Nftables Testserver: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(2 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
Zeile 8: | Zeile 8: | ||
| WAN | | WAN | ||
| eth0 | | eth0 | ||
| 10. | | 10.2.0.175 | ||
|- | |- | ||
| LAN | | LAN | ||
| wlan0 | | wlan0 | ||
| 10. | | 10.3.0.1 | ||
|- | |- | ||
| OpenVPN | | OpenVPN | ||
| tun0 | | tun0 | ||
| | | --- | ||
|} | |} | ||
== Stand | == Stand 16.08.2020 == | ||
<pre> | <pre> | ||
Zeile 31: | Zeile 31: | ||
flags interval | flags interval | ||
auto-merge | auto-merge | ||
elements = { 10.2.0.0/24, 10.0.0.0/24, 10. | elements = { 10.2.0.0/24, 10.0.0.0/24, 10.3.0.0/24 } | ||
} | } | ||
Zeile 44: | Zeile 44: | ||
# icmp (ping) | # icmp (ping) | ||
iifname " | iifname "eth0" icmp type echo-request accept; | ||
iifname " | iifname "wlan0" ip daddr { 10.2.0.175 } icmp type echo-request accept; | ||
# open sshd (22) for internal networks only | # open sshd (22) for internal networks only | ||
Zeile 56: | Zeile 55: | ||
# open udp ports: domain (53), openvpn (1194) | # open udp ports: domain (53), openvpn (1194) | ||
udp dport { domain, openvpn } accept; | udp dport { domain, openvpn } accept; | ||
# mysql (3306) | # mysql (3306) | ||
meta l4proto { tcp, udp } @th,16,16 { 3306 } ip saddr @internal_networks_ip4 accept comment "accept mysql from internal networks"; | meta l4proto { tcp, udp } @th,16,16 { 3306 } ip saddr @internal_networks_ip4 accept comment "accept mysql from internal networks"; | ||
# dhcp server (67) | |||
udp dport { bootps } accept; | |||
counter comment "count dropped packets" | |||
#log | #log | ||
} | } | ||
Zeile 68: | Zeile 68: | ||
chain forward { | chain forward { | ||
type filter hook forward priority 0; policy drop; | type filter hook forward priority 0; policy drop; | ||
ip saddr @internal_networks_ip4 accept; | ip saddr @internal_networks_ip4 accept; | ||
iifname "wlan0" oifname "tun0" ct state related,established accept; | iifname "wlan0" oifname "tun0" ct state related,established accept; | ||
iifname "eth0" oifname "tun0" ct state related,established accept; | |||
iifname "wlan0" oifname "eth0" ct state related,established accept; | |||
} | } | ||
chain output { | chain output { | ||
type filter hook output priority | type filter hook output priority 0; policy accept; | ||
} | } | ||
} | } | ||
Zeile 89: | Zeile 89: | ||
chain postrouting { | chain postrouting { | ||
type nat hook postrouting priority 100; policy accept; | type nat hook postrouting priority 100; policy accept; | ||
oifname "wlan0" ip saddr 10. | oifname "wlan0" ip saddr 10.8.5.0/24 masquerade; | ||
oifname "eth0" ip saddr 10.8.5.0/24 masquerade; | |||
oifname "wlan0" ip saddr 10.3.0.0/24 masquerade; | |||
} | } | ||
} | } |
Aktuelle Version vom 16. August 2020, 11:07 Uhr
Schnittstellen
Schnittstelle | Name | IP-Adresse |
---|---|---|
WAN | eth0 | 10.2.0.175 |
LAN | wlan0 | 10.3.0.1 |
OpenVPN | tun0 | --- |
Stand 16.08.2020
#!/usr/sbin/nft -f flush ruleset table inet filter { set internal_networks_ip4 { type ipv4_addr flags interval auto-merge elements = { 10.2.0.0/24, 10.0.0.0/24, 10.3.0.0/24 } } chain input { type filter hook input priority 0; policy drop; # established/related connections ct state established,related accept; # loopback interface iifname lo accept; # icmp (ping) iifname "eth0" icmp type echo-request accept; iifname "wlan0" ip daddr { 10.2.0.175 } icmp type echo-request accept; # open sshd (22) for internal networks only tcp dport { ssh } ip saddr @internal_networks_ip4 accept comment "accept SSH from internal networks" # open tcp ports: http (80), https (443) tcp dport { http, https } accept; # open udp ports: domain (53), openvpn (1194) udp dport { domain, openvpn } accept; # mysql (3306) meta l4proto { tcp, udp } @th,16,16 { 3306 } ip saddr @internal_networks_ip4 accept comment "accept mysql from internal networks"; # dhcp server (67) udp dport { bootps } accept; counter comment "count dropped packets" #log } chain forward { type filter hook forward priority 0; policy drop; ip saddr @internal_networks_ip4 accept; iifname "wlan0" oifname "tun0" ct state related,established accept; iifname "eth0" oifname "tun0" ct state related,established accept; iifname "wlan0" oifname "eth0" ct state related,established accept; } chain output { type filter hook output priority 0; policy accept; } } # NAT table ip nat { chain prerouting { type nat hook prerouting priority 0; policy accept; } # for all packets to WAN, after routing, replace source address with primary IP of WAN interface chain postrouting { type nat hook postrouting priority 100; policy accept; oifname "wlan0" ip saddr 10.8.5.0/24 masquerade; oifname "eth0" ip saddr 10.8.5.0/24 masquerade; oifname "wlan0" ip saddr 10.3.0.0/24 masquerade; } }
Zurück zu nftables