mirror of
https://github.com/pi-hole/pi-hole.git
synced 2025-05-01 13:34:24 +02:00
Updated Pi hole OpenVPN server (markdown)
parent
78b1697f29
commit
e94f4af5d4
1 changed files with 10 additions and 2 deletions
|
@ -109,12 +109,16 @@ Then you can add an explicit rule that allows access from within the VPN
|
||||||
```
|
```
|
||||||
sudo iptables -A INPUT -i tun0 -p tcp --destination-port 53 -j ACCEPT
|
sudo iptables -A INPUT -i tun0 -p tcp --destination-port 53 -j ACCEPT
|
||||||
sudo iptables -A INPUT -i tun0 -p tcp --destination-port 80 -j ACCEPT
|
sudo iptables -A INPUT -i tun0 -p tcp --destination-port 80 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -i tun0 -p udp --destination-port 53 -j ACCEPT
|
||||||
|
sudo iptables -A INPUT -i tun0 -p udp --destination-port 80 -j ACCEPT
|
||||||
```
|
```
|
||||||
|
|
||||||
And another one that prevents access from everywhere else
|
And another one that prevents access from everywhere else
|
||||||
```
|
```
|
||||||
sudo iptables -A INPUT -p tcp --destination-port 53 -j DROP
|
sudo iptables -A INPUT -p tcp --destination-port 53 -j DROP
|
||||||
sudo iptables -A INPUT -p tcp --destination-port 80 -j DROP
|
sudo iptables -A INPUT -p tcp --destination-port 80 -j DROP
|
||||||
|
sudo iptables -A INPUT -p udp --destination-port 53 -j DROP
|
||||||
|
sudo iptables -A INPUT -p udp --destination-port 80 -j DROP
|
||||||
```
|
```
|
||||||
|
|
||||||
Your configuration should look like
|
Your configuration should look like
|
||||||
|
@ -125,8 +129,12 @@ num target prot opt source destination
|
||||||
2 ACCEPT udp -- anywhere anywhere udp dpt:domain
|
2 ACCEPT udp -- anywhere anywhere udp dpt:domain
|
||||||
<b>3 ACCEPT tcp -- anywhere anywhere tcp dpt:domain
|
<b>3 ACCEPT tcp -- anywhere anywhere tcp dpt:domain
|
||||||
4 ACCEPT tcp -- anywhere anywhere tcp dpt:http
|
4 ACCEPT tcp -- anywhere anywhere tcp dpt:http
|
||||||
5 DROP tcp -- anywhere anywhere tcp dpt:domain
|
5 ACCEPT udp -- anywhere anywhere tcp dpt:domain
|
||||||
6 DROP tcp -- anywhere anywhere tcp dpt:http</b>
|
6 ACCEPT udp -- anywhere anywhere tcp dpt:http
|
||||||
|
7 DROP tcp -- anywhere anywhere tcp dpt:domain
|
||||||
|
8 DROP tcp -- anywhere anywhere tcp dpt:http
|
||||||
|
9 DROP udp -- anywhere anywhere tcp dpt:domain
|
||||||
|
10 DROP udp -- anywhere anywhere tcp dpt:http</b>
|
||||||
|
|
||||||
Chain FORWARD (policy ACCEPT)
|
Chain FORWARD (policy ACCEPT)
|
||||||
num target prot opt source destination
|
num target prot opt source destination
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue