updated nftables state
This commit is contained in:
parent
d9ddc5dd11
commit
a8ef3a46cb
@ -13,11 +13,13 @@ add rule ip filter INPUT iifname lo counter accept
|
|||||||
add rule ip filter INPUT iifname tun* counter accept
|
add rule ip filter INPUT iifname tun* counter accept
|
||||||
add rule ip filter INPUT ct state related,established counter accept
|
add rule ip filter INPUT ct state related,established counter accept
|
||||||
add rule ip filter INPUT ip protocol icmp counter accept
|
add rule ip filter INPUT ip protocol icmp counter accept
|
||||||
{%- for key, value in net.ipv4_networks.items() %}
|
{%- for network in net.ip_networks %}
|
||||||
add rule ip filter INPUT ip saddr {{ value.ip }}/{{ value.mask }} ct state established,new counter accept
|
{%- if '.' in network %}
|
||||||
|
add rule ip filter INPUT ip saddr {{ network }} ct state established,new counter accept
|
||||||
|
{%- endif %}
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
{%- for key, value in net.public_ports.items() %}
|
{%- for port in net.public_ports %}
|
||||||
add rule ip filter INPUT {{ value.proto }} dport {{ value.port }} ct state established,new counter accept
|
add rule ip filter INPUT {{ port.split('/')[0] }} dport {{ port.split('/')[1] }} ct state established,new counter accept
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
{%- if nftables.log %}
|
{%- if nftables.log %}
|
||||||
add rule ip filter INPUT counter log
|
add rule ip filter INPUT counter log
|
||||||
@ -33,8 +35,8 @@ add chain ip nat POSTROUTING { type nat hook postrouting priority srcnat; policy
|
|||||||
add chain ip nat DOCKER
|
add chain ip nat DOCKER
|
||||||
|
|
||||||
### Main NAT rules
|
### Main NAT rules
|
||||||
{%- for key, value in net.nats.items() %}
|
{%- for network in net.nats %}
|
||||||
add rule ip nat POSTROUTING ip saddr {{ value.ip }}/{{ value.mask }} counter masquerade
|
add rule ip nat POSTROUTING ip saddr {{ network }} counter masquerade
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
|
|
||||||
### Docker related rules
|
### Docker related rules
|
||||||
@ -55,11 +57,13 @@ add rule ip6 filter6 INPUT iifname lo counter accept
|
|||||||
add rule ip6 filter6 INPUT iifname tun* counter accept
|
add rule ip6 filter6 INPUT iifname tun* counter accept
|
||||||
add rule ip6 filter6 INPUT ct state related,established counter accept
|
add rule ip6 filter6 INPUT ct state related,established counter accept
|
||||||
add rule ip6 filter6 INPUT icmpv6 type {destination-unreachable, packet-too-big, time-exceeded, echo-request, echo-reply, mld-listener-query, mld-listener-report, mld-listener-reduction, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, nd-redirect, parameter-problem, router-renumbering} accept
|
add rule ip6 filter6 INPUT icmpv6 type {destination-unreachable, packet-too-big, time-exceeded, echo-request, echo-reply, mld-listener-query, mld-listener-report, mld-listener-reduction, nd-router-solicit, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, nd-redirect, parameter-problem, router-renumbering} accept
|
||||||
{%- for key, value in net.ipv6_networks.items() %}
|
{%- for network in net.ip_networks %}
|
||||||
add rule ip6 filter6 INPUT ip6 saddr {{ value.ip }}/{{ value.mask }} ct state established,new counter accept
|
{%- if ':' in network %}
|
||||||
|
add rule ip6 filter6 INPUT ip6 saddr {{ network }} ct state established,new counter accept
|
||||||
|
{%- endif %}
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
{%- for key, value in net.public_ports.items() %}
|
{%- for port in net.public_ports %}
|
||||||
add rule ip6 filter6 INPUT {{ value.proto }} dport {{ value.port }} ct state established,new counter accept
|
add rule ip6 filter6 INPUT {{ port.split('/')[0] }} dport {{ port.split('/')[1] }} ct state established,new counter accept
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
{%- if nftables.log %}
|
{%- if nftables.log %}
|
||||||
add rule ip6 filter6 INPUT counter log
|
add rule ip6 filter6 INPUT counter log
|
||||||
|
Loading…
Reference in New Issue
Block a user