Compare commits
4 commits
6c18e2ff94
...
7e02a13144
Author | SHA1 | Date | |
---|---|---|---|
Timotej Lazar | 7e02a13144 | ||
Timotej Lazar | f8e8acb521 | ||
Timotej Lazar | 5a9f0ac26a | ||
Timotej Lazar | ef1b00adce |
|
@ -392,10 +392,12 @@ route-map firewall->outside permit 41
|
||||||
route-map firewall-{{ loop.index }}->inside permit 1
|
route-map firewall-{{ loop.index }}->inside permit 1
|
||||||
set tag {{ loop.index }}
|
set tag {{ loop.index }}
|
||||||
set weight {{ 100 * loop.index }}
|
set weight {{ 100 * loop.index }}
|
||||||
|
set as-path exclude {{ asn.asn }} {{ hostvars[peer].asn.asn }}
|
||||||
call firewall->inside
|
call firewall->inside
|
||||||
route-map firewall-{{ loop.index }}->outside permit 1
|
route-map firewall-{{ loop.index }}->outside permit 1
|
||||||
set tag {{ loop.index }}
|
set tag {{ loop.index }}
|
||||||
set weight {{ 100 * loop.index }}
|
set weight {{ 100 * loop.index }}
|
||||||
|
set as-path exclude {{ asn.asn }} {{ hostvars[peer].asn.asn }}
|
||||||
call firewall->outside
|
call firewall->outside
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
||||||
|
@ -448,11 +450,15 @@ route-map me->peer.4 permit 110
|
||||||
route-map me->peer.4 permit 111
|
route-map me->peer.4 permit 111
|
||||||
match ipv6 address prefix-list default
|
match ipv6 address prefix-list default
|
||||||
route-map me->peer.4 permit 120
|
route-map me->peer.4 permit 120
|
||||||
match ip address prefix-list nat
|
match ip address prefix-list office
|
||||||
route-map me->peer.4 permit 121
|
route-map me->peer.4 permit 121
|
||||||
match ipv6 address prefix-list vpn
|
|
||||||
route-map me->peer.4 permit 131
|
|
||||||
match ipv6 address prefix-list office
|
match ipv6 address prefix-list office
|
||||||
|
route-map me->peer.4 permit 130
|
||||||
|
match ip address prefix-list nat
|
||||||
|
route-map me->peer.4 permit 140
|
||||||
|
match ip address prefix-list vpn
|
||||||
|
route-map me->peer.4 permit 141
|
||||||
|
match ipv6 address prefix-list vpn
|
||||||
|
|
||||||
# Received backup routes (same as above).
|
# Received backup routes (same as above).
|
||||||
route-map peer.4->me permit 110
|
route-map peer.4->me permit 110
|
||||||
|
@ -460,8 +466,12 @@ route-map peer.4->me permit 110
|
||||||
route-map peer.4->me permit 111
|
route-map peer.4->me permit 111
|
||||||
match ipv6 address prefix-list default
|
match ipv6 address prefix-list default
|
||||||
route-map peer.4->me permit 120
|
route-map peer.4->me permit 120
|
||||||
match ip address prefix-list nat
|
match ip address prefix-list office
|
||||||
route-map peer.4->me permit 121
|
route-map peer.4->me permit 121
|
||||||
match ipv6 address prefix-list vpn
|
|
||||||
route-map peer.4->me permit 131
|
|
||||||
match ipv6 address prefix-list office
|
match ipv6 address prefix-list office
|
||||||
|
route-map peer.4->me permit 130
|
||||||
|
match ip address prefix-list nat
|
||||||
|
route-map peer.4->me permit 140
|
||||||
|
match ip address prefix-list vpn
|
||||||
|
route-map peer.4->me permit 141
|
||||||
|
match ipv6 address prefix-list vpn
|
||||||
|
|
|
@ -18,8 +18,10 @@ table inet filter {
|
||||||
type inet_proto . inet_service
|
type inet_proto . inet_service
|
||||||
flags interval
|
flags interval
|
||||||
elements = {
|
elements = {
|
||||||
|
tcp . 53,
|
||||||
tcp . 88,
|
tcp . 88,
|
||||||
tcp . 135,
|
tcp . 135,
|
||||||
|
tcp . 139,
|
||||||
tcp . 389,
|
tcp . 389,
|
||||||
tcp . 445,
|
tcp . 445,
|
||||||
tcp . 464,
|
tcp . 464,
|
||||||
|
@ -29,14 +31,31 @@ table inet filter {
|
||||||
tcp . 9389,
|
tcp . 9389,
|
||||||
tcp . 22222-22224,
|
tcp . 22222-22224,
|
||||||
tcp . 49152-65535,
|
tcp . 49152-65535,
|
||||||
|
udp . 53,
|
||||||
udp . 88,
|
udp . 88,
|
||||||
udp . 135,
|
udp . 135,
|
||||||
|
udp . 137, # netbios, maybe can do without
|
||||||
|
udp . 138, # netbios, maybe can do without
|
||||||
udp . 389,
|
udp . 389,
|
||||||
udp . 464,
|
udp . 464,
|
||||||
udp . 3269
|
udp . 3269
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
set ldap-ports {
|
||||||
|
type inet_proto . inet_service
|
||||||
|
flags interval
|
||||||
|
elements = {
|
||||||
|
tcp . 88,
|
||||||
|
tcp . 389,
|
||||||
|
tcp . 636,
|
||||||
|
tcp . 3268,
|
||||||
|
tcp . 3269,
|
||||||
|
udp . 88,
|
||||||
|
udp . 389
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
chain input {
|
chain input {
|
||||||
type filter hook input priority 0; policy drop
|
type filter hook input priority 0; policy drop
|
||||||
|
|
||||||
|
@ -104,6 +123,18 @@ table inet filter {
|
||||||
ct status dnat accept \
|
ct status dnat accept \
|
||||||
comment "Forward DNAT traffic for servers and suchlike"
|
comment "Forward DNAT traffic for servers and suchlike"
|
||||||
|
|
||||||
|
ip protocol icmp icmp type {
|
||||||
|
echo-request, echo-reply, destination-unreachable,
|
||||||
|
parameter-problem, time-exceeded,
|
||||||
|
} accept \
|
||||||
|
comment "Accept ICMPv4"
|
||||||
|
|
||||||
|
ip6 nexthdr icmpv6 icmpv6 type {
|
||||||
|
echo-request, echo-reply, destination-unreachable,
|
||||||
|
packet-too-big, parameter-problem, time-exceeded,
|
||||||
|
} accept \
|
||||||
|
comment "Accept ICMPv6"
|
||||||
|
|
||||||
include "/etc/nftables.d/forward.nft*"
|
include "/etc/nftables.d/forward.nft*"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue