Linux Firewall feature

I am using frequently Terminal to ban IP's. To see these adds/removes/changes in Webmin I have to save IPTables to /etc/iptables.rules.up. After doing this Webmin is able seeing all those rules.

I can modify this Module, using [Update cluster server] set to "Whenever a change is made", but I will loose all buttons from the bottom page. My request is great for saving the current IPTables on disk and using it inside Webmin: it will be great to have a button down there for saving IPTables to /etc/iptables.rules.up and loading its content. All in one click. Then I can make changes easy and Apply the new configuration.

Suggestion for button label: Save Configuration, or Save Current Configuration. The first one will fit as size with the other buttons.

Thank you.

Status: 
Closed (fixed)

Comments

So in Webmin, are you editing the live rules, or those that are saved in iptables.rules.up ?

Webmin is editing those saved in iptables.rules.up as I know. Let me give you more details related to this request.

I am adding many rules in Terminal window. If I go to Webmin, I will get always the rules based on /etc/iptables.rules.up. If I am planning editing them with Webmin, I must get the current iptables. I will go to Terminal and save the iptables to /etc/iptables.rules.up. Refreshing the page in Webmin will show the real content of IPTables. From now I can Apply new configurations.

I can modify this Module, using [Update cluster server] set to "Whenever a change is made", but I will loose all buttons from the bottom page. This button helps me to get Iptables inside a file, like a backup.

Webmin is editing those saved in iptables.rules.up as I know. Let me give you more details related to this request.

I am adding many rules in Terminal window. If I go to Webmin, I will get always the rules based on /etc/iptables.rules.up. If I am planning editing them with Webmin, I must get the current iptables. I will go to Terminal and save the iptables to /etc/iptables.rules.up. Refreshing the page in Webmin will show the real content of IPTables. From now I can Apply new configurations.

I can modify this Module, using [Update cluster server] set to "Whenever a change is made", but I will loose all buttons from the bottom page. This button helps me to get Iptables inside a file, like a backup.

Why not instead edit iptables.rules.up from the terminal, and then apply the file either from the terminal or in Webmin?

As I requested my intention was skipping the Terminal step. That button will update /etc/iptables.rules.up file content with the version running. Then Webmin will load the file content. All in one click.

Sorry, but I don't get what you mean by using the Terminal to ban IPs exactly?

I am using an SSH connection to watch my server. From time to time I am banning IPs using iptables command.

To see these rules added in Terminal in Webmin interface I have to use iptables-save > /etc/iptables.up.rules. That button I requested will do this inside Webmin, just saving current iptables to file then loading it into Webmin. This skips Terminal command.

It is just a reverse for Apply Configuration button.

Ok, I see now - this will be available in the next Webmin release.

Many thanks for understanding. Such of small improvements will do our life much better.

Once again thank you for this wonderful piece of software and for your dedicated work.

Just a suggestion. Have u ever tried the free CSF firewall module for Webmin/Virtualmin. We're happy users of CSF. It provides a very nice web interface control panel and convenient simplification to the standard linux iptables firewall. Full features are in the web browser, including banning IP from inside Webmin/Virtualmin, as you're requesting here. Easy module to install, u should give it a try.

Thank you very much for your suggestion. I will give it a try. I know CFS but I did not use it yet. I am one who likes old school, black background and white letters :)

Could you please suggest me a module for webmin in order to monitor connections? Seeing who is connected, for how long. It will be great doing this in real time in browser. Someone pointed me to Nagios.

Automatically closed -- issue fixed for 2 weeks with no activity.