The Firewall in SoftNAS helps you to control the incoming and outgoing network traffic in VPN.
Typically, storage servers are deployed within an internal, secure network (often on their own VLAN on a protected network segment, perhaps even with dedicated switches). While SoftNAS can be deployed in this, or any other appropriate configuration, it's most common that some other firewall(s) protect the perimeter of the enterprise (from the Internet) and the data center (from the intranet). Use appropriate judgment as to whether or not to employ the Linux firewall, in addition to other security measures in the environment.
If you enable the firewall, be sure to open up the appropriate set of ports for SSH, HTTP. HTTPS, NFS/bind, iSCSI, CIFS, etc.
Configuring Initial Settings for Linux IPTables Firewall
You can let the Webmin to setup IPtables to be stored as file. In order to do so, you need to provide the initial settings.
1. Navigate to Settings -> Firewall.
The Linux Firewall page will be displayed.
2. Select any of the required options for firewall setting. The available options include
Allow all traffic
Do network address translation on external interface
Block all incoming connections on external interface
Block all except SSH and IDENT on external interface
Block all except SSH, IDENT, ping and high ports on interface
Block all except ports used for virtual hosting, on interface
3. Click the Setup Firewall button.
The Linux Firewall Rules page for Iptables will be displayed based on your initial settings.
4. Select what IPtable should be showing from the drop down list. The available options include Packet Filtering (Filter), Packet Alteration (Mangle) and Network Address Translation (NAT).
5. Specify the default action to the incoming packets (INPUT) - Only applies to packets addressed to this host from the drop down list. The available options are Accept, Drop, Userspace and Exit Chain.
6. Specify the default action to the forwarded packets (FORWARD) - Only applies to packets passed through this host. The available options are Accept, Drop, Userspace and Exit Chain.
7. Specify the default action to the outgoing packets (OUTPUT) - Only applies to packets originated by this host. There are no rules defined for this chain. The available options are Accept, Drop, Userspace and Exit Chain.
8. Click the Apply Configuration button to make the changes made to the firewall configuration active. Any firewall rules currently in effect will be flushed and replaced.