Nft-4: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
(Die Seite wurde neu angelegt: „<pre> table ip filter { chain INPUT { type filter hook input priority filter; policy drop; ct state established,related counter packets 103 bytes 7264 acc…“)
 
 
Zeile 3: Zeile 3:
 
chain INPUT {
 
chain INPUT {
 
type filter hook input priority filter; policy drop;
 
type filter hook input priority filter; policy drop;
ct state established,related counter packets 103 bytes 7264 accept
+
ct state established,related accept
iifname "lo" ct state new counter packets 0 bytes 0 accept
+
iifname "lo" ct state new accept
tcp dport 22 ct state new counter packets 0 bytes 0 accept
+
tcp dport 22 ct state new accept
icmp type echo-request ct state new counter packets 0 bytes 0 accept
+
icmp type echo-request ct state new accept
counter packets 6 bytes 360 log prefix "--iptables-drop-in--"
+
log prefix "--iptables-drop-in--"
 
}
 
}
  
 
chain OUTPUT {
 
chain OUTPUT {
 
type filter hook output priority filter; policy drop;
 
type filter hook output priority filter; policy drop;
ct state established,related counter packets 52 bytes 5152 accept
+
ct state established,related accept
ct state new counter packets 0 bytes 0 accept
+
ct state new accept
counter packets 0 bytes 0 log prefix "--iptables-drop-out--"
+
log prefix "--iptables-drop-out--"
 
}
 
}
  
 
chain FORWARD {
 
chain FORWARD {
 
type filter hook forward priority filter; policy drop;
 
type filter hook forward priority filter; policy drop;
ct state established,related counter packets 0 bytes 0 accept
+
ct state established,related accept
icmp type echo-request counter packets 0 bytes 0 jump lan-to-wan
+
icmp type echo-request jump lan-to-wan
tcp dport 53 counter packets 0 bytes 0 jump lan-to-wan
+
tcp dport 53 jump lan-to-wan
udp dport 53 counter packets 0 bytes 0 jump lan-to-wan
+
udp dport 53 jump lan-to-wan
tcp dport { 25, 80, 143, 443, 465, 993 } counter packets 0 bytes 0 jump lan-to-wan
+
tcp dport { 25, 80, 143, 443, 465, 993 } jump lan-to-wan
counter packets 0 bytes 0 log prefix "--iptables-drop-for--"
+
log prefix "--iptables-drop-for--"
 
}
 
}
  
 
chain lan-to-wan {
 
chain lan-to-wan {
iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new counter packets 0 bytes 0 accept
+
iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new accept
 
}
 
}
 
}
 
}
 
</pre>
 
</pre>

Aktuelle Version vom 13. September 2022, 17:34 Uhr

table ip filter {
	chain INPUT {
		type filter hook input priority filter; policy drop;
		ct state established,related accept
		iifname "lo" ct state new accept
		tcp dport 22 ct state new accept
		icmp type echo-request ct state new accept
		log prefix "--iptables-drop-in--"
	}

	chain OUTPUT {
		type filter hook output priority filter; policy drop;
		ct state established,related accept
		ct state new accept
		log prefix "--iptables-drop-out--"
	}

	chain FORWARD {
		type filter hook forward priority filter; policy drop;
		ct state established,related accept
		icmp type echo-request jump lan-to-wan
		tcp dport 53 jump lan-to-wan
		udp dport 53 jump lan-to-wan
		tcp dport { 25, 80, 143, 443, 465, 993 } jump lan-to-wan
		log prefix "--iptables-drop-for--"
	}

	chain lan-to-wan {
		iifname "ens19" oifname "eth0" ip saddr 10.82.243.0/24 ct state new accept
	}
}