How to disable LAN but enable WAN

How do credit card companies know what type of business I'm paying for?

How can this shape perfectly cover a cube?

How can a flywheel makes engine runs smoothly?

New Site Design!

How do I gain the trust of other PCs?

Why are British voters more likely to back the main parties in general elections than in European Parliament elections?

Is my research statement supposed to lead to papers in top journals?

Can you cover a cube with copies of this shape?

How to write a nice frame challenge?

XML Query Question

What is the context for Napoleon's quote "[the Austrians] did not know the value of five minutes"?

Why can't I craft scaffolding in Minecraft 1.14?

How do I run a script as sudo at boot time on Ubuntu 18.04 Server?

How did Avada Kedavra get its name?

Why is gun control associated with the socially liberal Democratic party?

On George Box, Galit Shmueli and the scientific method?

Have Steve Rogers (Captain America) and a young Erik Lehnsherr (Magneto) interacted during WWII?

How to ask if I can mow my neighbor's lawn

High-end PC graphics circa 1990?

How to comprehend this notation?

Should I email my professor to clear up a (possibly very irrelevant) awkward misunderstanding?

Are their examples of rowers who also fought?

Will users know a CardView is clickable?

Fill the maze with a wall-following Snake until it gets stuck



How to disable LAN but enable WAN







.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















Why do I need that



I have a server on a large company network running new version of jenkins. I've migrated all the jobs (>600) over to a new server. Those jobs connect to different servers across our network. After starting jenkins some jobs will run overriding artifacts, pushing docker images to internal registries and so on. To prevent that without going into all 600 jobs and disabling then, I wish to disable local network access from the server. The network admins said that they don't want to mess with the firewall rules in fear they'll disable access to some important servers. So its on me to implement on the server side using iptables.



What do I need



What do I wish to do is to disable LAN access except one ip, and enable internet access. In more detail it goes like this.



Allow access to the server for ssh on port 22 and jenkins on port 8080 (I'm located on a different subnet than the server)



Allow access to the internet for plugin install and external build dependencies.



Drop anything going from the server to the local network 10.0.0.0/8. The server is located on 10.x.x.x/24 and it has access to different subnets over the router on 10.x.x.1



What have I tried



Final try before giving up. Didn't do anything.



#my ip 
iptables -j ACCEPT -s 10.x.x.x -i ens160 -A IN_public
iptables -j ACCEPT -d 10.x.x.x -o ens160 -A OUTPUT_direct

#subnet
iptables -j DROP -d 10.0.0.0/8 -o ens160 -A OUTPUT_direct









share|improve this question




























    0















    Why do I need that



    I have a server on a large company network running new version of jenkins. I've migrated all the jobs (>600) over to a new server. Those jobs connect to different servers across our network. After starting jenkins some jobs will run overriding artifacts, pushing docker images to internal registries and so on. To prevent that without going into all 600 jobs and disabling then, I wish to disable local network access from the server. The network admins said that they don't want to mess with the firewall rules in fear they'll disable access to some important servers. So its on me to implement on the server side using iptables.



    What do I need



    What do I wish to do is to disable LAN access except one ip, and enable internet access. In more detail it goes like this.



    Allow access to the server for ssh on port 22 and jenkins on port 8080 (I'm located on a different subnet than the server)



    Allow access to the internet for plugin install and external build dependencies.



    Drop anything going from the server to the local network 10.0.0.0/8. The server is located on 10.x.x.x/24 and it has access to different subnets over the router on 10.x.x.1



    What have I tried



    Final try before giving up. Didn't do anything.



    #my ip 
    iptables -j ACCEPT -s 10.x.x.x -i ens160 -A IN_public
    iptables -j ACCEPT -d 10.x.x.x -o ens160 -A OUTPUT_direct

    #subnet
    iptables -j DROP -d 10.0.0.0/8 -o ens160 -A OUTPUT_direct









    share|improve this question
























      0












      0








      0








      Why do I need that



      I have a server on a large company network running new version of jenkins. I've migrated all the jobs (>600) over to a new server. Those jobs connect to different servers across our network. After starting jenkins some jobs will run overriding artifacts, pushing docker images to internal registries and so on. To prevent that without going into all 600 jobs and disabling then, I wish to disable local network access from the server. The network admins said that they don't want to mess with the firewall rules in fear they'll disable access to some important servers. So its on me to implement on the server side using iptables.



      What do I need



      What do I wish to do is to disable LAN access except one ip, and enable internet access. In more detail it goes like this.



      Allow access to the server for ssh on port 22 and jenkins on port 8080 (I'm located on a different subnet than the server)



      Allow access to the internet for plugin install and external build dependencies.



      Drop anything going from the server to the local network 10.0.0.0/8. The server is located on 10.x.x.x/24 and it has access to different subnets over the router on 10.x.x.1



      What have I tried



      Final try before giving up. Didn't do anything.



      #my ip 
      iptables -j ACCEPT -s 10.x.x.x -i ens160 -A IN_public
      iptables -j ACCEPT -d 10.x.x.x -o ens160 -A OUTPUT_direct

      #subnet
      iptables -j DROP -d 10.0.0.0/8 -o ens160 -A OUTPUT_direct









      share|improve this question














      Why do I need that



      I have a server on a large company network running new version of jenkins. I've migrated all the jobs (>600) over to a new server. Those jobs connect to different servers across our network. After starting jenkins some jobs will run overriding artifacts, pushing docker images to internal registries and so on. To prevent that without going into all 600 jobs and disabling then, I wish to disable local network access from the server. The network admins said that they don't want to mess with the firewall rules in fear they'll disable access to some important servers. So its on me to implement on the server side using iptables.



      What do I need



      What do I wish to do is to disable LAN access except one ip, and enable internet access. In more detail it goes like this.



      Allow access to the server for ssh on port 22 and jenkins on port 8080 (I'm located on a different subnet than the server)



      Allow access to the internet for plugin install and external build dependencies.



      Drop anything going from the server to the local network 10.0.0.0/8. The server is located on 10.x.x.x/24 and it has access to different subnets over the router on 10.x.x.1



      What have I tried



      Final try before giving up. Didn't do anything.



      #my ip 
      iptables -j ACCEPT -s 10.x.x.x -i ens160 -A IN_public
      iptables -j ACCEPT -d 10.x.x.x -o ens160 -A OUTPUT_direct

      #subnet
      iptables -j DROP -d 10.0.0.0/8 -o ens160 -A OUTPUT_direct






      iptables






      share|improve this question













      share|improve this question











      share|improve this question




      share|improve this question










      asked May 31 at 9:25









      CodeBreakerCodeBreaker

      274




      274




















          1 Answer
          1






          active

          oldest

          votes


















          3














          Some important notes before I'll provide the ruleset:




          • Avoid the modification firewall by scripts. Best flow:



            1. Save the current rule set with command iptables-save > fwrules.v4

            2. Edit the rules

            3. Test the rules with command iptables-restore -t fwrules.v4

            4. Safety apply the rules with command iptables-apply -t <timeout> fwrules.v4. Where <timeout> is timeout of confirmation in seconds. If you don't confirm the new rule set, it will rollback to the previous set.


          • I guess the server has single network interface.


          • Rule set itself:

          *filter
          :INPUT DROP [0:0]
          :FORWARD DROP [0:0]
          :OUTPUT ACCEPT [0:0]

          # allow reply packets
          -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

          # allow incoming ICMP like ping and other
          -A INPUT -p icmp -j ACCEPT

          # allow to ssh and to jenkins from anywhere
          -A INPUT -m conntrack --ctstate NEW -p tcp -m multiport --dports 22,8080 -j ACCEPT

          # allow localhost connections
          -A INPUT -i lo -j ACCEPT

          # allow output packets to trust host
          -A OUTPUT --dst 10.0.0.12 -j ACCEPT

          # block output packets to other lan hosts
          -A OUTPUT --dst 10.0.0.0/8 -j REJECT

          COMMIT


          • What's about DNS servers addresses? You should allow it too if they are in the local subnet.

          • The order of rules is very important.





          share|improve this answer























          • That did the trick. Now I have a better understanding of iptables. Thank you!

            – CodeBreaker
            May 31 at 12:41











          Your Answer








          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "2"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          autoActivateHeartbeat: false,
          convertImagesToLinks: true,
          noModals: true,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: 10,
          bindNavPrevention: true,
          postfix: "",
          imageUploader:
          brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
          contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
          allowUrls: true
          ,
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













          draft saved

          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f969623%2fhow-to-disable-lan-but-enable-wan%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown

























          1 Answer
          1






          active

          oldest

          votes








          1 Answer
          1






          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes









          3














          Some important notes before I'll provide the ruleset:




          • Avoid the modification firewall by scripts. Best flow:



            1. Save the current rule set with command iptables-save > fwrules.v4

            2. Edit the rules

            3. Test the rules with command iptables-restore -t fwrules.v4

            4. Safety apply the rules with command iptables-apply -t <timeout> fwrules.v4. Where <timeout> is timeout of confirmation in seconds. If you don't confirm the new rule set, it will rollback to the previous set.


          • I guess the server has single network interface.


          • Rule set itself:

          *filter
          :INPUT DROP [0:0]
          :FORWARD DROP [0:0]
          :OUTPUT ACCEPT [0:0]

          # allow reply packets
          -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

          # allow incoming ICMP like ping and other
          -A INPUT -p icmp -j ACCEPT

          # allow to ssh and to jenkins from anywhere
          -A INPUT -m conntrack --ctstate NEW -p tcp -m multiport --dports 22,8080 -j ACCEPT

          # allow localhost connections
          -A INPUT -i lo -j ACCEPT

          # allow output packets to trust host
          -A OUTPUT --dst 10.0.0.12 -j ACCEPT

          # block output packets to other lan hosts
          -A OUTPUT --dst 10.0.0.0/8 -j REJECT

          COMMIT


          • What's about DNS servers addresses? You should allow it too if they are in the local subnet.

          • The order of rules is very important.





          share|improve this answer























          • That did the trick. Now I have a better understanding of iptables. Thank you!

            – CodeBreaker
            May 31 at 12:41















          3














          Some important notes before I'll provide the ruleset:




          • Avoid the modification firewall by scripts. Best flow:



            1. Save the current rule set with command iptables-save > fwrules.v4

            2. Edit the rules

            3. Test the rules with command iptables-restore -t fwrules.v4

            4. Safety apply the rules with command iptables-apply -t <timeout> fwrules.v4. Where <timeout> is timeout of confirmation in seconds. If you don't confirm the new rule set, it will rollback to the previous set.


          • I guess the server has single network interface.


          • Rule set itself:

          *filter
          :INPUT DROP [0:0]
          :FORWARD DROP [0:0]
          :OUTPUT ACCEPT [0:0]

          # allow reply packets
          -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

          # allow incoming ICMP like ping and other
          -A INPUT -p icmp -j ACCEPT

          # allow to ssh and to jenkins from anywhere
          -A INPUT -m conntrack --ctstate NEW -p tcp -m multiport --dports 22,8080 -j ACCEPT

          # allow localhost connections
          -A INPUT -i lo -j ACCEPT

          # allow output packets to trust host
          -A OUTPUT --dst 10.0.0.12 -j ACCEPT

          # block output packets to other lan hosts
          -A OUTPUT --dst 10.0.0.0/8 -j REJECT

          COMMIT


          • What's about DNS servers addresses? You should allow it too if they are in the local subnet.

          • The order of rules is very important.





          share|improve this answer























          • That did the trick. Now I have a better understanding of iptables. Thank you!

            – CodeBreaker
            May 31 at 12:41













          3












          3








          3







          Some important notes before I'll provide the ruleset:




          • Avoid the modification firewall by scripts. Best flow:



            1. Save the current rule set with command iptables-save > fwrules.v4

            2. Edit the rules

            3. Test the rules with command iptables-restore -t fwrules.v4

            4. Safety apply the rules with command iptables-apply -t <timeout> fwrules.v4. Where <timeout> is timeout of confirmation in seconds. If you don't confirm the new rule set, it will rollback to the previous set.


          • I guess the server has single network interface.


          • Rule set itself:

          *filter
          :INPUT DROP [0:0]
          :FORWARD DROP [0:0]
          :OUTPUT ACCEPT [0:0]

          # allow reply packets
          -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

          # allow incoming ICMP like ping and other
          -A INPUT -p icmp -j ACCEPT

          # allow to ssh and to jenkins from anywhere
          -A INPUT -m conntrack --ctstate NEW -p tcp -m multiport --dports 22,8080 -j ACCEPT

          # allow localhost connections
          -A INPUT -i lo -j ACCEPT

          # allow output packets to trust host
          -A OUTPUT --dst 10.0.0.12 -j ACCEPT

          # block output packets to other lan hosts
          -A OUTPUT --dst 10.0.0.0/8 -j REJECT

          COMMIT


          • What's about DNS servers addresses? You should allow it too if they are in the local subnet.

          • The order of rules is very important.





          share|improve this answer













          Some important notes before I'll provide the ruleset:




          • Avoid the modification firewall by scripts. Best flow:



            1. Save the current rule set with command iptables-save > fwrules.v4

            2. Edit the rules

            3. Test the rules with command iptables-restore -t fwrules.v4

            4. Safety apply the rules with command iptables-apply -t <timeout> fwrules.v4. Where <timeout> is timeout of confirmation in seconds. If you don't confirm the new rule set, it will rollback to the previous set.


          • I guess the server has single network interface.


          • Rule set itself:

          *filter
          :INPUT DROP [0:0]
          :FORWARD DROP [0:0]
          :OUTPUT ACCEPT [0:0]

          # allow reply packets
          -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

          # allow incoming ICMP like ping and other
          -A INPUT -p icmp -j ACCEPT

          # allow to ssh and to jenkins from anywhere
          -A INPUT -m conntrack --ctstate NEW -p tcp -m multiport --dports 22,8080 -j ACCEPT

          # allow localhost connections
          -A INPUT -i lo -j ACCEPT

          # allow output packets to trust host
          -A OUTPUT --dst 10.0.0.12 -j ACCEPT

          # block output packets to other lan hosts
          -A OUTPUT --dst 10.0.0.0/8 -j REJECT

          COMMIT


          • What's about DNS servers addresses? You should allow it too if they are in the local subnet.

          • The order of rules is very important.






          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered May 31 at 10:19









          Anton DanilovAnton Danilov

          1,6531712




          1,6531712












          • That did the trick. Now I have a better understanding of iptables. Thank you!

            – CodeBreaker
            May 31 at 12:41

















          • That did the trick. Now I have a better understanding of iptables. Thank you!

            – CodeBreaker
            May 31 at 12:41
















          That did the trick. Now I have a better understanding of iptables. Thank you!

          – CodeBreaker
          May 31 at 12:41





          That did the trick. Now I have a better understanding of iptables. Thank you!

          – CodeBreaker
          May 31 at 12:41

















          draft saved

          draft discarded
















































          Thanks for contributing an answer to Server Fault!


          • Please be sure to answer the question. Provide details and share your research!

          But avoid


          • Asking for help, clarification, or responding to other answers.

          • Making statements based on opinion; back them up with references or personal experience.

          To learn more, see our tips on writing great answers.




          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f969623%2fhow-to-disable-lan-but-enable-wan%23new-answer', 'question_page');

          );

          Post as a guest















          Required, but never shown





















































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown

































          Required, but never shown














          Required, but never shown












          Required, but never shown







          Required, but never shown







          Popular posts from this blog

          Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

          Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

          Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020