Nft-4: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „<pre> table ip filter { chain INPUT { type filter hook input priority filter; policy drop; ct state established,related counter packets 103 bytes 7264 acc…“) |
|||
| Zeile 3: | Zeile 3: | ||
chain INPUT { | chain INPUT { | ||
type filter hook input priority filter; policy drop; | type filter hook input priority filter; policy drop; | ||
| − | ct state established,related | + | ct state established,related accept |
| − | iifname "lo" ct state new | + | iifname "lo" ct state new accept |
| − | tcp dport 22 ct state new | + | tcp dport 22 ct state new accept |
| − | icmp type echo-request ct state new | + | icmp type echo-request ct state new accept |
| − | + | log prefix "--iptables-drop-in--" | |
} | } | ||
chain OUTPUT { | chain OUTPUT { | ||
type filter hook output priority filter; policy drop; | type filter hook output priority filter; policy drop; | ||
| − | ct state established,related | + | ct state established,related accept |
| − | ct state new | + | ct state new accept |
| − | + | log prefix "--iptables-drop-out--" | |
} | } | ||
chain FORWARD { | chain FORWARD { | ||
type filter hook forward priority filter; policy drop; | type filter hook forward priority filter; policy drop; | ||
| − | ct state established,related | + | ct state established,related accept |
| − | icmp type echo-request | + | icmp type echo-request jump lan-to-wan |
| − | tcp dport 53 | + | tcp dport 53 jump lan-to-wan |
| − | udp dport 53 | + | udp dport 53 jump lan-to-wan |
| − | tcp dport { 25, 80, 143, 443, 465, 993 } | + | tcp dport { 25, 80, 143, 443, 465, 993 } jump lan-to-wan |
| − | + | log prefix "--iptables-drop-for--" | |
} | } | ||
chain lan-to-wan { | chain lan-to-wan { | ||
| − | iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new | + | iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new accept |
} | } | ||
} | } | ||
</pre> | </pre> | ||
Aktuelle Version vom 13. September 2022, 17:34 Uhr
table ip filter {
chain INPUT {
type filter hook input priority filter; policy drop;
ct state established,related accept
iifname "lo" ct state new accept
tcp dport 22 ct state new accept
icmp type echo-request ct state new accept
log prefix "--iptables-drop-in--"
}
chain OUTPUT {
type filter hook output priority filter; policy drop;
ct state established,related accept
ct state new accept
log prefix "--iptables-drop-out--"
}
chain FORWARD {
type filter hook forward priority filter; policy drop;
ct state established,related accept
icmp type echo-request jump lan-to-wan
tcp dport 53 jump lan-to-wan
udp dport 53 jump lan-to-wan
tcp dport { 25, 80, 143, 443, 465, 993 } jump lan-to-wan
log prefix "--iptables-drop-for--"
}
chain lan-to-wan {
iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new accept
}
}