I have to identical installations of plesk 12.5 witch have the same unexpected reproducable firewall behaviour;
Version Plesk v12.5.30_build1205150826.19 os_CentOS 7
OS CentOS Linux 7.1.1503 (Core)
What is going wrong????
My current active Plesk Firewall config is (my priority is to solve problem #2) (for now I don't have full access to 1.2.3.4/29 enabled because that one blocks access to the outside world).
This is how iptables -L looks like with this config;
Version Plesk v12.5.30_build1205150826.19 os_CentOS 7
OS CentOS Linux 7.1.1503 (Core)
- I always add full access to my company IP-address to the firewall rules, so under firewall i add custom rule
- Match incoming
- Action allow
- Ports (leave empty) so any port allowed
- IP adresses or network: 1.2.3.4/29 (i have a subnet of 8 IP-adresses add my office, so I add that)
WWW server Allow incoming from all
is not working anymore, nobody can visit websites anymore exept from within the 1.2.3.4/29 range
As a workaround I now edited default rule to only apply to 1.2.3.4/29 for examle
SSH (secure shell) server Allow incoming from 1.2.3.4/29 - Passive FTP cannot get to work with firewall on.
- In my /etc/proftpd.conf I have this set:
# Use the IANA registered ephemeral port range
PassivePorts 49152 65534 - I have added firewall rule:
PASSIVE FTP Allow incoming from all on port 49152-65534/tcp - I cannot connect using these settings.
- When I change this default rule
System policy for incoming traffic Deny all other incoming traffic
to System policy for incoming traffic Allow all other incoming traffic - I can connect to FTP.
- In my /etc/proftpd.conf I have this set:
What is going wrong????
My current active Plesk Firewall config is (my priority is to solve problem #2) (for now I don't have full access to 1.2.3.4/29 enabled because that one blocks access to the outside world).
Code:
PASSIVE FTP Allow incoming from all on port 49152-65534/tcp
TLS 587 Allow incoming from all on port 587/tcp
ZABBIX Allow incoming from all on port 10050/tcp
Customer & Business Manager payment gateways Allow incoming from all
Single Sign-On Allow incoming from all
Plesk Installer Allow incoming from all
Plesk administrative interface Allow incoming from all
WWW server Allow incoming from all
FTP server Allow incoming from all
SSH (secure shell) server Allow incoming from 1.2.3.4/29
SMTP (submission port) server Allow incoming from all
SMTP (mail sending) server Allow incoming from all
POP3 (mail retrieval) server Allow incoming from all
IMAP (mail retrieval) server Allow incoming from all
Mail password change service Allow incoming from all
MySQL server Allow incoming from 1.2.3.4/29
PostgreSQL server Deny incoming from all
Tomcat administrative interface Deny incoming from all
Samba (file sharing in Windows networks) Deny incoming from all
Plesk VPN Deny incoming from all
Domain name server Allow incoming from all
IPv6 Neighbor Discovery Allow incoming from all
Ping service Allow incoming from all
System policy for incoming traffic Deny all other incoming traffic
System policy for outgoing traffic Allow all other outgoing traffic
System policy for forwarding of traffic Deny forwarding of all other traffic
This is how iptables -L looks like with this config;
Code:
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp -- anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
ACCEPT tcp -- anywhere anywhere tcp dpts:49152:65534
ACCEPT tcp -- anywhere anywhere tcp dpt:submission
ACCEPT tcp -- anywhere anywhere tcp dpt:zabbix-agent
ACCEPT tcp -- anywhere anywhere tcp dpt:12443
ACCEPT tcp -- anywhere anywhere tcp dpt:11443
ACCEPT tcp -- anywhere anywhere tcp dpt:11444
ACCEPT tcp -- anywhere anywhere tcp dpt:8447
ACCEPT tcp -- anywhere anywhere tcp dpt:pcsync-https
ACCEPT tcp -- anywhere anywhere tcp dpt:cddbp-alt
ACCEPT tcp -- anywhere anywhere tcp dpt:http
ACCEPT tcp -- anywhere anywhere tcp dpt:https
ACCEPT tcp -- anywhere anywhere tcp dpt:ftp
ACCEPT tcp -- 1.2.3.4/29 anywhere tcp dpt:ssh
DROP tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:submission
ACCEPT tcp -- anywhere anywhere tcp dpt:smtp
ACCEPT tcp -- anywhere anywhere tcp dpt:urd
ACCEPT tcp -- anywhere anywhere tcp dpt:pop3
ACCEPT tcp -- anywhere anywhere tcp dpt:pop3s
ACCEPT tcp -- anywhere anywhere tcp dpt:imap
ACCEPT tcp -- anywhere anywhere tcp dpt:imaps
ACCEPT tcp -- anywhere anywhere tcp dpt:poppassd
ACCEPT tcp -- 1.2.3.4/29 anywhere tcp dpt:mysql
DROP tcp -- anywhere anywhere tcp dpt:mysql
DROP tcp -- anywhere anywhere tcp dpt:postgres
DROP tcp -- anywhere anywhere tcp dpt:ogs-server
DROP tcp -- anywhere anywhere tcp dpt:glrpc
DROP udp -- anywhere anywhere udp dpt:netbios-ns
DROP udp -- anywhere anywhere udp dpt:netbios-dgm
DROP tcp -- anywhere anywhere tcp dpt:netbios-ssn
DROP tcp -- anywhere anywhere tcp dpt:microsoft-ds
DROP udp -- anywhere anywhere udp dpt:openvpn
ACCEPT udp -- anywhere anywhere udp dpt:domain
ACCEPT tcp -- anywhere anywhere tcp dpt:domain
ACCEPT icmp -- anywhere anywhere icmptype 8 code 0
DROP all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp -- anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
DROP all -- anywhere anywhere
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp -- anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all -- anywhere anywhere state INVALID
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere
Chain FWDI_public (0 references)
target prot opt source destination
FWDI_public_log all -- anywhere anywhere
FWDI_public_deny all -- anywhere anywhere
FWDI_public_allow all -- anywhere anywhere
Chain FWDI_public_allow (1 references)
target prot opt source destination
Chain FWDI_public_deny (1 references)
target prot opt source destination
Chain FWDI_public_log (1 references)
target prot opt source destination
Chain FWDO_public (0 references)
target prot opt source destination
FWDO_public_log all -- anywhere anywhere
FWDO_public_deny all -- anywhere anywhere
FWDO_public_allow all -- anywhere anywhere
Chain FWDO_public_allow (1 references)
target prot opt source destination
Chain FWDO_public_deny (1 references)
target prot opt source destination
Chain FWDO_public_log (1 references)
target prot opt source destination