Kennisbank
De Helpdesk
>
De Helpdesk
>
Kennisbank
How TO install/Configure APF (Advanced Policy Firewall) Firewall
Oplossing
Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today's Internet deployed servers and the unique needs of custom deployed Linux installations. The configuration of APF is designed to be very informative and present the user with an easy to follow process, from top to bottom of the configuration file. The management of APF on a day-to-day basis is conducted from the command line with the 'apf' command, which includes detailed usage information and all the features one would expect from a current and forward thinking firewall solution.
Login to your server as root, then:
# Download --
http://www.r-fx.ca/downloads/apf-current.tar.gz
# tar -xvzf apf-current.tar.gz
# rm -f apf-current.tar.gz
# cd apf-*
# ./install.sh
Edit conf.apf
# cd /etc/apf
# vi conf.apf
Common ingress (inbound) TCP IG_TCP_CPORTS="20,21,22,25,53,80,110,143,443,465,993,995,2082,2083,2086,2087,2095,2096,3306,10000,35000_35999"
Common ingress (inbound) UDP
IG_UDP_CPORTS="20,21,53,1040"
Exit and save and then restart apf:
# service apf start
If APF is functioning fine, edit the conf.apf
# vi conf.apf
Set the DEVM parameter to DEVEL_MODE="0"
Now you can Restart APF, and is done:
# service apf restart
Configure APF to start at boot
# chkconfig --add apf
# chkconfig --level 345 apf on
----------------------------------------
! apf unable to load iptables module ip_tables
If you are getting this error in your firewall logs at apf -t on your server
unable to load iptables module (ip_tables), aborting
then your kernal is compiled with iptables statically instead of as a module, and you will need to change this in the /etc/apf/conf.apf
MONOKERN=â€0″ Set it to “1″
So open /etc/apf/conf.apf file and modify it restart the apf service and you wont see that error.
--------------------------------------------
Summary of features:
- detailed and well commented configuration file
- granular inbound and outbound network filtering
- user id based outbound network filtering
- application based network filtering
- trust based rule files with an optional advanced syntax
- global trust system where rules can be downloaded from a central management server
- reactive address blocking (RAB), next generation in-line intrusion prevention
- debug mode provided for testing new features and configuration setups
- fast load feature that allows for 1000+ rules to load in under 1 second
- inbound and outbound network interfaces can be independently configured
- global tcp/udp port & icmp type filtering with multiple methods of executing filters (drop, reject, prohibit)
- configurable policies for each ip on the system with convenience variables to import settings
- packet flow rate limiting that prevents abuse on the most widely abused protocol, icmp
- prerouting and postrouting rules for optimal network performance
- dshield.org block list support to ban networks exhibiting suspicious activity
- spamhaus Don't Route Or Peer List support to ban known "hijacked zombie" IP blocks
- any number of additional interfaces may be configured as firewalled (untrusted) or trusted (not firewalled)
- additional firewalled interfaces can have there own unique firewall policies applied
- intelligent route verification to prevent embarrassing configuration errors
- advanced packet sanity checks to make sure traffic coming and going meets the strictest of standards
- filter attacks such as fragmented UDP, port zero floods, stuffed routing, arp poisoning and more
- configurable type of service options to dictate the priority of different types of network traffic
- intelligent default settings to meet every day server setups
- dynamic configuration of your servers local DNS revolvers into the firewall
- optional filtering of common p2p applications
- optional filtering of private & reserved IP address space
- optional implicit blocks of the ident service
- configurable connection tracking settings to scale the firewall to the size of your network
- configurable kernel hooks (ties) to harden the system further to syn-flood attacks & routing abuses
- advanced network control such as explicit congestion notification and overflow control
- special chains that are aware of the state of FTP DATA and SSH connections to prevent client side issues
- control over the rate of logged events, want only 30 filter events a minute? 300 a minute? - you are the boss
- logging subsystem that allows for logging data to user space programs or standard syslog files
- logging that details every rule added and a comprehensive set of error checks to prevent config errors
- if you are familiar with netfilter you can create your own rules in any of the policy files
- pluggable and ready advanced use of QoS algorithms provided by the Linux
- 3rd party add-on projects that compliment APF features
Was dit artikel bruikbaar?
ja
/
nee
Gerelateerde artikelen
(D)DoS Deflate
how to install bfd (Brute Force Detection)
Nagios installeren op Fedora 12
Nagios installeren op CentOS 7
Route add in Linux
Firewall uitschakelen Centos 6
LanTopoLog
DDoS filter
Installatie LSM (Linux Socket Monitor)
Amanda - Creating Successful Backups
Artikel details
Artikel ID:
51
Categorie:
Beveiliging
Zoekwoorden
Datum toegevoegd:
31-Jul-2009 12:37:04
Aantal bekeken:
4495
Beoordeling (Stemmen):
(2903)
«
Ga terug
Ontwerp -
Colanidesign
© 2000/2024. *** Onze helpdesk helpt u graag en gratis met al uw hard en softwareproblemen. *** Hosting door -
Colani