Last active
December 14, 2015 05:49
This Script is for those who have problems with their Plesk 11.0.9 Firewall (ipv6 errors on activation).
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# | |
#################################################################################################### | |
# | |
# Plesk Firewall Activation Script | |
# | |
# This Script is for those who have problems with their Plesk 11.0.9 Firewall (ipv6 on activation). | |
# This Script is opening standart ports to the VS. | |
# | |
# | |
# 22 for SSH | |
# 80 443 for Apache | |
# ICMP for Ping | |
# 143, 25, 993 for Mail Services | |
# 53 for DNS | |
# | |
# And others - Please have a look on this script. If you want, you can easily add Ports! | |
# | |
# Run in interactive mode with: | |
# $ sh -c "$(curl -sL https://raw.github.com/gist/5038260/Plesk_Firewall.sh)" | |
# | |
# Please, share your tips commenting here: | |
# https://gist.github.com/5038260 | |
# | |
# Author: @dbeuchler | |
# | |
# | |
# (Tested and used on Ubuntu 10.04 with Plesk 11.0.9) | |
#################################################################################################### | |
set -e | |
echo 0 > /proc/sys/net/ipv4/ip_forward | |
([ -f /var/lock/subsys/ipchains ] && /etc/init.d/ipchains stop) >/dev/null 2>&1 || true | |
(rmmod ipchains) >/dev/null 2>&1 || true | |
/sbin/iptables -F | |
/sbin/iptables -X | |
/sbin/iptables -Z | |
/sbin/iptables -P INPUT DROP | |
/sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp ! --syn -m state --state NEW -j REJECT --reject-with tcp-reset | |
/sbin/iptables -A INPUT -m state --state INVALID -j DROP | |
/sbin/iptables -P OUTPUT DROP | |
/sbin/iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT | |
/sbin/iptables -A OUTPUT -p tcp ! --syn -m state --state NEW -j REJECT --reject-with tcp-reset | |
/sbin/iptables -A OUTPUT -m state --state INVALID -j DROP | |
/sbin/iptables -P FORWARD DROP | |
/sbin/iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT | |
/sbin/iptables -A FORWARD -p tcp ! --syn -m state --state NEW -j REJECT --reject-with tcp-reset | |
/sbin/iptables -A FORWARD -m state --state INVALID -j DROP | |
/sbin/iptables -A INPUT -i lo -j ACCEPT | |
/sbin/iptables -A OUTPUT -o lo -j ACCEPT | |
/sbin/iptables -A FORWARD -i lo -o lo -j ACCEPT | |
/sbin/iptables -t mangle -F | |
/sbin/iptables -t mangle -X | |
/sbin/iptables -t mangle -Z | |
/sbin/iptables -t mangle -P PREROUTING ACCEPT | |
/sbin/iptables -t mangle -P OUTPUT ACCEPT | |
/sbin/iptables -t mangle -P INPUT ACCEPT | |
/sbin/iptables -t mangle -P FORWARD ACCEPT | |
/sbin/iptables -t mangle -P POSTROUTING ACCEPT | |
/sbin/iptables -t nat -F | |
/sbin/iptables -t nat -X | |
/sbin/iptables -t nat -Z | |
/sbin/iptables -t nat -P PREROUTING ACCEPT | |
/sbin/iptables -t nat -P OUTPUT ACCEPT | |
/sbin/iptables -t nat -P POSTROUTING ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 8443 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 8880 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 80 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 443 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 21 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 22 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 25 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 465 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 110 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 995 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 143 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 993 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 106 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 3306 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 5432 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 9008 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 9080 -j ACCEPT | |
/sbin/iptables -A INPUT -p udp --dport 137 -j ACCEPT | |
/sbin/iptables -A INPUT -p udp --dport 138 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 139 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 445 -j ACCEPT | |
/sbin/iptables -A INPUT -p udp --dport 1194 -j ACCEPT | |
/sbin/iptables -A INPUT -p udp --dport 53 -j ACCEPT | |
/sbin/iptables -A INPUT -p tcp --dport 53 -j ACCEPT | |
/sbin/iptables -A INPUT -p icmp --icmp-type 8/0 -j ACCEPT | |
/sbin/iptables -A INPUT -j ACCEPT | |
/sbin/iptables -A OUTPUT -j ACCEPT | |
/sbin/iptables -A FORWARD -j DROP | |
echo 1 > /proc/sys/net/ipv4/ip_forward | |
echo 1 > /opt/psa/var/modules/firewall/ip_forward.active | |
chmod 644 /opt/psa/var/modules/firewall/ip_forward.active | |
# | |
# End of script | |
# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment