Download Endian Firewall
Author: m | 2025-04-24
Endian Firewall Manual Pdf Portugues Endian Firewall Community free download. Endian Firewall Community Open Source, Free, Community-Supported Security Download Endian Firewall - Endian Firewall 2.2, Endian Firewall is a turn-key linux security distribution based on IPCop that turns every system into a full
Endian Firewall Endian Firewall 2.5.2 - LQ ISO
In this page you find:Common configuration itemsPort forwarding / NATPort forwarding / Destination NATSource NATIncoming routed trafficOutgoing trafficCurrent rulesOutgoing Firewall SettingsInter-Zone trafficCurrent rulesInter-Zone Firewall SettingsVPN trafficCurrent rulesVPN Firewall settingsSystem accessFirewall DiagramsThis section allows to set up rules that specify if and how thenetwork traffic flows through the Endian Hotspot Appliance. The firewall onthe Endian Hotspot Appliance is divided in different modules, each monitoringand allowing or blocking one specific type of traffic. The modulesavailable are the following:Port forwarding / NAT - port forwarding and abbr:NAT (Network Address Translation).Outgoing traffic - outgoing traffic, i.e., towards the RED interfaceInter-Zone traffic - traffic between zones.VPN traffic - traffic generated by VPN users.System access - grant access to the Endian Hotspot Appliance host itself.Firewall diagrams - pictures that show which traffic is interceptedby each type of firewall.Within each of the sub-menus, in which all the corresponding existingrules are listed, any customised rules can be added, for any type ofservice or every port/protocol. The various parts of which thefirewall is composed refer to different types of traffic (e.g.,OpenVPN governs the traffic from/to the VPN users, inter-zone trafficthe one flowing from zone to zone) and are designed to avoid anyoverlapping or even contrasting rules. In other words, there is no wayto write two rules in two different firewall modules whose combinedeffect causes an unwanted block or access of packets.The choice to separate the networks controlled by the Endian Hotspot Applianceallows also for an easier management of the firewall, whoseconfiguration may become very complex. Indeed, each of the modules canbe considered as an independent firewall, and their combined effectcovers all possible packet flows through the Endian Hotspot Appliance.Additionally, for any of the modules listed above, one or more rulemay exist, that can neither be disabled nor removed. These are theso-called Rules of system services (or System rules) whose purposeis to allow the correct interoperability of the services running onthe Endian Hotspot Appliance with the Endian Network infrastructure.The rules that are defined here will be transformed intoiptables commands, the standard Linux firewall tool sincethe 2.4 kernel, and therefore organised into tables, chains, andrules. For a more in-depth description of the various elements thatcompose a firewall rule, or even to learn how to fine-tune and tomanage a complex firewall, it is suggested to read either theiptables(8) manual page on any Linux box, or some of thecountless online resources or tutorials available on the Internet.Common configuration itemsWhen adding a rule, most of the configuration options in thefirewall’s parts are of the same type (e.g., the source or destinationinterfaces), since they are built with the same software,iptables. Therefore, in order to keep this section shortand readable, all the common configuration items are grouped andexplained. The next sections will contain only description of theoption that are peculiar to that part of the firewall.HintMultiple values can be supplied for any options: If there isa list of values to choose from, hold the CTRL key (GermanSTRG) and click on each value, otherwise, write one valueper line if there is a textbox.Source or Incoming IPUsually in In the top box.GREEN: HTTP, HTTPS, FTP, SMTP, POP, IMAP, POP3s, IMAPs, DNS, ICMPORANGE: DNS, ICMPBLUE: HTTP, HTTPS, DNS, ICMPEverything else is forbidden by default except for the System ruleswhich allow access to the services in the Endian Network. The system rulesare defined even if the corresponding zones are not enabled.NoteAccess to Endian Network is not permitted to Community Editionappliances.Possible actions on each rule are to enable or disable it, to edit itor delete it. Additional rules can be added by clicking on theAdd a new firewall rule link at the top of thepage. Please remember that the order of rules is important: the firstmatching rule decides whether a packet is allowed or denied,regardless of how many matching rules follow. The order of the rulescan be changed by using the up and down arrow icons next to each rule.The following settings differ from the default common options.SourceIt can be one or more Zone/Interfaces, Network/IP, or MAC addresses.DestinationIt can be the RED zone, one or more uplinks, or one or morenetwork/host addresses accessible outside the RED interface.ApplicationThis search widget allows to select the applications that should bepart of the rule. Applications are dividend into categories (e.g.,Database, filesharing, and so on).HintEnter at least one letter to show all applications whosename starts with that letter.Outgoing Firewall SettingsIt is possible to disable or enable the whole outgoing firewall byclicking on the Enable Outgoing firewall switch. When disabled, alloutgoing traffic is allowed and no packet is filtered: This setting ishowever strongly discouraged and the recommendation is to keep theoutgoing firewall enabled.Log accepted outgoing connectionsTicking this checkbox causes all the accepted connections to theRED interface to be logged.Proxy and outgoing firewall.Whenever the proxy is activated for a given service (e.g., HTTP,POP, SMTP, DNS), the firewall rules in the outgoing firewall willtake no effect, because of the nature of the proxy.With the proxy activated, whenever a connection starts from aclient to the Internet, it will either be intercepted by the proxyon the Endian Hotspot Appliance (in transparent mode) or go directly tothe firewall, but never go through the firewall. The proxy thenstarts a new connection to the real destination, gets the data andsends it to the client. Those connections to the Internet alwaysstart from the Endian Hotspot Appliance, which hides the clients internalIP address. Therefore, such connections never go through theoutgoing firewall, since in fact they are local connections.Inter-Zone trafficThis module permits to set up rules that determine how traffic canflow between the local network zones, excluding therefore the RED zone(traffic through the RED zone can be filtered in Outgoing traffic andPort forwarding / NAT). To activate the inter-zone firewall, click on the greyswitch . Two boxes are present on this page, one that shows thecurrent rules and allow to add new ones, and one that allows to setthe inter-zone firewall options.NoteWhen the Endian Hotspot Appliance is configured in no uplink mode, allthe network traffic shall be filtered using the interzonefirewall. Also when in Stealth uplink mode with more than onezone defined, all the traffic not routedEndian Firewall Endian Firewall 3.3.2 - LQ ISO
Through the gateway isfiltered with the interzone firewall. See ref:the stealth uplinkdescription for more information.Current rulesThe Endian Hotspot Appliance comes with a simple set of pre-configured rules:traffic is allowed from the GREEN zone to any other zone (ORANGE andBLUE) and within each zone, with everything else forbidden bydefault.Analogously to the outgoing traffic firewall, rules can bedisabled/enabled, edited or deleted by clicking on the appropriateicon on the right side of the table. New rules can be added byclicking on the Add a new inter-zone firewall rule link atthe top of the page. Only the common options can beconfigured.Inter-Zone Firewall SettingsThe inter-zone firewall can be disabled or enabled by using theEnable Inter-Zone firewall switch. When disabled, all traffic isallowed among all the BLUE, GREEN, and ORANGE zones. Disabling theinter-zone firewall is strongly discouraged.Log accepted Inter-Zone connectionsTicking this checkbox causes all the accepted connections among thezones to be logged.VPN trafficThe VPN traffic firewall allows to add firewall rules applied to theusers and hosts that are connected via OpenVPN.The VPN traffic firewall is normally not active, which means that, onthe one side, the traffic can freely flow between the VPN clients andthe hosts in the GREEN zone, and on the other side, VPN hosts canaccess all the zones behind the Endian Hotspot Appliance.NoteVPN clients are not subject to the outgoing trafficfirewall or the Inter-Zone traffic firewall.Two boxes are present on this page, one that shows the current rulesand allow to add new ones, and one that allows to set the VPN firewalloptions.Current rulesBy default there is no rule defined, therefore to add rules, click onthe Add a new VPN firewall rule link at the top of thepage. Only the common options are available todefine the rules.VPN Firewall settingsThe VPN firewall can be disabled or enabled using the EnableVPN firewall switch.Log accepted VPN connectionsTicking this checkbox causes all the accepted connections from theVPN users to be logged.System accessThis section governs the rules that grant or deny access to theEndian Hotspot Appliance itself and to the services that run on it.There is a list of pre-configured rules that cannot be changed, whosepurpose is to guarantee the proper working of the services running onthe Endian Hotspot Appliance, that require to be accessed from clients that arelocated either in the local or remote zones.The list of the pre-defined rules is shown when clicking on theShow rules of system services button at the bottom of thepage.Examples of the system access rules include services that are alwaysactive, for example the DNS service to resolve hostnames (whichrequires that the port 53 be open), or the access to theadministration web interfaces (which uses port 10443). Moreover,whenever a services (e.g., OpenVPN, the Hotspot, SNMP server amongothers) is activated, one or more rules are automatically created toallow the proper efficiency of the service itself.More system access rules can be added by clicking on the Adda new system access rule link. The setting specific to this module ofthe firewall are:Log packetsAll packets that access or try to access the Endian Hotspot Appliance arelogged when this. Endian Firewall Manual Pdf Portugues Endian Firewall Community free download. Endian Firewall Community Open Source, Free, Community-Supported Security Download Endian Firewall - Endian Firewall 2.2, Endian Firewall is a turn-key linux security distribution based on IPCop that turns every system into a fullEndian Firewall Endian Firewall 3.0 - LQ ISO
IronPDF offers an itextsharp alternative for HTML to PDF conversion with C# code examples, documentation, and ... VShell is a versatile and secure file transfer server that supports multiple protocols and is compatible ... PDF Studio is a cost-effective PDF editor that delivers full compatibility with the PDF Standard. It's ... VQ Probe is a comprehensive software tool that enables objective and subjective video quality analysis. The ... This Debian GNU/Linux (Buster) based software has a customized partitioning scheme that enhances robustness against filesystem ... Valentina Studio is a cross-platform GUI manager for Mac, Windows, and Linux. It allows users to ... The software monitors VPN connection and automatically terminates apps during connection loss, re-establishes the connection and ... G_Viewer is a Linux software that serves as both a file system and photo/image viewer. It ... This software allows for the generation and verification of file hashes. It is a quick and ... A password management software that is secure, offline and extensible. It offers military-grade encryption to protect ... October 28, 2009 This software is a Linux security distribution built on Red Hat and IPCop. It offers a complete and ready-to-use solution for securing networks, making it easy to implement and manage network security. Version 2.3.0 License GPL Platform Linux Supported Languages English If you're looking for a comprehensive security distribution based on IPCop, Endian Firewall could be just what you need. This linux distribution is designed to provide full-featured protection for your system, with a focus on usability. One of the key benefits of Endian Firewall is how easy it is to install and manage, without sacrificing flexibility. It's a turn-key solution that can effortlessly transform any system into a secure appliance. The Firewall boasts a stateful packet inspection firewall and application-level proxies for popular protocols like HTTP, POP3, and SMTP, all with antivirus support. It also provides virus and spam filtering for email traffic and content filtering of web traffic. Endian Firewall also has a VPN solution that requires no hassle and is based on OpenVPN. But perhaps the biggest advantage is its pure Open Source status, Thedrop-down menu. The Auto entries will automatically choose the IPaddress corresponding to the outgoing interface.SNAT and a SMTP server in the orange zone.In certain cases it is preferable to explicitly declare that noSource NAT be performed. An example would be a SMTP server in theDMZ, configured with an external IP, but whose outgoingconnections should have the REDIP as the source. Configuring anSMTP server running on the IP 123.123.123.123 (assuming that123.123.123.123 is an additional IP address of the uplink) in theDMZ with Source NAT can be done as follows:Configure the ORANGE zone with any subnet (e.g., 192.168.100.0).Setup the SMTP server to listen on port 25 on an IP in theORANGE zone (e.g., 129.168.100.13).In the Menubar ‣ Network ‣ Interfaces section,add a static Ethernet uplink with IP 123.123.123.123 to theEndian Hotspot Appliance.Add a source NAT rule and specify the ORANGE IP of the SMTPserver as source address. Be sure to use NAT and set the NAT-edsource IP address to 123.123.123.123.Incoming routed trafficThis tab allows to redirect traffic that has been routed through theEndian Hotspot Appliance. This is very useful when having more than oneexternal IP addresses and some of them should be used in the DMZwithout the necessity to use NAT. The fields shown for every rule inthe list are the traffic source and destination, the service, thepolicy to apply, a remark, and the available actions.No other setting can be configured besides the common options.A Typical Scenario for Incoming routed traffic.A typical example to show what kind of network traffic the incomingrouted firewall matches is a local DMZ (Orange) network withservers having public IP addresses.Suppose the Endian Hotspot Appliance is configured as follows:Uplink (RED)1.1.1.2/30 - Endian Uplink ip1.1.1.1/30 - ISP router (default gateway for Endian)1.1.1.0/30 - Network address1.1.1.3 - Broadcast addressThe Endian Hotspot Appliance connects to an ISP and receives one public IPaddresses (1.1.1.2) and a gateway (1.1.1.1), through which itconnects to the Internet.DMZ (ORANGE)2.2.2.1/28 - Endian (default gateway for DMZ Network)2.2.2.2-14 - Public IPs for server2.2.2.0/28 - Network address2.2.2.15 - BroadcastThe local DMZ network consists of 14 public IP addresses in the2.2.2.1/28 network and connects to the Internet using the 2.2.2.1gateway (ORANGE IP of the Endian Hotspot Appliance).Routing on the ISP side must be configured using the followingrule:route 2.2.2.0/28 via 1.1.1.2The ISP sends all the traffic directed to the public 2.2.2.0/28subnet to the Endian Hotspot Appliance.With this configuration, on the main uplink will arrive (incoming)packets with destination 1.1.1.2 that are connection to the uplinkof the Endian Hotspot Appliance and are connections to services offered, likeOpenVPN, IPsec, and the like.However, the Endian Hotspot Appliance will also receive packets with destinationin the 2.2.2.2-2.2.2.14 range, because there’s a route for them setby the ISP. This traffic is both INCOMING -because itcomes from the uplink- and ROUTED because the ISP has therouting rule for packages with that destination.By default this traffic would be dropped, and must therefore beallowed with a rule in the incoming routed firewall. Moreover,this kind of traffic can not be configured with a DNAT rule,because the destination IP address is already public.OutgoingEndian Firewall Endian Firewall 2.5.1 - LQ ISO
TrafficThe Endian Hotspot Appliance comes with a pre-configured set of rules for outgoingtraffic, i.e., to allow traffic flow of specific services, ports, andapplications from the various zones to the RED interface and thereforethe Internet. These rules are needed to ensure that the most commonservices always be able to access the Internet and work correctly. Twoboxes are present on this page, one that shows the current rules andallows to add new ones, and one that allows to set the outgoingfirewall options.NoteRules defined in the outgoing firewall are disregarded whenthe Endian Hotspot Appliance is in no uplink mode. When operating in Stealthuplink mode, only part of the traffic from the zone behind theEndian Hotspot Appliance to the outside is considered as outgoing, see thedescription of the stealth uplink.Endian Hotspot Appliance and Application Firewall (Application Control).Application firewalls are a recent development and improvement tostateful firewalls, that combine the ability of the latter to keeptrack of the connection’s origin and path with those of IntrusionPrevention Systems to inspect packets’ content, with the purpose toprovide higher security from worm, viruses, malware, and all typesof threats. The final result from the user experience point-of-viewis that firewalls can block not only traffic between ports and IPaddresses, but also traffic generated by single applications. Thisrequires however, more efforts from the firewall: While trafficbetween IP addresses only needs that the first packet be inspectedto block or allow the whole flow, to correctly recognise trafficgenerated by application, it is sometimes necessary the analysis ofa few packets -usually not more than 3- of the flow.Starting with version 5.2, every Endian Hotspot Appliance is equipped withnDPI, anopen source library implementing Deep Packet Inspection, thusallowing the deployment of rules for application firewalling. nDPIis deployed as a kernel module and interacts with iptables for thepacket analysis.Hence, there are now two different types of rules that can bedefined on the outgoing firewall:Stateful firewall rules, that filter traffic between IP addressesand ports.Application Rules, i.e., rules that filter traffic generated byapplication.When no application rules have been defined, the behaviour of thefirewall is exactly the same as in previous version. Whenever anapplication rule has been defined, however, the steteful rulespreceding it behave normally, while all the rules after undergonDPI.It is worth noting that the use of nDPI might present somesubtleties, illustrated by the following example, and thereforemight produce some unwanted side effect.Suppose that a company wants to allow all HTTP traffic, except foryoutube and gmail. The first default rule defined in Endian Hotspot Appliance isto allow all HTTP traffic, with no restriction. This rule musttherefore be disabled as first step. Then, two rules must bedefined:an application rule blocking the gmail and youtube protocolsa stateful rule allowing all http traffic.If rule 2. were an application rule with protocol HTTP, then onlytraffic recognised as HTTP by nDPI would be allowed, but otherprotocols using HTTP, like e.g., Yahoo and FaceBook would pass,since nDPI does not consider them as being HTTP, but indipendentprotocols.Current rulesIn detail, these are the services and protocols allowed by default toaccess the REDIP from the zones and shownEndian Firewall Endian Firewall 3.2.5 - LQ ISO
USEREDIT, USERLOGOFF,USERLOGON.NoteTUNNELACTIVE and TUNNELINACTIVE refer to the creation ofan OpenVPN tunnel from a client workstation to an endpoint.User: The user who carried out the action.Target user: The user that was the object of the action.Gateway: In case of a connection to a device, the gateway used.Endpoint: The endpoint to which a connection has been established orterminated.Application: The application that has been modified.Profile: The application profile that has been modified.Management Center¶New in version 5.0.5.The Endian Management Center is a module implemented with the main purpose to simplifythe administration of all Endian gateways connected to theSwitchboard. Additional features are the ability to keep theconfiguration of all gateways synchronised, to define differentprofiles to configure the gateways, and to store and show the history ofconfiguration changes for the gateways in each profile. Moredetails below.The Management Center ExplainedThe Endian Management Center module allows the remote management of all the gatewaysregistered with the Switchboard, to maintain a repository of theirconfiguration, and to keep all their configuration synchronisedwith a reference gateway called Gold Gateway. While from theusers’ perspective this module is easy to use, under the hood thereare several points to highlight in order to understand how themodule operates and interacts with the remote gateways. In thereminder, the most important features of the Endian Management Center are presented.Communication between the Endian Management Center and the remote gateways uses theJabber (XMPP) protocol. This is the most importantdifference between how the Switchboard, which uses OpenVPN, and theEndian Management Center interact with the remote devices they manage. This impliesthat the same device can be marked as online on the Switchboard butoffline on the Endian Management Center or vice versa.For this reason, the following ports are opened on the Endian UTM Appliance(and can be seen under Firewall ‣ System Access‣ Show rules of system services) to allow a seamless connectionbetween the Management Center and the gateways:Portal TCP 443.Jabber TCP 5222.OpenVPN TCP+UDP 1194.NotePort 1194 may depend upon the OpenVPN serverconfiguration.EMC profiles can be created on the Management Center to allow selective accessand to the remote gateway’s modules. Many gateways can beassociated with each profile, and one gateway within a profile willbe elected as Gold Gateway, which is the one that acts asthe model to which the other gateways will conform.This special role introduces the next feature, thesynchronisation of the gateways. As soon as the goldgateway is elected, its configuration is saved on the Endian Management Center andpushed to the other gateways associated. Endian Firewall Manual Pdf Portugues Endian Firewall Community free download. Endian Firewall Community Open Source, Free, Community-Supported Security Download Endian Firewall - Endian Firewall 2.2, Endian Firewall is a turn-key linux security distribution based on IPCop that turns every system into a fullEndian Firewall Endian Firewall 2.3 - LQ ISO
Range to which the trafficshould be sent to, and if to apply NAT on the traffic or not. If Donot NAT is chosen, it is not allowed to define a Filter policyunder the Access From (advanced mode).WarningWhen selecting IP, OpenVPN User, orLoad balancing, keep in mind that port ranges will notbe mapped 1 to 1, but rather a round robin balancing isperformed. For example, mapping incoming ports 137:139 todestination ports 137:139 will result in these ports being usedrandomly: The incoming traffic to port 138 can unpredictably beredirect to either 137, 138, or 139. Leave the translationPort/Range field empty to avoid such occurrences.Access fromAlmost every rule can be further detailed by adding several Accessfrom rules to it, for example to limit access to a clientdepending on the zone from which it connects to theEndian Hotspot Appliance. Access from rules can be configured when theadvanced mode is selected . As a consequence, a rule can appearsplit on two or more lines, depending on the number of accesspolicies defined. Each access from sub-rule can be deletedindividually, without changing the main rule. Each of the sub-rulescan even have a different filter policy.Troubleshooting port-forwarding.There are mainly two reasons why port-forwarding may not work.The Endian Hotspot Appliance is behind a NAT device.In this case there is a device like a router or anotherfirewall between the Endian Hotspot Appliance and the Internet, whichdisallows direct incoming connections. The solution is toconfigure a port forwarding also on that device to the RED IP ofthe Endian Hotspot Appliance, if this is possible.The destination server has wrong default gateway.The server set as the destination of a port-forwarding rule isconfigured with a wrong or no default gateway. Connections willbe directed to the target IP address but due to a wrong defaultgateway, packets will not be directed through theEndian Hotspot Appliance. The solution is to correct the server’s gateway.If none of the above helps, analysing the network traffic from theCLI with tcpdump on the Endian Hotspot Appliance might prove useful,in that it will show if the network traffic flows from the expectedRED interface to the expected server. Also usingiptables with the -v option (verbose mode) tocount packets on each rule might help.Source NATIn this tab can be defined rules that apply SNAT to outgoingconnections. The list of already defined rules is also displayed, foreach of which the source and destination IP addresses, the service,the NAT status, a custom description of the rule, and the availableactions are shown.Source NAT can be useful if a server behind the Endian Hotspot Appliance has an ownexternal IP and the outgoing packets should therefore not use the REDIP address of the firewall, but the one of the server. To add a newrule, click on Add a new source NAT rule and proceed likein the case of adding a port forwarding rule. Besides the commonoptions, only one other setting can be configured:NATSelect to either apply NAT, No NAT, orMap Network. The choice to use NAT allows the selectionof the IP address that should be used among those presented inComments
In this page you find:Common configuration itemsPort forwarding / NATPort forwarding / Destination NATSource NATIncoming routed trafficOutgoing trafficCurrent rulesOutgoing Firewall SettingsInter-Zone trafficCurrent rulesInter-Zone Firewall SettingsVPN trafficCurrent rulesVPN Firewall settingsSystem accessFirewall DiagramsThis section allows to set up rules that specify if and how thenetwork traffic flows through the Endian Hotspot Appliance. The firewall onthe Endian Hotspot Appliance is divided in different modules, each monitoringand allowing or blocking one specific type of traffic. The modulesavailable are the following:Port forwarding / NAT - port forwarding and abbr:NAT (Network Address Translation).Outgoing traffic - outgoing traffic, i.e., towards the RED interfaceInter-Zone traffic - traffic between zones.VPN traffic - traffic generated by VPN users.System access - grant access to the Endian Hotspot Appliance host itself.Firewall diagrams - pictures that show which traffic is interceptedby each type of firewall.Within each of the sub-menus, in which all the corresponding existingrules are listed, any customised rules can be added, for any type ofservice or every port/protocol. The various parts of which thefirewall is composed refer to different types of traffic (e.g.,OpenVPN governs the traffic from/to the VPN users, inter-zone trafficthe one flowing from zone to zone) and are designed to avoid anyoverlapping or even contrasting rules. In other words, there is no wayto write two rules in two different firewall modules whose combinedeffect causes an unwanted block or access of packets.The choice to separate the networks controlled by the Endian Hotspot Applianceallows also for an easier management of the firewall, whoseconfiguration may become very complex. Indeed, each of the modules canbe considered as an independent firewall, and their combined effectcovers all possible packet flows through the Endian Hotspot Appliance.Additionally, for any of the modules listed above, one or more rulemay exist, that can neither be disabled nor removed. These are theso-called Rules of system services (or System rules) whose purposeis to allow the correct interoperability of the services running onthe Endian Hotspot Appliance with the Endian Network infrastructure.The rules that are defined here will be transformed intoiptables commands, the standard Linux firewall tool sincethe 2.4 kernel, and therefore organised into tables, chains, andrules. For a more in-depth description of the various elements thatcompose a firewall rule, or even to learn how to fine-tune and tomanage a complex firewall, it is suggested to read either theiptables(8) manual page on any Linux box, or some of thecountless online resources or tutorials available on the Internet.Common configuration itemsWhen adding a rule, most of the configuration options in thefirewall’s parts are of the same type (e.g., the source or destinationinterfaces), since they are built with the same software,iptables. Therefore, in order to keep this section shortand readable, all the common configuration items are grouped andexplained. The next sections will contain only description of theoption that are peculiar to that part of the firewall.HintMultiple values can be supplied for any options: If there isa list of values to choose from, hold the CTRL key (GermanSTRG) and click on each value, otherwise, write one valueper line if there is a textbox.Source or Incoming IPUsually in
2025-03-25In the top box.GREEN: HTTP, HTTPS, FTP, SMTP, POP, IMAP, POP3s, IMAPs, DNS, ICMPORANGE: DNS, ICMPBLUE: HTTP, HTTPS, DNS, ICMPEverything else is forbidden by default except for the System ruleswhich allow access to the services in the Endian Network. The system rulesare defined even if the corresponding zones are not enabled.NoteAccess to Endian Network is not permitted to Community Editionappliances.Possible actions on each rule are to enable or disable it, to edit itor delete it. Additional rules can be added by clicking on theAdd a new firewall rule link at the top of thepage. Please remember that the order of rules is important: the firstmatching rule decides whether a packet is allowed or denied,regardless of how many matching rules follow. The order of the rulescan be changed by using the up and down arrow icons next to each rule.The following settings differ from the default common options.SourceIt can be one or more Zone/Interfaces, Network/IP, or MAC addresses.DestinationIt can be the RED zone, one or more uplinks, or one or morenetwork/host addresses accessible outside the RED interface.ApplicationThis search widget allows to select the applications that should bepart of the rule. Applications are dividend into categories (e.g.,Database, filesharing, and so on).HintEnter at least one letter to show all applications whosename starts with that letter.Outgoing Firewall SettingsIt is possible to disable or enable the whole outgoing firewall byclicking on the Enable Outgoing firewall switch. When disabled, alloutgoing traffic is allowed and no packet is filtered: This setting ishowever strongly discouraged and the recommendation is to keep theoutgoing firewall enabled.Log accepted outgoing connectionsTicking this checkbox causes all the accepted connections to theRED interface to be logged.Proxy and outgoing firewall.Whenever the proxy is activated for a given service (e.g., HTTP,POP, SMTP, DNS), the firewall rules in the outgoing firewall willtake no effect, because of the nature of the proxy.With the proxy activated, whenever a connection starts from aclient to the Internet, it will either be intercepted by the proxyon the Endian Hotspot Appliance (in transparent mode) or go directly tothe firewall, but never go through the firewall. The proxy thenstarts a new connection to the real destination, gets the data andsends it to the client. Those connections to the Internet alwaysstart from the Endian Hotspot Appliance, which hides the clients internalIP address. Therefore, such connections never go through theoutgoing firewall, since in fact they are local connections.Inter-Zone trafficThis module permits to set up rules that determine how traffic canflow between the local network zones, excluding therefore the RED zone(traffic through the RED zone can be filtered in Outgoing traffic andPort forwarding / NAT). To activate the inter-zone firewall, click on the greyswitch . Two boxes are present on this page, one that shows thecurrent rules and allow to add new ones, and one that allows to setthe inter-zone firewall options.NoteWhen the Endian Hotspot Appliance is configured in no uplink mode, allthe network traffic shall be filtered using the interzonefirewall. Also when in Stealth uplink mode with more than onezone defined, all the traffic not routed
2025-04-01Through the gateway isfiltered with the interzone firewall. See ref:the stealth uplinkdescription for more information.Current rulesThe Endian Hotspot Appliance comes with a simple set of pre-configured rules:traffic is allowed from the GREEN zone to any other zone (ORANGE andBLUE) and within each zone, with everything else forbidden bydefault.Analogously to the outgoing traffic firewall, rules can bedisabled/enabled, edited or deleted by clicking on the appropriateicon on the right side of the table. New rules can be added byclicking on the Add a new inter-zone firewall rule link atthe top of the page. Only the common options can beconfigured.Inter-Zone Firewall SettingsThe inter-zone firewall can be disabled or enabled by using theEnable Inter-Zone firewall switch. When disabled, all traffic isallowed among all the BLUE, GREEN, and ORANGE zones. Disabling theinter-zone firewall is strongly discouraged.Log accepted Inter-Zone connectionsTicking this checkbox causes all the accepted connections among thezones to be logged.VPN trafficThe VPN traffic firewall allows to add firewall rules applied to theusers and hosts that are connected via OpenVPN.The VPN traffic firewall is normally not active, which means that, onthe one side, the traffic can freely flow between the VPN clients andthe hosts in the GREEN zone, and on the other side, VPN hosts canaccess all the zones behind the Endian Hotspot Appliance.NoteVPN clients are not subject to the outgoing trafficfirewall or the Inter-Zone traffic firewall.Two boxes are present on this page, one that shows the current rulesand allow to add new ones, and one that allows to set the VPN firewalloptions.Current rulesBy default there is no rule defined, therefore to add rules, click onthe Add a new VPN firewall rule link at the top of thepage. Only the common options are available todefine the rules.VPN Firewall settingsThe VPN firewall can be disabled or enabled using the EnableVPN firewall switch.Log accepted VPN connectionsTicking this checkbox causes all the accepted connections from theVPN users to be logged.System accessThis section governs the rules that grant or deny access to theEndian Hotspot Appliance itself and to the services that run on it.There is a list of pre-configured rules that cannot be changed, whosepurpose is to guarantee the proper working of the services running onthe Endian Hotspot Appliance, that require to be accessed from clients that arelocated either in the local or remote zones.The list of the pre-defined rules is shown when clicking on theShow rules of system services button at the bottom of thepage.Examples of the system access rules include services that are alwaysactive, for example the DNS service to resolve hostnames (whichrequires that the port 53 be open), or the access to theadministration web interfaces (which uses port 10443). Moreover,whenever a services (e.g., OpenVPN, the Hotspot, SNMP server amongothers) is activated, one or more rules are automatically created toallow the proper efficiency of the service itself.More system access rules can be added by clicking on the Adda new system access rule link. The setting specific to this module ofthe firewall are:Log packetsAll packets that access or try to access the Endian Hotspot Appliance arelogged when this
2025-04-13