25 lines
1 KiB
Text
25 lines
1 KiB
Text
# Firewall configuration, manually edited AGAINST ALL REASON
|
|
*filter
|
|
:INPUT ACCEPT [0:0]
|
|
:FORWARD ACCEPT [0:0]
|
|
:OUTPUT ACCEPT [0:0]
|
|
:RH-Firewall-1-INPUT - [0:0]
|
|
-A INPUT -j RH-Firewall-1-INPUT
|
|
-A FORWARD -j RH-Firewall-1-INPUT
|
|
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
|
|
-A RH-Firewall-1-INPUT -p icmp --icmp-type any -j ACCEPT
|
|
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
|
#SSH
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
|
|
#HTTP
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 80 -j ACCEPT
|
|
#HTTPS
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 443 -j ACCEPT
|
|
#Resque-Web
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 7894 -j ACCEPT
|
|
#Websocket
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 8080 -j ACCEPT
|
|
#Crossdomain policy file for Flash sockets
|
|
-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 843 -j ACCEPT
|
|
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
|
|
COMMIT
|