ban-ssh 2
“2” is numbber of banned ip address into iptables Second – You have to open this file /etc/fail2ban/ip.blacklist and remove the ip address which you want to remove. Third – remove from rule. Below ara commands which you have to use for different chains.root@mail:/# fail2ban-client set sshd unbanip 192.168.0.159 root@mail:/# fail2ban-client set vsftpd unbanip 192.168.0.159
If you don’t do this, the ip address will be banned again after restart.
Step 29 – Check fail2ban status.
Comments
Post a Comment