mirror of
https://github.com/pi-hole/pi-hole
synced 2025-02-28 08:22:35 +00:00
Updated Pi hole OpenVPN server (markdown)
parent
9c46b2c747
commit
eca225ab89
@ -71,4 +71,55 @@ Your whole network traffic will now securely be transferred to your Pi-hole.
|
||||

|
||||
|
||||
---
|
||||
(Optional) If your server is visible to the world, you might want prevent port 80 from being accessible from the outside. You will still be able to connect to your Pi-hole from within the VPN.
|
||||
(Optional) If your server is visible to the world, you might want prevent port 80 from being accessible from the outside. You will still be able to connect to your Pi-hole from within the VPN.
|
||||
|
||||
Using `iptables`: First, verify that there is no rule that explicitly accepts `http` requests
|
||||
```
|
||||
sudo iptables -L --line-numbers
|
||||
```
|
||||
|
||||
If you get something like
|
||||
<pre>
|
||||
Chain INPUT (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
<b>1 ACCEPT tcp -- anywhere anywhere tcp dpt:http</b>
|
||||
2 ACCEPT tcp -- anywhere anywhere tcp dpt:domain
|
||||
3 ACCEPT udp -- anywhere anywhere udp dpt:domain
|
||||
|
||||
Chain FORWARD (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
|
||||
Chain OUTPUT (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
</pre>
|
||||
you have to first explicitly delete the first INPUT rule using:
|
||||
```
|
||||
sudo iptables -D INPUT 1
|
||||
```
|
||||
|
||||
Then you can add an explicit rule that allows `http` access from within the VPN
|
||||
```
|
||||
sudo iptables -A INPUT -i tun0 -p tcp --destination-port 80 -j ACCEPT
|
||||
```
|
||||
|
||||
And another one that prevents accessing the `http` port from everywhere else
|
||||
```
|
||||
sudo iptables -A INPUT -p tcp --destination-port 80 -j DROP
|
||||
```
|
||||
|
||||
Your configuration should look like
|
||||
<pre>
|
||||
Chain INPUT (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
1 ACCEPT tcp -- anywhere anywhere tcp dpt:domain
|
||||
2 ACCEPT udp -- anywhere anywhere udp dpt:domain
|
||||
<b>3 ACCEPT tcp -- anywhere anywhere tcp dpt:http
|
||||
4 DROP tcp -- anywhere anywhere tcp dpt:http</b>
|
||||
|
||||
Chain FORWARD (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
|
||||
Chain OUTPUT (policy ACCEPT)
|
||||
num target prot opt source destination
|
||||
</pre>
|
||||
while there might be other rules in your table. Note that the order of the list entries matters!
|
Loading…
Reference in New Issue
Block a user