FreedomBox/Manual/Firewall 25 2018-03-11 03:12:12 JosephNuthalapati Fix oversized image 24 2017-03-31 20:25:36 Drahtseil Screenshot Firewall 23 2017-01-08 02:18:51 JamesValleroy add minetest 22 2017-01-08 02:17:46 JamesValleroy fix table spacing 21 2017-01-08 02:16:47 JamesValleroy add repro 20 2017-01-08 02:10:57 JamesValleroy add mumble 19 2017-01-08 02:08:58 JamesValleroy add quassel 18 2017-01-08 01:55:02 JamesValleroy reorder to match Plinth Firewall page 17 2017-01-07 21:07:25 JamesValleroy update managed by plinth 16 2017-01-07 20:54:21 JamesValleroy update statuses shown in plinth 15 2017-01-07 20:51:16 JamesValleroy updated services enabled by default 14 2017-01-07 20:49:50 JamesValleroy fix table spacing 13 2017-01-07 20:47:32 JamesValleroy jwchat replaced with jsxc 12 2017-01-07 20:45:27 JamesValleroy remove owncloud from ports list 11 2016-01-13 23:19:49 JamesValleroy port -> service 10 2015-12-15 00:51:46 JamesValleroy few corrections 9 2015-09-16 11:06:29 SunilMohanAdapa Update an oudated link 8 2015-09-16 08:18:17 SunilMohanAdapa Remove unnecessary automatic links 7 2015-09-13 15:06:40 SunilMohanAdapa Modify structure for inclusion into manual 6 2015-09-12 11:19:31 SunilMohanAdapa Move the firewall page to Manual paths 5 2015-09-12 09:37:40 SunilMohanAdapa Move networking related information to Networks page, cleanup 4 2015-02-13 04:53:16 SunilMohanAdapa Include FreedomBox portal in footer 3 2014-05-08 08:02:39 SunilMohanAdapa Add section on internet connection sharing and minor corrections 2 2014-05-08 07:49:29 PaulWise link to the plinth source 1 2014-05-08 07:36:15 SunilMohanAdapa New page documenting firewall operation and default port status
Firewall Firewall is a network security system that controls the incoming and outgoing network traffic. Keeping a firewall enabled and properly configured reduces risk of security threat from the Internet. The operation of the firewall in Plinth web interface of FreedomBox is automatic. When you enable a service it is automatically permitted in the firewall and when you disable a service it is automatically disabled in the firewall. For services which are enabled by default on FreedomBox, firewall ports are also enabled by default during the first run process. Firewall Firewall management in FreedomBox is done using FirewallD.
Interfaces Each interface is needs to be assigned to one (and only one) zone. Whatever rules are in effect for a zone, those rules start to apply for that interface. For example, if HTTP traffic is allowed in a particular zone, then web requests will be accepted on all the addresses configured for all the interfaces assigned to that zone. There are primarily two firewall zones used. The internal zone is meant for services that are provided to all machines on the local network. This may include services such as streaming media and simple file sharing. The external zone is meant for services that are provided publicly on the Internet. This may include services such as blog, website, email web client etc. For details on how network interfaces are configured by default, see the Networks section.
Ports/Services The following table attempts to document the ports, services and their default statuses in FreedomBox. If you find this page outdated, see the Plinth source for lib/freedombox/first-run.d/90_firewall and Firewall status page in Plinth UI. Service Port External Enabled by default Status shown in Plinth Managed by Plinth Minetest 30000/udp {*} {X} (./) (./) XMPP Client 5222/tcp {*} {X} (./) (./) XMPP Server 5269/tcp {*} {X} (./) (./) XMPP Bosh 5280/tcp {*} {X} (./) (./) NTP 123/udp {o} (./) (./) (./) Plinth 443/tcp {*} (./) (./) {X} Quassel 4242/tcp {*} {X} (./) (./) SIP 5060/tcp {*} {X} (./) (./) SIP 5060/udp {*} {X} (./) (./) SIP-TLS 5061/tcp {*} {X} (./) (./) SIP-TLS 5061/udp {*} {X} (./) (./) RTP 1024-65535/udp {*} {X} (./) (./) SSH 22/tcp {*} (./) (./) {X} mDNS 5353/udp {o} (./) (./) (./) Tor (Socks) 9050/tcp {o} {X} (./) (./) Obfsproxy <random>/tcp {*} {X} (./) (./) OpenVPN 1194/udp {*} {X} (./) (./) Mumble 64378/tcp {*} {X} (./) (./) Mumble 64378/udp {*} {X} (./) (./) Privoxy 8118/tcp {o} {X} (./) (./) JSXC 80/tcp {*} {X} {X} {X} JSXC 443/tcp {*} {X} {X} {X} DNS 53/tcp {o} {X} {X} {X} DNS 53/tdp {o} {X} {X} {X} DHCP 67/udp {o} (./) {X} {X} Bootp 67/tcp {o} {X} {X} {X} Bootp 67/udp {o} {X} {X} {X} Bootp 68/tcp {o} {X} {X} {X} Bootp 68/udp {o} {X} {X} {X} LDAP 389/tcp {o} {X} {X} {X} LDAPS 636/tcp {o} {X} {X} {X}
Manual operation See FirewallD documentation for more information on the basic concepts and comprehensive documentation.
Enable/disable firewall To disable firewall or with systemd To re-enable firewall or with systemd
Modifying services/ports You can manually add or remove a service from a zone. To see list of services enabled: --list-services]]> Example: To see list of ports enabled: --list-ports]]> Example: To remove a service from a zone: --remove-service= firewall-cmd --permanent --zone= --remove-service=]]> Example: To remove a port from a zone: / firewall-cmd --permanent --zone=internal --remove-port=/]]> Example: To add a service to a zone: --add-service= firewall-cmd --permanent --zone= --add-service=]]> Example: To add a port to a zone: / firewall-cmd --permanent --zone=internal --add-port=/]]> Example:
Modifying the zone of interfaces You can manually change the assignment of zones of each interfaces after they have been autuomatically assigned by the first boot process. To see current assignment of interfaces to zones: To remove an interface from a zone: --remove-interface= firewall-cmd --permanent --zone= --remove-interface=]]> Example: To add an interface to a zone: --add-interface= firewall-cmd --permanent --zone= --add-interface=]]> Example: Information Support Work Space Reports Promote Overview Hardware Live Help Where To Start Translate Calls Talks Features Vision Q&A Design To Do Metrics Press Download Manual Use cases Code Contributors Releases Blog