Inspired by this comment to try to learn what I’m missing.

  • Cloudflare proxy
  • Reverse Proxy
  • Fail2ban
  • Docker containers on their own networks

Another concern I have is does it need to be on a separate machine on a vlan from the rest of the network or is that too much?

  • gamer@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 day ago

    ez pz:

    #!/usr/sbin/nft -f
    table inet filter {
        chain input {
            type filter hook input priority raw; policy accept;
            iif "lo" accept
            ct state established,related accept
            iif "enp1s0" udp dport 51820 accept
            iif "enp1s0" drop
        }
    
        chain forward {
            type filter hook forward priority raw; policy accept;
            iif "lo" accept
            ct state established,related accept
            iif "enp1s0" udp dport 51820 accept
            iif "enp1s0" drop
        }
    
        chain output {
            type filter hook output priority raw; policy accept;
        }
    }
    
    • irmadlad@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      24 hours ago

      I’ve seen it done as such:

      sudo ufw deny out 1:19/tcp sudo ufw deny out 1:19/udp sudo ufw deny out 22:52/tcp sudo ufw deny out 22:52/udp sudo ufw deny out 54:79/tcp sudo ufw deny out 54:79/udp sudo ufw deny out 81:122/tcp sudo ufw deny out 81:122/udp sudo ufw deny out 124:442/tcp sudo ufw deny out 124:442/udp sudo ufw deny out 444:65535/tcp sudo ufw deny out 444:65535/udp

      But your way seems a bit more elegant