-
Notifications
You must be signed in to change notification settings - Fork 521
Firewall
The default firewall configuration tool for Ubuntu is ufw. By default UFW is enabled on Security Onion.
sudo ufw enable
sudo ufw disable
example: allow port 9876 for Xplico
sudo ufw allow 9876/tcp
example: allow irc port range 6667 - 7000
sudo ufw allow 6667:7000
example: deny https
sudo ufw deny 443
example
sudo ufw status
example output
Status: active
To Action From
-- ------ ----
22/tcp ALLOW Anywhere
7734/tcp ALLOW Anywhere
7736/tcp ALLOW Anywhere
443/tcp ALLOW Anywhere
As of securityonion-setup - 20120912-0ubuntu0securityonion201, Setup now defaults to only allowing port 22 (ssh). There is a note at the end of Setup that tells you this and lets you know that you if need to allow connections on other ports, you can run the new so-allow utility. When you run Setup on a sensor-only installation, it will ssh to the master server and add new firewall rules to the master server to allow the sensor to connect on ports 22,4505,4506,7736. If you need to open ports for OSSEC agents, syslog devices, or analyst VMs, a new script has been added called so-allow that will walk you through this process.
If you're still running a version of Setup older than securityonion-setup - 20120912-0ubuntu0securityonion201, then you can reference the original firewall documentation.
For more info you can visit the UFW documentation site
Note: Gufw is a GUI front end for the ufw.
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs