1
0

Compare commits

...

2 Commits

Author SHA1 Message Date
5306b36181 ipv4 nat rules 2023-06-28 23:51:37 +01:00
1f1164cc98 allow dhcp client on wan 2023-06-28 23:51:21 +01:00

View File

@ -106,6 +106,16 @@ in {
(accept "tcp dport 22")
];
};
input-wan = {
type = "filter";
family = "ip6";
rules = [
(accept "udp dport 546") # dhcp client, needed for prefix delegation
];
};
input-ip6 = {
type = "filter";
family = "ip6";
@ -114,6 +124,7 @@ in {
rules = [
(accept "meta l4proto icmpv6")
"iifname int jump input-lan"
"iifname ppp0 jump input-wan"
(if allow-incoming
then accept "oifname \"int\" iifname \"ppp0\""
else "oifname \"int\" iifname \"ppp0\" jump incoming-allowed-ip6"
@ -132,4 +143,28 @@ in {
# "oifname \"int\" ip6 daddr 2001:8b0:de3a:40de::e9d tcp dport 22"
];
};
nat-tx = {
type = "nat";
hook = "postrouting";
priority = "100";
policy = "accept";
family = "ip";
rules = [
"oifname \"ppp0\" masquerade"
];
};
nat-rx = {
type = "nat";
hook = "prerouting";
priority = "-100";
family = "ip";
policy = "accept";
rules = [
# per https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-configuring_nat_using_nftables:
# "Even if you do not add a rule to the prerouting chain, the
# nftables framework requires this chain to match incoming
# packet replies. "
];
};
}