orginizing the firewall a little bit, no changes in theory
This commit is contained in:
parent
4a69025703
commit
8bdbba3016
|
@ -18,20 +18,32 @@ case $1 in
|
||||||
iptables -P INPUT ACCEPT
|
iptables -P INPUT ACCEPT
|
||||||
iptables -F INPUT
|
iptables -F INPUT
|
||||||
#unencrypted traffic
|
#unencrypted traffic
|
||||||
iptables -A INPUT -p esp -j ACCEPT # ipsec
|
iptables -A INPUT -p esp -j ACCEPT # ipsec
|
||||||
iptables -A INPUT -p udp --dport 500 --sport 500 -j ACCEPT # ipsec
|
iptables -A INPUT -p udp --dport 500 --sport 500 -j ACCEPT # ipsec
|
||||||
iptables -A INPUT -p udp --dport 4500 --sport 4500 -j ACCEPT # ipsec
|
iptables -A INPUT -p udp --dport 4500 --sport 4500 -j ACCEPT # ipsec
|
||||||
iptables -A INPUT -s 170.199.217.0 -p udp --sport 53 -j ACCEPT # dns
|
iptables -A INPUT -s 170.199.217.0 -p udp --sport 53 -j ACCEPT # dns
|
||||||
iptables -A INPUT -p icmp -j ACCEPT
|
iptables -A INPUT -p icmp -j ACCEPT
|
||||||
#traffic we want to see encrypted over the VPN
|
#traffic we want to see encrypted over the VPN
|
||||||
iptables -A INPUT -m policy --pol ipsec --dir in -p udp --dport 4789 -m policy --pol ipsec --dir in -j ACCEPT # vxlan traffic
|
iptables -A INPUT -m policy --pol ipsec --dir in -p udp --dport 4789 -m policy --pol ipsec --dir in -j ACCEPT # vxlan traffic
|
||||||
iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 49152:49215 -j ACCEPT # libvirt live migration
|
iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 49152:49215 -j ACCEPT # libvirt live migration
|
||||||
#iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 6800:7300 -j ACCEPT # ceph traffic
|
#iptables -A INPUT -m policy --pol ipsec --dir in -m multiport -p tcp --dports 6800:7300 -j ACCEPT # ceph traffic
|
||||||
|
### mgmt
|
||||||
##### DROP the rest
|
iptables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||||
|
iptables -A INPUT -i mgmt -p tcp --dport 22 -j ACCEPT
|
||||||
|
### DROP the rest
|
||||||
iptables -P INPUT DROP
|
iptables -P INPUT DROP
|
||||||
|
|
||||||
|
|
||||||
|
#special tables
|
||||||
|
iptables -t mangle -F
|
||||||
|
iptables -t nat -F
|
||||||
|
iptables -t raw -F
|
||||||
|
|
||||||
|
iptables -t raw -A PREROUTING ! -i mgmt1 -j NOTRACK
|
||||||
|
iptables -t raw -A OUTPUT ! -o mgmt -j NOTRACK
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
#### IPv6
|
#### IPv6
|
||||||
ip6tables -P INPUT ACCEPT
|
ip6tables -P INPUT ACCEPT
|
||||||
ip6tables -F INPUT
|
ip6tables -F INPUT
|
||||||
|
@ -43,36 +55,19 @@ case $1 in
|
||||||
ip6tables -A INPUT -s fe80::/10 -p tcp --dport 179 -j ACCEPT # bgp (allow init as well as responding)
|
ip6tables -A INPUT -s fe80::/10 -p tcp --dport 179 -j ACCEPT # bgp (allow init as well as responding)
|
||||||
### mgmt
|
### mgmt
|
||||||
ip6tables -A INPUT -i mgmt1 -s fe80::/10 -p udp --dport 546 -j ACCEPT # allow dhcp replys
|
ip6tables -A INPUT -i mgmt1 -s fe80::/10 -p udp --dport 546 -j ACCEPT # allow dhcp replys
|
||||||
|
ip6tables -A INPUT -i mgmt -p tcp --dport 22 -j ACCEPT # allow ssh from mgmt
|
||||||
|
ip6tables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT # allow stateful connections over mgmt
|
||||||
### DROP the rest
|
### DROP the rest
|
||||||
ip6tables -P INPUT DROP
|
ip6tables -P INPUT DROP
|
||||||
|
|
||||||
|
|
||||||
#special tables
|
#special tables
|
||||||
iptables -t mangle -F
|
|
||||||
iptables -t nat -F
|
|
||||||
iptables -t raw -F
|
|
||||||
|
|
||||||
ip6tables -t mangle -F
|
ip6tables -t mangle -F
|
||||||
ip6tables -t nat -F
|
ip6tables -t nat -F
|
||||||
ip6tables -t raw -F
|
ip6tables -t raw -F
|
||||||
|
|
||||||
|
|
||||||
ip6tables -t raw -A PREROUTING ! -i mgmt1 -j NOTRACK
|
ip6tables -t raw -A PREROUTING ! -i mgmt1 -j NOTRACK
|
||||||
ip6tables -t raw -A OUTPUT ! -o mgmt -j NOTRACK
|
ip6tables -t raw -A OUTPUT ! -o mgmt -j NOTRACK
|
||||||
ip6tables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT
|
|
||||||
ip6tables -A INPUT -i mgmt -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
##### temp rules till we get VRF in place in the factory, just flip the 3 rules below
|
|
||||||
if ip link show dev mgmt >/dev/null 2>&1; then
|
|
||||||
iptables -t raw -A PREROUTING ! -i mgmt1 -j NOTRACK
|
|
||||||
iptables -t raw -A OUTPUT ! -o mgmt -j NOTRACK
|
|
||||||
iptables -A INPUT -i mgmt -m state --state ESTABLISHED,RELATED -j ACCEPT
|
|
||||||
iptables -A INPUT -i mgmt -s 10.0.0.0/8 -p tcp --dport 22 -j ACCEPT
|
|
||||||
else
|
|
||||||
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
|
||||||
iptables -A INPUT -s 10.0.0.0/8 -p tcp --dport 22 -j ACCEPT
|
|
||||||
fi
|
|
||||||
##### end temp rules
|
|
||||||
|
|
||||||
|
|
||||||
;;
|
;;
|
||||||
|
|
Loading…
Reference in New Issue