Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
FreePBX Firewall is a tightly integrated, low level firewall, that removes the complexity of configuring a firewall on your VoIP server.
...
Firewall requires a Linux machine, and requires iptables 1.4.7 or higher, and the ipt_recent, or xt_recent kernel modules (if you wish to enable the Responsive Firewall component).
Package Requirements
...
When you enable the module, no firewall rules are enabled. Please read the Getting Started Guide for more information on how to do a simple setup.
...
Do I need to configure each Trunk or Peer in the firewall?
No! The firewall automatically interrogates the FreePBX installation, discovers all known peers or trunks, and accepts traffic from that peer on their defined protocol. This means that if you have a trunk to an IAX peer, and that peer is compromised, that peer can not send chan_sip or pjsip signalling through. It can only send IAX traffic to the server, because it is only registered for IAX.Does Firewall support IPv6?
Yes. Firewall has full support for IPv6.What is the Responsive Firewall?
It lets you expose your SIP/IAX ports to the internet, with an intelligent monitoring of connections that will automatically block hack attempts, but will also allow valid clients through. For more information, see the Responsive Firewall Page.How do I add a Trusted Network or Host?
Through the 'Networks' tab on the 'Main' page. More information is in Firewall PermissionsCan I allow a client with DDNS through?
Yes. Simply add their DDNS hostname to the 'Networks' tab on the 'Main' page, and assign them to a zone.How do I assign individual privileges to clients?
Upcoming feature: You will be able to provide access to different services via Userman. This is unimplemented at the moment.How do I reject traffic?
All traffic that isn't explicitly allowed is already rejected. This firewall implements a 'deny by default' rule. More information is on the Firewall Zones page. In addition there is a blacklist which can be populated with hosts, see the 'Blacklist' tab on the 'Services' page.How do I define RTP ports?
All interfaces explicitly allow RTP traffic, as it is configured in Asterisk SIP Settings. There is no need to configure this through the Firewall module. Note that if you set your RTP ports to be an extremely unusual range (such as less than 1024), the Firewall module will refuse to honour that setting, as it could potentially expose other attack surfaces.
It is not recommended to change your RTP range.Can I get locked out of my machine?
Not while Safe Mode is s is available. When this is available, if you reboot your server twice within 5 minutes, the firewall rules will be delayed for the first five minutes the machine is up. This will give you enough time to get into the machine, and add any missing rule that locked you out. There will also be a large warning at the top of the Firewall screen warning you of this. The firewall rules will be applied automatically after 5 minutes, or, if you disable Safe Mode in the Firewall.I can't disable the firewall, I can see 'Firewall can not be disabled' instead of 'Disable'
This is because your system administrator has explicitly decided that the firewall should not be disabled, and has created a lock file. For information how to remove this lock file, see the 'Firewall can not be disabled' page.
Overview
Zones
All network connections coming in to your VoIP server are deemed to be part of a zone. Every network interface has a default Zone, and data arriving at that interface is treated as belonging to that Zone, unless it is a known network, which overrides the default Zone. Services are individually granted to each Zone. The default zones are:
Reject
Any incoming network packets are rejected. Note that this zone still accepts RTP traffic, but no other ports are listening by default. You rarely want to use this. All connections, by default, are rejected. This is here only as a fallback. Traffic in this zone may be processed by the Responsive Firewall, if enabled.Internet (formerly called External)
Traffic classified as 'Internet' means you do not automatically trust the other computers on networks to not harm your computer. This, by default, only allows https connections to the management interface, and access to the UCP port, if defined. Traffic in this zone may be processed by the Responsive Firewall, if enabled.Other
Provided for advanced users, intended for use on trusted external networks, or other well known networks (such as a DMZ, or OpenVPN network). This, by default, allows access to UCP, and provides unfiltered SIP and IAX access.Local (formerly called Internal)
For use on internal networks that do not have traffic from non-trusted hosts. You mostly trust the other computers on the networks to not harm your computer. This, by default, allows access to most services.Trusted
All network connections are accepted. No firewalling is done on this interface, all incoming traffic from a trusted zone is permitted.
This is the default setting for newly discovered interfaces. Any network interface that is associated with this zone is treated as a configuration error, and alerts will be raised. All interfaces must be assigned to a non-default zone. As discussed in the Firewall Getting Started guide, you assign networks or hosts to the Trusted zone, you should never assign an interface to that zone.
...