You've already forked custom-firewall
chore: update to use ipset for port list
This commit is contained in:
@@ -14,12 +14,12 @@ iptables -N enemy_input
|
||||
iptables -I INPUT 1 -i {{ whitelist_interface }} -j enemy_input
|
||||
iptables -N DOCKER-USER
|
||||
iptables -I DOCKER-USER 1 -i {{ whitelist_interface }} -j enemy_input
|
||||
iptables -I enemy_input 1 -p tcp -m multiport ! --dports {{ whitelist_public_tcp_port|join(',') }} -m set --match-set {{ whitelist_ip4_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 2 -p udp -m multiport ! --dports {{ whitelist_public_udp_port|join(',') }} -m set --match-set {{ whitelist_ip4_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 3 -m set --match-set {{ whitelist_ip4_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 1 -p tcp -m set --match-set {{ whitelist_ports_tcp }} dst -m set --match-set {{ whitelist_ip_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 2 -p udp -m set --match-set {{ whitelist_ports_udp }} dst -m set --match-set {{ whitelist_ip_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 3 -m set --match-set {{ whitelist_ip_name }} src -j ACCEPT
|
||||
iptables -I enemy_input 4 -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
iptables -I enemy_input 5 -p tcp -m multiport ! --dports {{ whitelist_public_tcp_port|join(',') }} -j DROP
|
||||
iptables -I enemy_input 6 -p udp -m multiport ! --dports {{ whitelist_public_udp_port|join(',') }} -j DROP
|
||||
iptables -I enemy_input 5 -p tcp -m set ! --match-set {{ whitelist_ports_tcp }} dst -j DROP
|
||||
iptables -I enemy_input 6 -p udp -m set ! --match-set {{ whitelist_ports_udp }} dst -j DROP
|
||||
|
||||
# IPv6
|
||||
|
||||
@@ -31,9 +31,9 @@ ip6tables -N enemy_input
|
||||
ip6tables -I INPUT 1 -i {{ whitelist_interface }} -j enemy_input
|
||||
ip6tables -N DOCKER-USER
|
||||
ip6tables -I DOCKER-USER 1 -i {{ whitelist_interface }} -j enemy_input
|
||||
ip6tables -I enemy_input 1 -p tcp -m multiport ! --dports {{ whitelist_public_tcp_port|join(',') }} -m set --match-set {{ whitelist_ip6_name }} src -j ACCEPT
|
||||
ip6tables -I enemy_input 2 -p udp -m multiport ! --dports {{ whitelist_public_udp_port|join(',') }} -m set --match-set {{ whitelist_ip6_name }} src -j ACCEPT
|
||||
ip6tables -I enemy_input 1 -p tcp -m set --match-set {{ whitelist_ports_tcp }} dst -m set --match-set {{ whitelist_ip6_name }} src -j ACCEPT
|
||||
ip6tables -I enemy_input 2 -p udp -m set --match-set {{ whitelist_ports_udp }} dst -m set --match-set {{ whitelist_ip6_name }} src -j ACCEPT
|
||||
ip6tables -I enemy_input 3 -m set --match-set {{ whitelist_ip6_name }} src -j ACCEPT
|
||||
ip6tables -I enemy_input 4 -m state --state RELATED,ESTABLISHED -j ACCEPT
|
||||
ip6tables -I enemy_input 5 -p tcp -m multiport ! --dports {{ whitelist_public_tcp_port|join(',') }} -j DROP
|
||||
ip6tables -I enemy_input 6 -p udp -m multiport ! --dports {{ whitelist_public_udp_port|join(',') }} -j DROP
|
||||
ip6tables -I enemy_input 5 -p tcp -m set ! --match-set {{ whitelist_ports_tcp }} dst -j DROP
|
||||
ip6tables -I enemy_input 6 -p udp -m set ! --match-set {{ whitelist_ports_udp }} dst -j DROP
|
||||
|
||||
@@ -7,5 +7,13 @@ create {{ whitelist_ip6_name }} hash:ip family inet6
|
||||
{% for white_ip6 in whitelist_ip6 %}
|
||||
add {{ whitelist_ip6_name }} {{ white_ip6 }}
|
||||
{% endfor %}
|
||||
create {{ whitelist_ports_tcp }} bitmap:port range 0-65535
|
||||
{% for port_tcp in whitelist_public_tcp_port %}
|
||||
add {{ whitelist_ports_tcp }} {{ port_tcp }}
|
||||
{% endfor %}
|
||||
create {{ whitelist_ports_udp }} bitmap:port range 0-65535
|
||||
{% for port_udp in whitelist_public_udp_port %}
|
||||
add {{ whitelist_ports_udp }} {{ port_udp }}
|
||||
{% endfor %}
|
||||
|
||||
{{ ansible_managed | comment }}
|
||||
|
||||
Reference in New Issue
Block a user