Ubuntu Iptables: How to Control Network Traffic Using iptables?

“…A user-space Unix utility that gives system administrators the ability to configure IP packet filtering rules implemented by the Kernel’s net filter module.” Iptables act as a firewall using packet filtering rules based on various criteria such as IP address, port, and protocols.

This guide will discuss how to configure and use iptables rules on an Ubuntu system to secure your network. Whether you are a novice Linux user or a seasoned system administrator, from this guide, and in one way or another, you will learn something useful about iptables.

Iptables come pre-installed on Ubuntu and most Debian based distributions. Ubuntu also packages GUFW firewall, a graphical alternative you can use to work with iptables.

NOTE: To use and configure iptables, you will need sudo privileges on your system. You can learn more about sudo from the following tutorial:

https://linuxhint.com/sudo_debian10_buster/

Now that you know what Iptables is, let’s dive right in!

How to Use iptables to Manage IPv4 Traffic?

To use Iptables for IPv4 network and traffic management, you need to understand the following:

The Iptables Command

Iptables offers a selection of options that allow you to customize and tune your iptables rules. Let us discuss some of these parameters and see what they do.

NOTE: You can configure a set of rules that manage a specific subset, known as iptables chains.

Iptables Parameters

Before we begin creating and configuring iptables rules, let us first understand the basics of iptables, such as general syntax and default arguments.

Consider the command below:

sudo iptables -I INPUT -s 192.168.0.24 -j DROP

The command above tells the iptables to create a rule in the chain. The rule drops all the packets from the IP address 192.168.0.24.

Let us examine the command, line by line, to understand it better.

  • The first command iptables calls the iptables command-line utility.
  • Next is -I argument used for insertion. The insertion argument adds a rule at the beginning of the iptables chain and thus gets assigned a higher priority. To add a rule at a specific number in the chain, use the -I argument followed by the number where the rule should get assigned.
  • The -s argument helps specify the source. Hence, we use the -s argument followed by the IP address.
  • The -j parameter with iptables specifies the jump to a specific target. This option sets the action the Iptables shall perform once there’s a matching packet. Iptables offers four main targets by default, these include: ACCEPT, DROP, LOG, and REJECT.

Iptables offers a selection of parameters that you can use to configure various rules. The various parameters you can use to configure iptables rules include:

Iptables rule parameter Description
-s –source Specify the source, which can be an address, hostname, or network name.
-p –protocol Specifies the connection protocol; for example, TCP, UDP, etc.
-d –destination Specifies the destination, which can be an address, network name, or hostname.
-j –jump Sets the action iptables shall carry out after finding a packet.
-o –out-interface Sets the interface through which the iptable sends the packet.
-i –in-interface Sets the interface used to establish network packets.
-c –set-counters Allows the administrator to set the byte and packet counters for a specified rule.
-g –goto chain The parameter specifies that the processing should continue in the user-set chain upon return.
-f –fragment Tells iptables to apply the rule only to the second and following fragments of the fragmented packets.

Iptables Options

The iptables command supports a wide range of options. Some common ones include:

Option Description
-A –append Adds a rule to the end of a specified chain
-D –delete Removes a rule from the specified chain
-F –flush Removes all rules, one at a time
-L –list Shows all the rules in the specified chain
-I –insert Inserts a rule into the specified chain (passed as a number, when there’s no number specified; rule gets added at the top)
-C –check Queries for a rule matching; requirement in a specified rule
-v –verbose Displays more details when used with the -L parameter
-N –new-chain <name> Adds a new user-defined chain
-X –delete-chain <name> Removes a specific user-defined chain

Iptables Tables

The Linux kernel has default tables that house a set of related rules. These default tables have a set of default chains, but users can customize the rules by adding user-defined rules.

NOTE: The default tables will heavily depend on your Kernel configuration and the modules installed.

Here are the default iptables tables:

1: The Filter Tables

The filter table is a default table that contains chains used for network packet filtering. Some of the default chains in this table include:

Chain Description
Input Iptables use this chain for any incoming packets to the system, i.e., packets going to local network sockets.
Output Iptables use the output chain for locally generated packets, i.e., packets going out of the system.
Forward This chain is what the Iptables use for packets routed or forwarded via the system.

2: The NAT Tables

NAT or Network Address Table is a routing device used to modify the source and target IP-addresses in a network packet. The NAT table’s main use is connecting two networks in a private address range with the public network.

NAT was developed to support masking real IP addresses, allowing private IP address ranges from reaching the outside network. This helps protect details about internal networks from being revealed in public networks.

The NAT table gets employed when a packet initiates a new connection.

Iptables have a default table for NAT addressing. This table has three main chains:

Chain Description
PREROUTING Allows the modification of packet information before arriving in the INPUT chain—used for incoming packets
OUTPUT Reserved for packets created locally, i.e., before network routing occurs
POSTROUTING Allows the modification of outgoing packets— Packets leaving the OUTPUT chain

The diagram below shows a high-level overview of this process.

Use the command below to view your NAT Routing tables.

iptables -t nat -n -v -L

3: The Mangle Tables

The mangle table is mainly used for special modification of packets. In simple terms, it is used to modify the IP headers of a network packet. Modification of packets can include changing a TTL value of packet, changing valid network hops for a packet, etc.

The table contains the following default chains:

Chain Description
PREROUTING Reserved for incoming packets
POSTROUTING Used for outbound packets
INPUT Used for packets coming directly into the server
OUTPUT Used for local packets
Forward Reserved for packets routed through the system

4: The Raw Tables

The raw table’s main purpose is to configure exceptions for packets not intended to be handled by the tracking system. The raw table sets a NOTRACK mark on packets, prompting the conntrack feature to ignore the packet.

Conntrack is a Linux kernel networking feature that allows the Linux kernel to track all network connections, enabling the kernel to identify packets making up a network flow.

The raw table has two main chains:

Chain Description
PREROUTING Reserved for packets received by network interfaces
OUTPUT Reserved for packets initiated by local processes

5: The Security Table

This table’s primary use is setting internal Security Enhancement for Linux (SELinux) security mechanism that marks on packets. The security mark can get applied per connection or packet.

It is used for Mandatory Access Control rules and is the second table accessed after the filter table. It offers the following default chains:

Chain Description
INPUT Reserved for incoming packets to the system
OUTPUT Used for locally created packets
FORWARD Used for packets routed through the system

Having looked at the default Iptables, let’s go a step further and discuss how to work with iptables rules.

How to Work with iptables Rules?

Iptables rules get applied in ascending order. This means that the first rule in a specific set is applied first, followed by the second, then third, and so on, until the last.

Because of this function, iptables prevent you from adding rules in a set using the -A parameter; you must use the -I, followed by the number or by emptying it to add to the top of the list.

Displaying Iptables

To view your iptables, use the command iptables -L -v for IPv4 and ip6tables -L -v for IPv6.

Inserting Rules

To insert rules in a set, you must position them in the exact order, respecting the rules used by the same chain. You can view the list of your iptables rules with the command as discussed above:

sudo iptables -L -v

For example, to insert a rule allowing incoming connections to port 9001 over TCP, we need to specify the rule number to the INPUT chain adhering to traffic rules for the web.

sudo iptables -I INPUT 1 -p TCP --dport 9001 -m state --state NEW -j ACCEPT

Once you view the current iptables, you should see the new rule in the set.

sudo iptables -L -v

Replacing Rules

The replace functionality works similarly to insert, however, it uses iptables -R command. For example, to modify the rule above and set port 9001 to deny, we:

sudo iptables -R INPUT 1 -p TCP --dport 9001 -m state --state NEW -j REJECT

Deleting a Rule

To delete a rule, we pass the rule number. For example, to delete the rule above, we can specify as:

sudo iptables -D INPUT 1

In most Linux distros, iptables are empty for either IPv4 and IPv6. Hence, if you have not added any new rule, you will get an output similar to the one shown below. That is risky because it means the system is allowing all incoming, outgoing, and routed traffic.

Let’s tuck into how to configure iptables:

How to Configure iptables?

There are numerous ways to configure iptables rules. This section uses examples to show you how to set rules using IP addresses and ports.

Blocking and Allowing Traffic by Ports

You can use a specific port to block or allow all traffic on a network interface. Consider the following examples:

sudo iptables -A INPUT -j ACCEPT -p TCP --destination-port 1001 -i wlan0

The above commands allow traffic on port 1001 TCP on the wlan0 interface.

sudo iptables -A INPUT -j DROP -p TCP --destination-port 1001 -i wlan0

This command does the opposite of the above command as it blocks all the traffic on port 1001 on wlan0.

Here’s a close inspection of the command:

  • The first argument (-A) adds a new rule at the end of the table chain.
  • The INPUT argument adds the specified rule to the table.
  • DROP argument sets the action to be performed as ACCEPT and DROP, respectively. This means that once a packet gets matched, it gets dropped.
  • -p specifies the protocol like TCP and allows traffic on other protocols to pass.
  • –destination-port sets the rule to accept or drop all traffic destined for port 1001.
  • -i <interface name> tells iptables to apply the rule to traffic coming on the wlan0 interface.

NOTE: Iptables do not understand network interface aliases. Thus, in a system with more than one Virtual interface, you will need to define the destination address manually and explicitly.

For example:

sudo iptables -A INPUT -j DROP -p TCP --destination-port 1001 -i wlan0 -d 192.168.0.24

Whitelisting & Blacklisting IP addresses

You can create firewall rules using iptables. One example is by stopping all traffic and allowing network traffic from explicit IP addresses only.

Example:

iptables -A INPUT -m state --state ESTABLISHED, RELATED -j ACCEPT
iptables -A INPUT -i lo -m comment --comment "Allow loopback connections" -j ACCEPT
iptables -A INPUT -p icmp -m comment --comment “Allow Ping to work as expected” -j

ACCEPT

iptables -A INPUT -s 192.168.0.1/24 -j ACCEPT
iptables -A INPUT -s 192.168.0.0 -j ACCEPT
iptables -P INPUT DROP
iptables -P FORWARD DROP

The first line sets a rule to allow all source IP addresses in the 192.168.0.1/24 subnet. You can also use CIDR or individual IP addresses. In the following command, we set the rule to allow all traffic connected to existing connections. In the final commands, we set a policy for INPUT and FORWARD to drop all.

Using iptables on IPv6

Iptables command only works on IPv4. To use iptables on IPv6, you have to use the ip6tables command. Ip6tables uses raw, filter, security, and mangle tables. The general syntax for ip6tables is similar to iptables, and it also supports matching iptables options such as append, delete, etc.

Consider using the ip6tables manual pages for more information.

Example of iptables Rulesets For Network Security

Creating suitable firewall rules will mainly depend on the service running on a system and the ports in use. However, here are some basic network configuration rules you can use to secure your system:

1: Allow Loopback interface traffic and reject all loopback coming from other interfaces

iptables -A INPUT -i lo -j ACCEPT (You can also use ip6tables)
iptables -A INPUT ! -i lo -s 127.0.0.0 -j REJECT (ip6tables also applicable)

2: Deny all ping requests

iptables -A INPUT -p icmp -m state --state NEW --icmp-type 8 -j REJECT

3: Allow SSH connections

iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j ACCEPT

These are example commands you can use to secure your system. However, the configuration will heavily depend on what or who you want to access various services.

CAUTION: If you prefer to disable IPv6 completely, ensure to uncomment the line as this will slow down the update process:

precedence ::ffff:0:0/96 100 found in /etc/gai.conf .

That’s because the APT package manager resolves the mirror domain in IPv6 due to apt-get update.

How to Deploy iptables Rules?

To deploy your iptables on Ubuntu or other Debian-based systems, start by creating two files, ip4 and ip6, for their respective IP addresses.

In either file, add the rules you wish to enforce in their corresponding files—IPv4 rules to ip4 file and IPv6 rules to ip6 file.

Next, we need to import the rules using the command:

sudo iptables-restore < /tmp/ip4 (replace filename for IPv6)

Then, you can verify if the rules have applied using the command:

sudo iptables -L -v

A Quick iptables-persistent Guide

Ubuntu, and common Debian-based distributions, comes with an iptables-persistent package that allows you to apply your firewall rules easily upon reboot. The package provides files you can use to set rules for IPv4 or IPv6 and can be applied automatically upon boot.

You can also use firewall rules using UFW or GUFW. Consider the following tutorial to learn how to use UFW.

https://linuxhint.com/debian_firewalls_ufw/

How to Install iptables-persistent?

Ensure you have iptables-persistent installed on your system. Use dpkg to check if you have the package installed.

If not, use the following command:

sudo apt-get install iptables-persistent

You will get prompted twice to save both your current IPv4 and IPv6 rules. Click on Yes to save both rules.

Click on yes to save IPv6.

Once the installation is complete, verify that you have the iptables subdirectory, as shown in the image below.

Now you can use the rules.v4 and rules.v6 to add iptables rules, and they will get applied automatically by iptables-persistent. The files are simple text files that you can easily edit using any text editor of your choice.

Conclusion

In this tutorial, we have covered the basics of iptables. Starting with working with iptables, basic commands, default iptables tables, and parameters.

From what you’ve learned, you should be in a position to use iptables to create firewall rules that help secure your system.



from Linux Hint https://ift.tt/37RXHcx

Post a Comment

0 Comments