Announcement

Collapse
No announcement yet.

Server isolated from LAN - outgoing connections only

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Server isolated from LAN - outgoing connections only

    I can't ping my server within my LAN but from my server I can connect to other devices. I always ping via IP address.

    If I disable UFW there is no change.

    Flushing IPTables also has no effect other than to stop outgoing connections too.

    If I ping a desktop and then from that desktop ping the server back, packets are received but that only lasts for a few minutes.


    Output of sudo iptables -L
    -----------------------------------------------------
    Chain INPUT (policy ACCEPT)
    target prot opt source destination

    Chain FORWARD (policy ACCEPT)
    target prot opt source destination

    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    ------------------------------------------------------




    Output of sudo ufw status numbered
    ------------------------------------------------------
    Status: active

    To Action From
    -- ------ ----
    [ 1] Apache ALLOW IN 192.168.1.0/24
    [ 2] Samba ALLOW IN 192.168.1.0/24
    [ 3] 22 ALLOW IN 192.168.1.0/24






    Output of sudo cat /etc/ufw/before[6].rules
    ---------------------------------------------------
    #
    # rules.before
    #
    # Rules that should be run before the ufw command line added rules. Custom
    # rules should be added to one of these chains:
    # ufw6-before-input
    # ufw6-before-output
    # ufw6-before-forward
    #

    # Don't delete these required lines, otherwise there will be errors
    *filter
    :ufw6-before-input - [0:0]
    :ufw6-before-output - [0:0]
    :ufw6-before-forward - [0:0]
    # End required lines


    # allow all on loopback
    -A ufw6-before-input -i lo -j ACCEPT
    -A ufw6-before-output -o lo -j ACCEPT

    # drop packets with RH0 headers
    -A ufw6-before-input -m rt --rt-type 0 -j DROP
    -A ufw6-before-forward -m rt --rt-type 0 -j DROP
    -A ufw6-before-output -m rt --rt-type 0 -j DROP

    # for stateless autoconfiguration (restrict NDP messages to hop limit of 255)
    -A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
    -A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-solicitation -m hl --hl-eq 255 -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
    -A ufw6-before-output -p icmpv6 --icmpv6-type neighbor-advertisement -m hl --hl-eq 255 -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type router-solicitation -m hl --hl-eq 255 -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT

    # quickly process packets for which we already have a connection
    -A ufw6-before-input -m state --state RELATED,ESTABLISHED -j ACCEPT
    -A ufw6-before-output -m state --state RELATED,ESTABLISHED -j ACCEPT

    # for multicast ping replies from link-local addresses (these don't have an
    # associated connection and would otherwise be marked INVALID)
    -A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -s fe80::/10 -j ACCEPT

    # drop INVALID packets (logs these in loglevel medium and higher)
    -A ufw6-before-input -m state --state INVALID -j ufw6-logging-deny
    -A ufw6-before-input -m state --state INVALID -j DROP

    # ok icmp codes
    -A ufw6-before-input -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type time-exceeded -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type parameter-problem -j ACCEPT
    -A ufw6-before-input -p icmpv6 --icmpv6-type echo-request -j ACCEPT

    # allow dhcp client to work
    -A ufw6-before-input -p udp -s fe80::/10 --sport 547 -d fe80::/10 --dport 546 -j ACCEPT

    # allow MULTICAST mDNS for service discovery
    -A ufw6-before-input -p udp -d ff02::fb --dport 5353 -j ACCEPT

    # allow MULTICAST UPnP for service discovery
    -A ufw6-before-input -p udp -d ff02::f --dport 1900 -j ACCEPT

    # don't delete the 'COMMIT' line or these rules won't be processed
    COMMIT






    Output of sudo cat /etc/ufw/after[6].rules
    ------------------------------------------------------------------
    #
    # rules.input-after
    #
    # Rules that should be run after the ufw command line added rules. Custom
    # rules should be added to one of these chains:
    # ufw6-after-input
    # ufw6-after-output
    # ufw6-after-forward
    #

    # Don't delete these required lines, otherwise there will be errors
    *filter
    :ufw6-after-input - [0:0]
    :ufw6-after-output - [0:0]
    :ufw6-after-forward - [0:0]
    # End required lines

    # don't log noisy services by default
    -A ufw6-after-input -p udp --dport 137 -j ufw6-skip-to-policy-input
    -A ufw6-after-input -p udp --dport 138 -j ufw6-skip-to-policy-input
    -A ufw6-after-input -p tcp --dport 139 -j ufw6-skip-to-policy-input
    -A ufw6-after-input -p tcp --dport 445 -j ufw6-skip-to-policy-input
    -A ufw6-after-input -p udp --dport 546 -j ufw6-skip-to-policy-input
    -A ufw6-after-input -p udp --dport 547 -j ufw6-skip-to-policy-input

    # don't delete the 'COMMIT' line or these rules won't be processed
    COMMIT

    #2
    Let's set the config aside for a moment and step back. What is it that you wish to accomplish?

    Comment

    Working...
    X