orginizing the firewall a little bit, no changes in theory
This commit is contained in:
parent
8bdbba3016
commit
2e95eb7bad
|
@ -19,17 +19,17 @@ case $1 in
|
|||
iptables -F INPUT
|
||||
#unencrypted traffic
|
||||
iptables -A INPUT -p esp -j ACCEPT # ipsec
|
||||
iptables -A INPUT -p udp --dport 500 --sport 500 -j ACCEPT # ipsec
|
||||
iptables -A INPUT -p udp --dport 4500 --sport 4500 -j ACCEPT # ipsec
|
||||
iptables -A INPUT -s 170.199.217.0 -p udp --sport 53 -j ACCEPT # dns
|
||||
iptables -A INPUT -p udp --dport 500 --sport 500 -j ACCEPT # ipsec
|
||||
iptables -A INPUT -p udp --dport 4500 --sport 4500 -j ACCEPT # ipsec
|
||||
iptables -A INPUT -s bastion.usw2.wit.com -p udp --sport 53 -j ACCEPT # dns
|
||||
iptables -A INPUT -p icmp -j ACCEPT
|
||||
#traffic we want to see encrypted over the VPN
|
||||
iptables -A INPUT -m policy --pol ipsec --dir in -p udp --dport 4789 -m policy --pol ipsec --dir in -j ACCEPT # vxlan traffic
|
||||
iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 49152:49215 -j ACCEPT # libvirt live migration
|
||||
#iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 6800:7300 -j ACCEPT # ceph traffic
|
||||
### mgmt
|
||||
iptables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
iptables -A INPUT -i mgmt -p tcp --dport 22 -j ACCEPT
|
||||
iptables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
### DROP the rest
|
||||
iptables -P INPUT DROP
|
||||
|
||||
|
@ -48,13 +48,12 @@ case $1 in
|
|||
ip6tables -P INPUT ACCEPT
|
||||
ip6tables -F INPUT
|
||||
ip6tables -A INPUT -p ipv6-icmp -j ACCEPT # ping
|
||||
ip6tables -A INPUT -s 2604:bbc0:0:113::a01:1301 -p udp --sport 53 -j ACCEPT # dns
|
||||
ip6tables -A INPUT -s 2001:67c:1560:8003::c7 -p udp --sport 123 -j ACCEPT # ntp
|
||||
ip6tables -A INPUT -s 2001:67c:1560:8003::c8 -p udp --sport 123 -j ACCEPT # ntp
|
||||
ip6tables -A INPUT -s bastion.usw2.wit.com -p udp --sport 53 -j ACCEPT # dns
|
||||
ip6tables -A INPUT -s ipv6.ntp.ubuntu.com -p udp --sport 123 -j ACCEPT # ntp
|
||||
ip6tables -A INPUT -s fe80::/10 -p tcp --sport 179 -j ACCEPT # bgp (allow init as well as responding)
|
||||
ip6tables -A INPUT -s fe80::/10 -p tcp --dport 179 -j ACCEPT # bgp (allow init as well as responding)
|
||||
### mgmt
|
||||
ip6tables -A INPUT -i mgmt1 -s fe80::/10 -p udp --dport 546 -j ACCEPT # allow dhcp replys
|
||||
ip6tables -A INPUT -i mgmt1 -s fe80::/10 -p udp --dport 546 -j ACCEPT # allow dhcp replys, unlcear why this needs the physical interface instead of the vrf
|
||||
ip6tables -A INPUT -i mgmt -p tcp --dport 22 -j ACCEPT # allow ssh from mgmt
|
||||
ip6tables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT # allow stateful connections over mgmt
|
||||
### DROP the rest
|
||||
|
|
Loading…
Reference in New Issue