Plesk Onyx - Version 17.5.3 Update #38
Ubuntu 16.04.3 LTS
usually I change on the Plesk firewall the "System policy for outgoing traffic - Allow all other outgoing traffic" from allow -> deny and allow only defined outgoing ports.
But on a new Ubuntu System as soon as I change the outgoing policy from "allow -> deny" and activate then the firewall in plesk, Services like ping, ftp from external stops and also access to websites (http & https) from external via ipv6. Ping, ftp and website access over ipv4 from external still works as expected. It seems ip6table blocks everything then from external.
the difference between allow / deny of the outgoing policy is only in the last line
ACCEPT all anywhere anywhere (ping and access from external works)
DROP all anywhere anywhere (ping and access from external not working)
the complete output of the not working ip6tables -L
any hint would be appreciated, or where to start to dig into the issue
Ubuntu 16.04.3 LTS
usually I change on the Plesk firewall the "System policy for outgoing traffic - Allow all other outgoing traffic" from allow -> deny and allow only defined outgoing ports.
But on a new Ubuntu System as soon as I change the outgoing policy from "allow -> deny" and activate then the firewall in plesk, Services like ping, ftp from external stops and also access to websites (http & https) from external via ipv6. Ping, ftp and website access over ipv4 from external still works as expected. It seems ip6table blocks everything then from external.
the difference between allow / deny of the outgoing policy is only in the last line
ACCEPT all anywhere anywhere (ping and access from external works)
DROP all anywhere anywhere (ping and access from external not working)
the complete output of the not working ip6tables -L
Code:
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all anywhere anywhere state INVALID
ACCEPT all anywhere anywhere
ACCEPT tcp anywhere anywhere tcp dpt:ftps
DROP tcp anywhere anywhere tcp dpt:12443
DROP tcp anywhere anywhere tcp dpt:11443
DROP tcp anywhere anywhere tcp dpt:11444
ACCEPT tcp anywhere anywhere tcp dpt:8447
ACCEPT tcp anywhere anywhere tcp dpt:8443
ACCEPT tcp anywhere anywhere tcp dpt:8880
ACCEPT tcp anywhere anywhere tcp dpt:http
ACCEPT tcp anywhere anywhere tcp dpt:https
ACCEPT tcp anywhere anywhere tcp dpt:ftp
ACCEPT tcp anywhere anywhere tcp dpt:ssh
ACCEPT tcp anywhere anywhere tcp dpt:submission
ACCEPT tcp anywhere anywhere tcp dpt:smtp
ACCEPT tcp anywhere anywhere tcp dpt:urd
ACCEPT tcp anywhere anywhere tcp dpt:pop3
ACCEPT tcp anywhere anywhere tcp dpt:pop3s
ACCEPT tcp anywhere anywhere tcp dpt:imap2
ACCEPT tcp anywhere anywhere tcp dpt:imaps
ACCEPT tcp anywhere anywhere tcp dpt:poppassd
DROP tcp anywhere anywhere tcp dpt:mysql
DROP tcp anywhere anywhere tcp dpt:postgresql
DROP tcp anywhere anywhere tcp dpt:9008
DROP tcp anywhere anywhere tcp dpt:9080
DROP udp anywhere anywhere udp dpt:netbios-ns
DROP udp anywhere anywhere udp dpt:netbios-dgm
DROP tcp anywhere anywhere tcp dpt:netbios-ssn
DROP tcp anywhere anywhere tcp dpt:microsoft-ds
DROP udp anywhere anywhere udp dpt:eek:penvpn
ACCEPT udp anywhere anywhere udp dpt:domain
ACCEPT tcp anywhere anywhere tcp dpt:domain
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 134 code 0
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 135 code 0
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 136 code 0
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 137 code 0
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 128 code 0
ACCEPT ipv6-icmp anywhere anywhere ipv6-icmptype 129 code 0
DROP all anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all anywhere anywhere state INVALID
ACCEPT all anywhere anywhere
DROP all anywhere anywhere
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT all anywhere anywhere state RELATED,ESTABLISHED
REJECT tcp anywhere anywhere tcp flags:!FIN,SYN,RST,ACK/SYN state NEW reject-with tcp-reset
DROP all anywhere anywhere state INVALID
ACCEPT all anywhere anywhere
ACCEPT tcp anywhere anywhere tcp dpts:ftp-data:ssh
ACCEPT tcp anywhere anywhere tcp dpt:smtp
ACCEPT tcp anywhere anywhere tcp dpt:whois
ACCEPT tcp anywhere anywhere tcp dpt:domain
ACCEPT udp anywhere anywhere udp dpt:domain
ACCEPT udp anywhere anywhere udp dpt:bootps
ACCEPT tcp anywhere anywhere tcp dpt:http
ACCEPT udp anywhere anywhere udp dpt:ntp
ACCEPT tcp anywhere anywhere tcp dpt:https
ACCEPT tcp anywhere anywhere tcp dpt:urd
DROP all anywhere anywhere
any hint would be appreciated, or where to start to dig into the issue
Last edited: