Create a self-signed CA, set up group configs, add script to allow new connections through the firewall. In the base debian role, drop the default nftables forward chain with drop policy because it clashes with this. If you enable forwarding on a debian host, make sure to configure the firewall.
15 lines
346 B
Plaintext
15 lines
346 B
Plaintext
table inet ocserv {
|
|
chain forward {
|
|
type filter hook forward priority filter + 10; policy drop;
|
|
ct state { established, related } accept
|
|
meta mark 0x100 accept
|
|
}
|
|
}
|
|
|
|
table ip ocserv {
|
|
chain postrouting {
|
|
type nat hook postrouting priority srcnat; policy drop;
|
|
meta mark 0x100 masquerade
|
|
}
|
|
}
|