mirror of
https://github.com/stefanpejcic/openpanel
synced 2025-06-26 18:28:26 +00:00
Update firewall.md
This commit is contained in:
parent
a96fc743d4
commit
68dc83980c
@ -4,16 +4,11 @@ sidebar_position: 2
|
||||
|
||||
# Firewall
|
||||
|
||||
View and edit firewall rules.
|
||||
|
||||
OpenPanel supports both ConfigServer Firewall (CSF) and Uncomplicated Firewall (UFW). By default, CSF is installed, but you can choose to install UFW instead by [using the `--ufw` option during installation](/install).
|
||||
|
||||
Based on the installed firewall, the **OpenAdmin > Firewall** page will display either the ConfigServer Firewall UI or the custom UFW interface.
|
||||
|
||||
OpenPanel supports ConfigServer Security and Firewall (CSF).
|
||||
|
||||
## CSF
|
||||
|
||||
If ConfigServer Security & Firewall (CSF) is installed, it's integrated UI will be displayed on **OpenAdmin > Firewall**.
|
||||
Firewall (CSF) UI is displayed on **OpenAdmin > Firewall**.
|
||||
|
||||
For instructions on how to use the CSF UI, please refer to [ConfigServer Security & Firewall official documentation](https://download.configserver.com/csf/readme.txt).
|
||||
|
||||
@ -21,142 +16,6 @@ For instructions on how to use the CSF UI, please refer to [ConfigServer Securit
|
||||
|
||||
If you need to re-open all necessary ports for OpenPanel services and users, run the command: `opencli firewall-reset`.
|
||||
|
||||
## UFW
|
||||
|
||||
If Uncomplicated Firewall (UFW) is installed, our custom interface will be displayed on **OpenAdmin > Firewall**.
|
||||
|
||||

|
||||
|
||||
The firewall settings page provides multiple tabs:
|
||||
|
||||
- IPv4 - View and manage IPv4 firewall rules
|
||||
- IPv6 - View and manage IPv6 firewall rules
|
||||
- Settings - Manage UFW settings
|
||||
- Blacklists - Enable/disable blacklists
|
||||
- Logs - view the UFW service log
|
||||
|
||||
### View rules
|
||||
|
||||
The table shows firewall rules, showcasing information such as rule ID, action, ports, source/destination IP, and the username of the user utilizing the port.
|
||||
For IPv6 rules, navigate to the IPv6 tab.
|
||||
|
||||

|
||||
|
||||
### Add Rules
|
||||
|
||||
To create a new rule click on the 'Add Rule' button and in the modal choose 'ALLOW' to allow the IP address or port, and 'DENY' to block access for IP address or port.
|
||||
|
||||

|
||||
|
||||
### Delete Rules
|
||||
|
||||
To delete a rule click on the 'Delete' link next to it, and in the confirmation modal click on 'Delete' button.
|
||||
|
||||

|
||||
|
||||
### Settings
|
||||
|
||||
This tab displays the current UFW settings and allows you to configure them.
|
||||
|
||||
It shows the current service status and provides options to enable or disable the firewall.
|
||||
|
||||

|
||||
|
||||
The following settings are available:
|
||||
|
||||
- **Enable IPV6** - Set to yes to apply rules to support IPv6 (no means only IPv6 on loopback accepted). You will need to 'disable' and then 'enable' the firewall for the changes to take affect.
|
||||
- **Default Input Policy** - Set the default input policy to ACCEPT, DROP, or REJECT. Please note that if you change this you will most likely want to adjust your rules.
|
||||
- **Default Output Policy** - Set the default input policy to ACCEPT, DROP, or REJECT. Please note that if you change this you will most likely want to adjust your rules.
|
||||
- **Allow ping (IPMI)** - By default, UFW allows ping requests. You can leave (icmp) ping requests enabled to diagnose networking problems.
|
||||
|
||||
The following tools are available:
|
||||
|
||||
- **Export IPv4 rules** - click to download all existing IPv4 rules form the UFW service.
|
||||
- **Export IPv6 rules** - click to download all existing IPv6 rules form the UFW service.
|
||||
- **Restrict access to Cloudflare only** - block access to this server for traffic not coming from [Cloudflare IP addresses](https://www.cloudflare.com/ips/). This will prevent direct access to the server IP and only allow traffic from Cloudflare network. This is useful when your domains are configured to use the Cloudflare proxy, and you want to block direct access that bypasses Cloudflare's protection. **NOTE: This setting affects all users and their services.**
|
||||
- **Reset ports for all users** - delete all existing UFW rules and open ports required by OpenPanel, plus custom ports for users.
|
||||
|
||||
|
||||
### Blacklists
|
||||
|
||||
Unless the [`--skip-blacklists` flag](/install) is provided during the installation of OpenPanel, ipset-blacklists are automatically installed when the [`--ufw` flag](/install) is used.
|
||||
|
||||
From the **OpenAdmin > Security > Firewall > Blacklists** page, administrators can easily add blacklists to block IP addresses from known malicious sources.
|
||||
|
||||
This feature utilizes the [ipset-blacklist](https://github.com/stefanpejcic/ipset-blacklist) service to automate the process of fetching and blocking IPs, providing a straightforward and effective method to enhance system security without manual intervention.
|
||||
|
||||

|
||||
|
||||
Default blacklists:
|
||||
|
||||
| Blacklist | URL |
|
||||
|-----------------|----------------------------------------------------------------------|
|
||||
| AbuseIPDB (DISABLED) | [https://api.abuseipdb.com/api/v2/blacklist](https://api.abuseipdb.com/api/v2/blacklist) |
|
||||
| OpenPanel | [https://api.openpanel.co/blocklist.txt](https://api.openpanel.co/blocklist.txt) |
|
||||
| Spamhaus DROP | [https://www.spamhaus.org/drop/drop.lasso](https://www.spamhaus.org/drop/drop.lasso) |
|
||||
| Spamhaus DROP | [https://www.spamhaus.org/drop/edrop.lasso](https://www.spamhaus.org/drop/edrop.lasso) |
|
||||
| DShield | [https://www.dshield.org/feeds/suspiciousdomains_Low.txt](https://www.dshield.org/feeds/suspiciousdomains_Low.txt) |
|
||||
| FireHOL level1 | [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset](https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level1.netset) |
|
||||
| FireHOL level2 | [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level2.netset](https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level2.netset) |
|
||||
| FireHOL level3 | [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level3.netset](https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level3.netset) |
|
||||
| FireHOL level4 | [https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level4.netset](https://raw.githubusercontent.com/firehol/blocklist-ipsets/master/firehol_level4.netset) |
|
||||
| Binary Defense | [https://www.binarydefense.com/banlist.txt](https://www.binarydefense.com/banlist.txt) |
|
||||
| blocklist.de | [https://lists.blocklist.de/lists/all.txt](https://lists.blocklist.de/lists/all.txt) |
|
||||
|
||||
|
||||
<Tabs>
|
||||
<TabItem value="openadmin-ufw-rbl" label="With OpenAdmin" default>
|
||||
|
||||
To enable or disable a blacklist in the OpenAdmin interface, click the 'Actions' button for the desired list, then select 'Enable' or 'Disable'.
|
||||
|
||||
To delete a blacklist from the OpenAdmin interface, click the 'Actions' button for the desired list, then select 'Delete'.
|
||||
|
||||
</TabItem>
|
||||
<TabItem value="CLI-yfw-rbl" label="With OpenCLI">
|
||||
|
||||
To manage blacklists from the terminal:
|
||||
|
||||
Download new IP addresses for all enabled blocklists:
|
||||
```bash
|
||||
opencli blacklist --fetch
|
||||
```
|
||||
|
||||
Update all ipsets rules and reload UFW service:
|
||||
```bash
|
||||
opencli blacklist --update_ufw
|
||||
```
|
||||
|
||||
Add a new blacklist:
|
||||
```bash
|
||||
opencli blacklist --add-blacklist name=<name> url=<url>
|
||||
```
|
||||
|
||||
Enable a blacklist:
|
||||
```bash
|
||||
opencli blacklist --enable-blacklist=<name>
|
||||
```
|
||||
|
||||
Disable a blacklist:
|
||||
```bash
|
||||
opencli blacklist --disable-blacklist=<name>
|
||||
```
|
||||
|
||||
Delete a blacklist:
|
||||
```bash
|
||||
opencli blacklist --delete-blacklist=<name>
|
||||
```
|
||||
|
||||
</TabItem>
|
||||
</Tabs>
|
||||
|
||||
|
||||
|
||||
### View logs
|
||||
|
||||
For logs, navigate to the 'Logs' tab.
|
||||
|
||||

|
||||
|
||||
|
||||
## External Firewall
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user