Skip to content

Linux Firewalls

OpenVPN via NetworkManager CLI

1
2
sudo nmcli connection import type openvpn file ${NAME}.ovpn
nmcli connection up $NAME

ipset for fail2ban

SRC

Use jail.local to provide:

1
2
3
[DEFAULT]
banaction = iptables-ipset-proto6
banaction_allports = iptables-ipset-proto6-allports

Setting and Controlling IP sets using iptables

SRC

The ipset utility is used to administer IP sets in the Linux kernel. An IP set is a framework for storing IP addresses, port numbers, IP and MAC address pairs, or IP address and port number pairs. The sets are indexed in such a way that very fast matching can be made against a set even when the sets are very large. IP sets enable simpler and more manageable configurations as well as providing performance advantages when using iptables. The iptables matches and targets referring to sets create references which protect the given sets in the kernel. A set cannot be destroyed while there is a single reference pointing to it. The use of ipset enables iptables commands, such as those below, to be replaced by a set:

1
2
3
~# iptables -A INPUT -s 10.0.0.0/8 -j DROP
~# iptables -A INPUT -s 172.16.0.0/12 -j DROP
~# iptables -A INPUT -s 192.168.0.0/16 -j DROP

The set is created as follows:

1
2
3
4
~# ipset create my-block-set hash:net
~# ipset add my-block-set 10.0.0.0/8
~# ipset add my-block-set 172.16.0.0/12
~# ipset add my-block-set 192.168.0.0/16

The set is then referenced in an iptables command as follows:

1
~# iptables -A INPUT -m set --set my-block-set src -j DROP

If the set is used more than once a saving in configuration time is made. If the set contains many entries a saving in processing time is made.