updated nftables state
This commit is contained in:
parent
59faf0aea9
commit
a96333a4d1
@ -4,17 +4,6 @@ nftables-config-dir:
|
||||
file.directory:
|
||||
- name: {{ nftables.config_dir }}
|
||||
|
||||
nftables-blacklist-config:
|
||||
file.managed:
|
||||
- name: {{ nftables.config_dir }}/blacklist.nft
|
||||
- source: salt://nftables/templates/blacklist.nft.j2
|
||||
- template: jinja
|
||||
- watch_in:
|
||||
- service: nftables-service
|
||||
- require:
|
||||
- pkg: nftables-pkg
|
||||
- file: nftables-config-dir
|
||||
|
||||
nftables-rules-config:
|
||||
file.managed:
|
||||
- name: {{ nftables.config_dir }}/rules.nft
|
||||
|
@ -13,7 +13,6 @@ add rule ip filter INPUT iifname lo counter accept
|
||||
add rule ip filter INPUT iifname tun* counter accept
|
||||
add rule ip filter INPUT ct state related,established counter accept
|
||||
add rule ip filter INPUT ip protocol icmp counter accept
|
||||
add rule ip filter INPUT log ip saddr $blacklist drop
|
||||
{%- for key, value in net.ipv4_networks.items() %}
|
||||
add rule ip filter INPUT ip saddr {{ value.ip }}/{{ value.mask }} ct state established,new counter accept
|
||||
{%- endfor %}
|
||||
@ -24,10 +23,10 @@ add rule ip filter INPUT {{ value.proto }} dport {{ value.port }} ct state estab
|
||||
|
||||
## IPv4 NAT
|
||||
add table ip nat
|
||||
add chain ip nat PREROUTING { type nat hook prerouting priority -100; policy accept; }
|
||||
add chain ip nat INPUT { type nat hook input priority 100; policy accept; }
|
||||
add chain ip nat OUTPUT { type nat hook output priority -100; policy accept; }
|
||||
add chain ip nat POSTROUTING { type nat hook postrouting priority 100; policy accept; }
|
||||
add chain ip nat PREROUTING { type nat hook prerouting priority -1; policy accept; }
|
||||
add chain ip nat INPUT { type nat hook input priority 1; policy accept; }
|
||||
add chain ip nat OUTPUT { type nat hook output priority -1; policy accept; }
|
||||
add chain ip nat POSTROUTING { type nat hook postrouting priority 1; policy accept; }
|
||||
add chain ip nat DOCKER
|
||||
{%- for key, value in net.nats.items() %}
|
||||
add rule ip nat POSTROUTING ip saddr {{ value.ip }}/{{ value.mask }} counter masquerade
|
||||
@ -53,4 +52,8 @@ add rule ip6 filter6 INPUT {{ value.proto }} dport {{ value.port }} ct state est
|
||||
{%- endfor %}
|
||||
#add rule ip6 filter6 INPUT counter log
|
||||
|
||||
#add table ip blparser
|
||||
#add chain ip blparser INPUT { type filter hook input priority 0; policy accept; }
|
||||
|
||||
## Endline is mandatory
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user