uncloud-mravi/archive/uncloud_etcd_based/uncloud/hack/hackcloud/nftrules-v2

65 lines
1.8 KiB
Text
Raw Permalink Normal View History

2020-01-11 01:42:04 +00:00
flush ruleset
table bridge filter {
2020-01-11 20:21:30 +00:00
chain prerouting {
type filter hook prerouting priority 0;
policy accept;
ibrname br100 jump netpublic
}
2020-01-11 01:42:04 +00:00
2020-01-11 20:21:30 +00:00
chain netpublic {
iifname vxlan100 jump from_uncloud
2020-01-11 01:42:04 +00:00
2020-01-11 20:21:30 +00:00
# Default blocks: router advertisements, dhcpv6, dhcpv4
icmpv6 type nd-router-advert drop
ip6 version 6 udp sport 547 drop
ip version 4 udp sport 67 drop
2020-01-11 01:42:04 +00:00
2020-01-11 20:21:30 +00:00
# Individual blocks
2020-05-17 20:35:25 +00:00
# iifname tap1 jump vm1
2020-01-11 20:21:30 +00:00
}
2020-01-11 01:42:04 +00:00
2020-01-11 20:21:30 +00:00
chain vm1 {
ether saddr != 02:00:f0:a9:c4:4e drop
ip6 saddr != 2a0a:e5c1:111:888:0:f0ff:fea9:c44e drop
}
2020-01-11 01:42:04 +00:00
2020-01-11 20:21:30 +00:00
chain from_uncloud {
accept
}
2020-01-11 01:42:04 +00:00
}
2020-01-11 20:21:30 +00:00
# table ip6 filter {
# chain forward {
# type filter hook forward priority 0;
# # policy drop;
# ct state established,related accept;
# }
# }
# table ip filter {
# chain input {
# type filter hook input priority filter; policy drop;
# iif "lo" accept
# icmp type { echo-reply, destination-unreachable, source-quench, redirect, echo-request, router-advertisement, router-solicitation, time-exceeded, parameter-problem, timestamp-request, timestamp-reply, info-request, info-reply, address-mask-request, address-mask-reply } accept
# ct state established,related accept
# tcp dport { 22 } accept
# log prefix "firewall-ipv4: "
# udp sport 67 drop
# }
# chain forward {
# type filter hook forward priority filter; policy drop;
# log prefix "firewall-ipv4: "
# }
# chain output {
# type filter hook output priority filter; policy accept;
# }
# }