Skip to content

Jadhusan24/Python-Firewall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

86 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Python firewall

Python based Packet Filtering Firewall Application.

Packet filtering is a firewall technique used to control network access by monitoring outgoing and incoming packets and allowing them to pass or halt based on the source and destination Internet Protocol (IP) addresses, protocols and ports

Linkedin

Firewall rules

Firewalls are configured using simple if then rules. In a packet filtering firewall, a rule says: if a pattern based on packet source, destination, protocol, or service is a match THEN take the specified action. Since there are many rules involved, the order of the rules matters. A LOT!

Traffic is verified against a rules table in order, top to bottom. Therefore, you must be careful as to how you define your rules and in which order should you place them. Its best to begin very strict and lay off as you go down the table.

Rule Syntax

NOTE : By default all the traffic Denied!. Empty File makes DEFAULT DENY TRAFFIC.

To ALLOW
ALLOW <SRC_IP> <SRC_PORT> <DST_IP> <DST_PORT>
command : allow, 192.168.1.100, 0, 192.168.2.100, 0
To DENY
DENY <SRC_IP> <SRC_PORT> <DST_IP> <DST_PORT>
command : deny, 192.168.1.100, 0, 192.168.2.100, 0

Deny packet Based on Source 192.168.1.100:0 to Destination 192.168.2.100:0

Rule File

We'll use a CSV file as our rules table.

Example rule table

Firewall Log

The logging feature documents how the firewall deals with traffic types. All the logs will be saved in a Log file

Allow Traffic Logs

Traffic Logs

Deny Traffic Logs

Error Logs

How this firewall works?

Basically, This firewall auto detects the interfaces which has attached and then listen to each and every interfaces using the threading module. Interfaces are running on threads to receive and send traffic simultaneously.

EXAMPLE

Machines used for testing : UBUNTU 20.10 - THE FIREWALL LISTEING IN INTERFACES

Interfaces Ip Address
1 192.168.1.0/24
2 192.168.2.0/24
3 192.168.3.0/24
4 192.168.4.0/24
Interface 1 CENTOS CORE - 192.168.1.100 Static Ip
Interface 2 CENTOS CORE - 192.168.2.100 Static Ip
Interface 3 CENTOS CORE - 192.168.3.100 Static Ip
Interface 4 CENTOS CORE - 192.168.4.100 Static Ip

I used UBUNTU 20.10 has my firewall and added 4 interfaces.The 4 interfaces are running on CENT OS LINUX with specified ip addresses.

If i ping from 192.168.1.100 to 192.168.2.100
The 192.168.1.100 sends a packet from interface 1 and the firewall(ubuntu) will unpack the ip header and check for the destination ip address and forward it to the specific Interface. I have disabled the default ip forwarding in my UBUNTU MACHINE using 'sysctl -w net.all.forwarding = 0'. Furthermore, I tested by blocking the ip address from interface 1 (ip address) to interface 2 (ip address) icmp ping traffic and it successfully Denied.

Concept
Concept

How to run?

  1. Runing the script is simple, you must have root privelages. Run the main.py file to begin the firewall.
  2. Requirements to run this Firewall.

       - Python 3.9.2
       - Ubuntu 20.10 Virtual Machine.        - Extra Virtual Machines for testing.        - Four Interfaces with IP configured.
3. Dependencies.

       - pip3 install psutil
       - pip3 install csv
       - pip3 install threading
       - pip3 install logging
       - pip3 install datetime

Releases

No releases published

Packages

No packages published

Languages