-I INPUT -s 122.161.243.52 -j DROP



Hi Tim,

I've added rules for ports 80 and 443 in /etc/sysconfig/iptables-custom, which you can edit via SSH. Once the rule is added then then you can use sudo jem firewall fwstart to reapply the firewall rules.

I also replicated the platform IP address list that allows SSH and 




An update to your support request

Hi Tim,

Please use -I instead of -A. This change is requried due to have the file is actually included in the iptabels-restore process.

For other IP addresses, just duplicate the rule between DROP traffic comment lines:

# The required firewall rules should be defined within this file using the iptables-save utility format..
# NOTE: you are performing this at your own risk, thus please refer to the appropriate documentation and.
# ensure you know exactly what you are doing. Otherwise, this could cause your server's unavailability..
# If you do meet any issues after stating your custom firewall rules, contact your hosting provider's support to get the assistance.
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-I INPUT -p tcp --dport 80 -j ACCEPT
-I INPUT -p tcp --dport 443 -j ACCEPT
 
# DROP traffic begin
-I INPUT -s 122.161.243.52 -j DROP
# DROP traffic end
 
# rule #1 Allow Platform Infrastructure begin
-I INPUT -s 10.113.0.16/32 -p udp -j ACCEPT
-I INPUT -s 10.113.0.16/32 -p tcp -j ACCEPT
-I INPUT -s 10.113.0.38/32 -p udp -j ACCEPT

Please let me know if I can assist you with anything else.

Regards,

Raul Adorean
 Support Manager

Was my reply helpful?
Give feedback to my manager:
AwesomeNeeds improvementPoor

Enscale is a Layershift innovation

Layershift

Access this ticket online