pass in log quick proto tcp/udp from | any to | any port = | 2121 | |
pass in log quick proto tcp/udp from | any to | any port 49152 >< 65535 | ||
pass in log quick proto tcp from any | to any | port = | 20 |
|
pass in log quick proto tcp from any | to any | port = | 21 |
|
pass in log quick proto tcp from any | to any | port = | 22 |
|
pass in log quick proto tcp from any | to any | port = | 514 |
|
pass in log quick proto icmp from any to any | 8 keep state | |||
pass in log quick proto tcp from any | port = | 514 to any | keep state |
c.In the IPFilter Module of Bastille, change the following line to Yes if it is not already.
Should Bastille setup basic firewall rules with these properties?
d.Run Bastille.
# bastille
6.If a Bastille baseline had been created for the system, update that baseline.
# bastille_drift
To make sure
1.Discover your current lockdown state.
•If you are using Bastille 3.0 or later, create a configuration report. The report will be created in /var/opt/sec_mgmt/bastille/log/Assessment/
#bastille
•If you are using a version of Bastille earlier than 3.0, get the latest configuration file used by Bastille.
#bastille
NOTE: If you get the message
NOTE: The system is in its
there is no need to proceed with this configuration, as daemons, services, and ports required by
2.Copy the last configuration file used or the assessment report to a place of your choice.
3.Bring up the latest configuration in the Bastille GUI.
# bastille
4.Make sure the settings in your configuration file for the NFS daemon and rtools service are set to No. Note that if you have to change a setting from Yes to No, you will likely be required to enable that daemon or service on your system in order to use it. After you have made changes, save the configuration file to a place of your choice.
Would you like to deactivate the NFS client daemons?
Should Bastille ensure that the login, shell, and exec services do not run on this system?
5.To update your firewall or have Bastille create a new one:
a.Backup your /etc/opt/ipf/ipf.conf file to a place of your choice.
b.Update the port information for the
•Add the words keep frags to the end of the udp outgoing rule line so it looks like pass out quick proto udp all keep state keep frags
•Add the following lines after the End allow outgoing rules section.
Modifying a | 91 |