forked from dimikot/vzfirewall
-
Couldn't load subscription status.
- Fork 0
vzfirewall is an extremely simple tool to configure opened ports and hosts for incoming connections in OpenVZ environment
License
Couldn't load subscription status.
CoreTex/vzfirewall
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
vzfirewall: an extremely simple tool to configure opened ports
and hosts for incoming connections in OpenVZ environment
(C) dkLab, http://en.dklab.ru/lib/dklab_vzfirewall/
Vzfirewall tool allows you to open/close ports for incoming connections
with no dependencies to foreign IP addresses. E.g. you may allow a hostname
release.prod.example.com to connect to port 5432 of VE 1234 and leave all
other ports closed by modifying 1234.conf file adding multiline FIREWALL
directive into it - see SYNOPSIS below.
You must then run vzfirewall -a on your hardware node to apply changes
made in *.conf.
Note that it is recommended to use hostnames instead of IP addresses here,
so the configuration is persistent for VE movements to different IP-address:
you just need to run vzfirewall -a again after movement. It is also
reboot-safe, because applied to /etc/sysconfig/iptables (at RHEL systems).
INSTALLATION
------------
cd /usr/sbin
wget http://github.com/DmitryKoterov/vzfirewall/raw/master/vzfirewall
chmod +x vzfirewall
# Optional: vps.premount action script to ensure vzfirewall is run
# (handy when you vzmigrate containers)
cd /etc/vz/conf
(test -f vps.premount && echo "vps.premount exists, manual integration required") || ( \
wget http://github.com/DmitryKoterov/vzfirewall/raw/master/vps.premount; \
chmod +x vps.premount )
SYNOPSIS
--------
1. Modify the file e.g. /etc/vz/conf/4.conf (note that the whole FIREWALL
directive is prefixed by "#" character, because else OpenVZ issues
warnings about multi-line directives which are not supported):
...
#FIREWALL="
# host.allowed.to.every.port
# yet.another.host
# * # means "any host"
#
# [25]
# host.allowed.to.access.smtp
# * # means "any"
#
# [80,443]
# hosts.allowed.to.access.two.ports
#
# [udp:53]
# *
#
# [CUSTOM]
# # You may use "$THIS" macro which is replaced by this machine IP
# # (and, if the machine has many IPs, it will be multiplicated).
# -A INPUT -i eth2 -d $THIS -j ACCEPT
# # Or you may use commands with no references to $THIS (only
# # such commands are allowed for 0.conf file).
# -A INPUT -i eth1 -j ACCEPT
#"
...
We use FIREWALL directive in plain VE configs, not in separate files,
to allow to vzmigrate it easily from one node to another. Note the "#"
characters again.
2. Run:
# vzfirewall -a - to apply rules
# vzfirewall -t - to test rules with no application
# vzfirewall -h -v - vzfirewall documentation
About
vzfirewall is an extremely simple tool to configure opened ports and hosts for incoming connections in OpenVZ environment
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Perl 100.0%