From 7eed55266b7fac7c997a06d6770491bc0aabedd2 Mon Sep 17 00:00:00 2001 From: TorontoMedia Date: Thu, 1 Jan 2015 12:46:48 -0500 Subject: [PATCH] Created firewallcmd-multiport --- config/action.d/firewallcmd-multiport.conf | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/config/action.d/firewallcmd-multiport.conf b/config/action.d/firewallcmd-multiport.conf index 5f800423..da73f9f1 100644 --- a/config/action.d/firewallcmd-multiport.conf +++ b/config/action.d/firewallcmd-multiport.conf @@ -17,9 +17,10 @@ actionstop = firewall-cmd --direct --remove-rule ipv4 filter 0 -m state firewall-cmd --direct --remove-rules ipv4 filter f2b- firewall-cmd --direct --remove-chain ipv4 filter f2b- -# Note: uses regular expression word boundaries '\b' -# Example actioncheck: firewall-cmd --direct --get-chains ipv4 filter | grep -q '\bf2b-apache-modsecurity\b' -actioncheck = firewall-cmd --direct --get-chains ipv4 filter | grep -q '\bf2b-\b' +# Note: uses regular expression whitespaces '\s' & end of line '$' +# Example actioncheck: firewall-cmd --direct --get-chains ipv4 filter | grep -q '\sf2b-apache-modsecurity$' + +actioncheck = firewall-cmd --direct --get-chains ipv4 filter | grep -q '\sf2b-$' actionban = firewall-cmd --direct --add-rule ipv4 filter f2b- 0 -s -j @@ -32,8 +33,10 @@ name = default chain = INPUT_direct +# Could also use port numbers separated by a comma. port = 1:65535 + # Option: protocol # Values: [ tcp | udp | icmp | all ] @@ -56,6 +59,6 @@ protocol = tcp # $ sudo firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -m state --state NEW -p tcp -m multiport --dports 80,443 -j f2b-apache-modsecurity # success # actioncheck: -# $ firewall-cmd --direct --get-chains ipv4 filter f2b-apache-modsecurity | grep -q '\bf2b-apache-modsecurity\b' +# $ firewall-cmd --direct --get-chains ipv4 filter f2b-apache-modsecurity | grep -q '\sf2b-apache-modsecurity$' # f2b-apache-modsecurity