Are you planning to accept remote SIP calls/registrations over UDP, TCP
and TLS? If so, then your 5060/5061 rules are good. If you aren't using
all of those transport methods, then you can disable the ones you don't
need, or setup more granular ACLs.
Since it doesn't look like your Astlinux bo
That did the trick, thanks!
I would be very grateful for any recommendations for the firewall. I've
currently got AstLinux sitting behind my router with ports 5060-5061 and
1-10128 forwarded to it. I enabled the firewall; enabled adaptive-ban and
ids-protection plugins and configured the f
Crap.
LOL
Thats what I get for not paying attention.
LOL
Thank You,
Fernando Fuentes
DIGITALVOIPNET.COM
On Sun, Feb 10, 2013 at 1:07 PM, Lists wrote:
> Almost... it is...
>
> $ service iptables stop
>
> Access via the web interface again, add Pass EXT->Local rules for TCP
> 80,443,22 . Rest
Almost... it is...
$ service iptables stop
Access via the web interface again, add Pass EXT->Local rules for TCP 80,443,22
. Restart Firewall and you are back in business.
Lonnie
On Feb 10, 2013, at 12:22 PM, "Fernando F." wrote:
> Shamus,
>
> service stop iptables
> to start
> service sta
Shamus,
service stop iptables
to start
service start iptables
Thank You,
Fernando Fuentes
DIGITALVOIPNET.COM
On Sun, Feb 10, 2013 at 11:15 AM, Shamus Rask wrote:
> I'm running the latest version of AstLinux. A friend of mine recently got
> hacked and I've read about the hacking attempts on
I'm running the latest version of AstLinux. A friend of mine recently got
hacked and I've read about the hacking attempts on this list. Based on this, I
decided it was time to enable the firewall.
>From the network tab; I enabled the firewall with all default settings. I am
>no longer able to
Thanks as always Lonnie. That's way I love this community and I am so happy I
stayed with Astlinux after moving off the Soekris platform :-)
SILK it is then. I am all over it :-)
From: Lonnie Abelbeck
To: AstLinux Users Mailing List
Cc: Ionel Chila
Sent: S