The System Firewall does NOT replace the EC2 Security Group for port restrictions! The Responsive Firewall supplements and works alongside the EC2 Security Group port management to provide a key layer of security that should not be forsaken. YOU ARE NOT REQUIRED TO ENABLE THE RESPONSIVE FIREWALL but we do recommend that all reasonable security measures be taken in an ever-evolving internet landscape.
The guide you are currently reading is to aid AWS FreePBX customers with parameters that may be specific to these deployments. The complete Firewall documentation from Sangoma can be found here: https://sangomakb.atlassian.net/wiki/spaces/PG/pages/26181896/Responsive+Firewall
After clicking No, you'll be taken back to the main Settings page. Use the rest of this guide to configure the remainder of the Firewall sections. THIS IS NOT OPTIONAL!
On this tab, you will want to ensure all Protocols (SIP Protocol, IAX, etc) in the first section are set to Enabled. You'll likely want to leave Fail2Ban Bypass set to Disabled, unless you want to weaken security a little by setting a trust for entire subnets when a single user properly authenticates.
You do NOT need to expand or alter the Responsive Firewall Threshold Parameters section.
On this tab, you need to properly configure the Zones for any network interfaces. By default, you'll only have one Interface, which is the main virtual Ethernet adapter of your Instance. It will be identified as “eth0” but you may also have additional interfaces for things like the OpenVPN support (tun0) if you have enabled it.
eth0 MUST be set to Internet (Default Firewall) zone because this is the interface that connects you to the public internet.
If you are concerned about other systems on your AWS VPC being able to connect to your AWS FreePBX instance, fear not, as we will be covering this on the Networks tab next
Here you will specify your known networks and set how each will be treated by the Firewall. The + adds additional entry slots to the list.
You should specify the following types of IPs/CIDRs here:
Trusted (Excluded from Firewall)Local (Local trusted traffic)Local (Local trusted traffic)Trusted (Excluded from Firewall)
In the rare event that you happen to lock yourself out by way of the Responsive Firewall (you misconfigure the Interfaces, etc), you have two options for regaining access:
NOTE: You MUST have enabled the EC2 Serial Console via SSH BEFORE this incident to use this option Read this for information on enabling EC2 Serial Console: https://app.flashissue.com/newsletters/cfe0edabb537f3f3fde6fe2701fe03025ffa112a
fwconsole firewall stop to temporarily stop the service and flush the iptables, allowing normal access to the instance until a reboot or the service is started again. At this point, you should use the GUI to fix your misconfiguration.Actions > RebootActions > Reboot again