Installing Advanced Policy Firewall
APF is a modular, policy based iptables firewall system designed for ease of use and configuration. It employs a subset of features to satisfy the veteran Linux user and the novice alike. It is maintained by R-fx Networks.
i). Download and extract to /usr/local/downloads/ directory. Create it by executing the command Code: mkdir -p /usr/local/downloads/ cd /usr/local/downloads/ wget http://www.rfxnetworks.com/downloads/apf-current.tar.gz
ii). Extract and install it
cd /usr/local/downloads/ tar xvzf apf-current.tar.gz
rm -f apf-current.tar.gz cd apf* ./install.sh
You should see...
Installation Details: Install path: /etc/apf/ Config path: /etc/apf/conf.apf Executable path: /usr/local/sbin/apf AntiDos install path: /etc/apf/ad/ AntiDos config path: /etc/apf/ad/conf.antidos DShield Client Parser: /etc/apf/extras/dshield/
without any errors.
2. APF Configuration
/etc/apf is the configuration directory of APF and conf.apf is the main configuration file. So open up conf.apf in your favorite editor.
Scroll down till you see...
- Pico -> Ctrl+W and then keyword --> Invokes search for keyword
- Vi --> Esc and then /keyword --> Invokes search for keyword
- emacs --> Ctrl+s and then keyword --> Invokes search for keyword
Change it to read:
a) For a webmin server:
b) For a Cpanel server :
Common incoming TCP ports.
Change the line to read
iii) EGF="0" to EGF="1" # This filter outgoing connections also, I recommend it though it may cause issues rarely.
Common outgoing TCP ports
v) USE_DS="0" to USE_DS="1"
APF makes use of dshield (DS), this is a little like spam blocklists such as spews and lists the most commonly abused networks and those most often used in denial of service attacks and similar.
vi) USE_AD="0" to USE_AD="1"
The USE_AD="1" enables the Antidos Feature which is still in beta at the time of this writing. Readme says "Antidos is a log parsing script made for r-fx.org's APF (advanced policy firewall). It's purpose is too parse specific log formats for network attacks against a given system; then take certian actions. it is designed to be modular so it can be removed from APF and used in other environments."
You can now save the conf.apf and quit the editor. If you didn't change the value of USE_AD to 1, you can skip Step 3 and jump to Step 4.
i) Open up /etc/apf/ad/conf.antidos
ii) Change LP_KLOG="0" to LP_KLOG="1"
iii) CONAME="Your Company"
Enter your company name within quotes similar to CONAME="LunarPages"
iv) USR_ALERT="0" to USR_ALERT="1"
Change it to 1 only if you wish to receive email alerts.
Enter your email address here similar to the entry made in (iii) i.e in quotes
vi) Antidos is intended to operate via cron. This is a critical setup point as if not done, antidos will simply not operate.
Execute the command...
- /2 * * * * root /etc/apf/ad/antidos -a >> /dev/null 2>&1
This will run antidos every two minutes.
Starting the Firewall
i) Edit /etc/apf/allow_hosts.rules and enter your IP (not a mandatory step, but will avoid being locked out of the server)
ii) Start the firewall by executing the command
You should see...
Development mode enabled!; firewall will flush every 5 minutes.
Now try to access all the services, including mail, ssh, and websites.
iii) If you are able to access all the services, then open up /etc/apf/conf.apf, change the DEVM="1" to read DEVM="0"
and then restart the firewall by executing:
and you are done
iv) As a last step, please execute the command "chkconfig --list apf" and confirm whether you see a similar entry like
apf 0: off 1: off 2: off 3: on 4: on 5: on 6: off
You should see it, exactly similar to above, in case it is not like that, execute
chkconfig --level 345 apf on
Congratulations, you have successfully installed APF!
Usage /usr/local/sbin/apf [OPTION]
OPTIONS are as below
- -s|--start ......................... load firewall policies
- -r|--restart ....................... flush & load firewall
- -f|--flush|--stop .................. flush firewall
- -l|--list .......................... list chain rules
- -st|--status ....................... firewall status
- -a HOST CMT|--allow HOST COMMENT ... add host (IP/FQDN) to allow_hosts.rules and immediately load new rule into firewall
- -d HOST CMT|--deny HOST COMMENT .... add host (IP/FQDN) to deny_hosts.rules and immediately load new rule into firewall
As an example, if you would like to deny an IP from accessing your sites, execute,
apf -d 184.108.40.206
Want to read this in another language?