13.2. GNOME Lokkit

GNOME Lokkit allows you to configure firewall settings for an average user by constructing basic iptables networking rules. Instead of having to write the rules, this program asks you a series of questions about how you use your system and then writes it for you in the file /etc/sysconfig/iptables.

You should not try to use GNOME Lokkit to generate complex firewall rules. It is intended for average users who want to protect themselves while using a modem, cable, or DSL Internet connection. To configure specific firewall rules, refer to the Firewalling with iptables chapter in the Red Hat Linux Reference Guide.

To disable specific services and deny specific hosts and users, refer to Chapter 14 Controlling Access to Services.

To start the graphical version of GNOME Lokkit, select Main Menu Button => System Tools => More System Tools => Lokkit, or type the command gnome-lokkit at a shell prompt as root. If you do not have the X Window System installed or if you prefer a text-based program, type the command lokkit at a shell prompt to start the text-mode version.

13.2.1. Basic

Figure 13-2. Basic

After starting the program, choose the appropriate security level for your system:

13.2.2. Local Hosts

If there are Ethernet devices on the system, the Local Hosts page allows you to configure whether the firewall rules apply to connection requests sent to each device. If the device connects the system to a local area network behind a firewall and does not connect directly to the Internet, select Yes. If the Ethernet card connects the system to a cable or DSL modem, it is recommended that you select No.

Figure 13-3. Local Hosts

13.2.3. DHCP

If you are using DHCP to activate any Ethernet interfaces on the system, you must say Yes to the DHCP question. If you say no, you will not be able to establish a connect using the Ethernet interface. Many cable and DSL Internet providers require you to use DHCP to establish an Internet connection.

Figure 13-4. DHCP

13.2.4. Configuring Services

GNOME Lokkit also allows you to turn common services on and off. If you answer Yes to configuring services, you are prompted about the following services:

To disable other services that you do not need, use Services Configuration Tool (see Section 14.3 Services Configuration Tool) or ntsysv (see Section 14.4 ntsysv), or chkconfig (see Section 14.5 chkconfig).

13.2.5. Activating the Firewall

Clicking Finish will write the firewall rules to /etc/sysconfig/iptables and start the firewall by starting the iptables service.

WarningWarning
 

If you have a firewall configured or any firewall rules in the /etc/sysconfig/iptables file, the file will be deleted if you select Disable firewall and click Finish to save the changes.

It is highly recommended that you run GNOME Lokkit from the machine, not from a remote X session. If you disable remote access to your system, you will no longer be able to access it or disable the firewall rules.

Click Cancel if you do not want to write the firewall rules.

13.2.5.1. Mail Relay

A mail relay is a system that allows other systems to send email through it. If your system is a mail relay, someone can possibly use it to spam others from your machine.

If you chose to enable mail services, after you click Finish on the Activate the Firewall page, you will be prompted to check for mail relay. If you choose Yes to check for mail relay, GNOME Lokkit will attempt to connect to the Mail Abuse Prevention System website at http://www.mail-abuse.org/ and run a mail relay test program. The results of the test will be displayed when it is finished. If your system is open to mail relay, it is highly recommended that you configure Sendmail to prevent it.