Advertisement
Guest User

Untitled

a guest
Jun 28th, 2017
74
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.91 KB | None | 0 0
  1. Chain INPUT (policy DROP)
  2. target prot opt source destination
  3. ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0
  4. ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0
  5. ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0
  6. ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0
  7. ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0
  8. ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0
  9.  
  10. Chain FORWARD (policy DROP)
  11. target prot opt source destination
  12. ufw-before-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
  13. ufw-before-forward all -- 0.0.0.0/0 0.0.0.0/0
  14. ufw-after-forward all -- 0.0.0.0/0 0.0.0.0/0
  15. ufw-after-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
  16. ufw-reject-forward all -- 0.0.0.0/0 0.0.0.0/0
  17. ufw-track-forward all -- 0.0.0.0/0 0.0.0.0/0
  18.  
  19. Chain OUTPUT (policy ACCEPT)
  20. target prot opt source destination
  21. ufw-before-logging-output all -- 0.0.0.0/0 0.0.0.0/0
  22. ufw-before-output all -- 0.0.0.0/0 0.0.0.0/0
  23. ufw-after-output all -- 0.0.0.0/0 0.0.0.0/0
  24. ufw-after-logging-output all -- 0.0.0.0/0 0.0.0.0/0
  25. ufw-reject-output all -- 0.0.0.0/0 0.0.0.0/0
  26. ufw-track-output all -- 0.0.0.0/0 0.0.0.0/0
  27.  
  28. Chain ufw-after-forward (1 references)
  29. target prot opt source destination
  30.  
  31. Chain ufw-after-input (1 references)
  32. target prot opt source destination
  33. ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
  34. ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
  35. ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
  36. ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
  37. ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
  38. ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
  39. ufw-skip-to-policy-input all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
  40.  
  41. Chain ufw-after-logging-forward (1 references)
  42. target prot opt source destination
  43. LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  44.  
  45. Chain ufw-after-logging-input (1 references)
  46. target prot opt source destination
  47. LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  48.  
  49. Chain ufw-after-logging-output (1 references)
  50. target prot opt source destination
  51.  
  52. Chain ufw-after-output (1 references)
  53. target prot opt source destination
  54.  
  55. Chain ufw-before-forward (1 references)
  56. target prot opt source destination
  57. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  58. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
  59. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
  60. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
  61. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
  62. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
  63. ufw-user-forward all -- 0.0.0.0/0 0.0.0.0/0
  64.  
  65. Chain ufw-before-input (1 references)
  66. target prot opt source destination
  67. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  68. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  69. ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  70. DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
  71. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
  72. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4
  73. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
  74. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
  75. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
  76. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
  77. ufw-not-local all -- 0.0.0.0/0 0.0.0.0/0
  78. ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
  79. ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
  80. ufw-user-input all -- 0.0.0.0/0 0.0.0.0/0
  81.  
  82. Chain ufw-before-logging-forward (1 references)
  83. target prot opt source destination
  84.  
  85. Chain ufw-before-logging-input (1 references)
  86. target prot opt source destination
  87.  
  88. Chain ufw-before-logging-output (1 references)
  89. target prot opt source destination
  90.  
  91. Chain ufw-before-output (1 references)
  92. target prot opt source destination
  93. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  94. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  95. ufw-user-output all -- 0.0.0.0/0 0.0.0.0/0
  96.  
  97. Chain ufw-logging-allow (0 references)
  98. target prot opt source destination
  99. LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "
  100.  
  101. Chain ufw-logging-deny (2 references)
  102. target prot opt source destination
  103. RETURN all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10
  104. LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
  105.  
  106. Chain ufw-not-local (1 references)
  107. target prot opt source destination
  108. RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
  109. RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
  110. RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
  111. ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
  112. DROP all -- 0.0.0.0/0 0.0.0.0/0
  113.  
  114. Chain ufw-reject-forward (1 references)
  115. target prot opt source destination
  116.  
  117. Chain ufw-reject-input (1 references)
  118. target prot opt source destination
  119.  
  120. Chain ufw-reject-output (1 references)
  121. target prot opt source destination
  122.  
  123. Chain ufw-skip-to-policy-forward (0 references)
  124. target prot opt source destination
  125. DROP all -- 0.0.0.0/0 0.0.0.0/0
  126.  
  127. Chain ufw-skip-to-policy-input (7 references)
  128. target prot opt source destination
  129. DROP all -- 0.0.0.0/0 0.0.0.0/0
  130.  
  131. Chain ufw-skip-to-policy-output (0 references)
  132. target prot opt source destination
  133. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  134.  
  135. Chain ufw-track-forward (1 references)
  136. target prot opt source destination
  137.  
  138. Chain ufw-track-input (1 references)
  139. target prot opt source destination
  140.  
  141. Chain ufw-track-output (1 references)
  142. target prot opt source destination
  143. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
  144. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
  145.  
  146. Chain ufw-user-forward (1 references)
  147. target prot opt source destination
  148.  
  149. Chain ufw-user-input (1 references)
  150. target prot opt source destination
  151. tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW recent: SET name: DEFAULT side: source mask: 255.255.255.255
  152. ufw-user-limit tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW recent: UPDATE seconds: 30 hit_count: 6 name: DEFAULT side: source mask: 255.255.255.255
  153. ufw-user-limit-accept tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
  154. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
  155. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
  156.  
  157. Chain ufw-user-limit (1 references)
  158. target prot opt source destination
  159. LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
  160. REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
  161.  
  162. Chain ufw-user-limit-accept (1 references)
  163. target prot opt source destination
  164. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  165.  
  166. Chain ufw-user-logging-forward (0 references)
  167. target prot opt source destination
  168.  
  169. Chain ufw-user-logging-input (0 references)
  170. target prot opt source destination
  171.  
  172. Chain ufw-user-logging-output (0 references)
  173. target prot opt source destination
  174.  
  175. Chain ufw-user-output (1 references)
  176. target prot opt source destination
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement