]>
git.ipfire.org Git - people/mlorenz/ipfire-2.x.git/blob - config/firewall/firewall-policy
2 ###############################################################################
4 # IPFire.org - A linux based firewall #
5 # Copyright (C) 2013 Alexander Marx <amarx@ipfire.org> #
7 # This program is free software: you can redistribute it and/or modify #
8 # it under the terms of the GNU General Public License as published by #
9 # the Free Software Foundation, either version 3 of the License, or #
10 # (at your option) any later version. #
12 # This program is distributed in the hope that it will be useful, #
13 # but WITHOUT ANY WARRANTY; without even the implied warranty of #
14 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15 # GNU General Public License for more details. #
17 # You should have received a copy of the GNU General Public License #
18 # along with this program. If not, see <http://www.gnu.org/licenses/>. #
20 ###############################################################################
22 eval $
(/usr
/local
/bin
/readhash
/var
/ipfire
/ethernet
/settings
)
23 eval $
(/usr
/local
/bin
/readhash
/var
/ipfire
/firewall
/settings
)
24 eval $
(/usr
/local
/bin
/readhash
/var
/ipfire
/optionsfw
/settings
)
27 /sbin
/iptables
--wait "$@"
34 if [ -f "/var/ipfire/red/iface" ]; then
35 IFACE
="$(</var/ipfire/red/iface)"
38 # Figure out what devices are configured.
42 case "${CONFIG_TYPE}" in
60 # Allow access from GREEN
61 iptables
-A POLICYIN
-i "${GREEN_DEV}" -j ACCEPT
63 # Allow access from BLUE
64 if [ "${HAVE_BLUE}" = "true" ] && [ -n "${BLUE_DEV}" ]; then
65 iptables
-A POLICYIN
-i "${BLUE_DEV}" -j ACCEPT
69 case "${HAVE_IPSEC},${POLICY}" in
72 iptables
-A POLICYIN
-m policy
--pol ipsec
--dir in -j ACCEPT
77 # Allow direct access to the internal IP addresses of the firewall
78 # from remote subnets if forward policy is allowed.
79 case "${HAVE_OPENVPN},${POLICY}" in
82 iptables
-A POLICYIN
-i tun
+ -j ACCEPT
86 case "${FWPOLICY2}" in
88 if [ "${DROPINPUT}" = "on" ]; then
89 iptables
-A POLICYIN
-m limit
--limit 10/minute
-j LOG
--log-prefix "REJECT_INPUT "
91 iptables
-A POLICYIN
-j REJECT
--reject-with icmp-host-unreachable
-m comment
--comment "DROP_INPUT"
94 if [ "${DROPINPUT}" = "on" ]; then
95 iptables
-A POLICYIN
-m limit
--limit 10/minute
-j LOG
--log-prefix "DROP_INPUT "
97 iptables
-A POLICYIN
-j DROP
-m comment
--comment "DROP_INPUT"
104 case "${FWPOLICY}" in
106 if [ "${DROPFORWARD}" = "on" ]; then
107 iptables
-A POLICYFWD
-m limit
--limit 10/minute
-j LOG
--log-prefix "REJECT_FORWARD "
109 iptables
-A POLICYFWD
-j REJECT
--reject-with icmp-host-unreachable
-m comment
--comment "DROP_FORWARD"
112 if [ "${DROPFORWARD}" = "on" ]; then
113 iptables
-A POLICYFWD
-m limit
--limit 10/minute
-j LOG
--log-prefix "DROP_FORWARD "
115 iptables
-A POLICYFWD
-j DROP
-m comment
--comment "DROP_FORWARD"
121 # Access from GREEN is granted to everywhere
122 if [ "${IFACE}" = "${GREEN_DEV}" ]; then
124 # don't check source IP/NET if IFACE is GREEN
125 iptables
-A POLICYFWD
-i "${GREEN_DEV}" -j ACCEPT
127 iptables
-A POLICYFWD
-i "${GREEN_DEV}" -s "${GREEN_NETADDRESS}/${GREEN_NETMASK}" -j ACCEPT
130 # Grant access for IPsec VPN connections
131 iptables
-A POLICYFWD
-m policy
--pol ipsec
--dir in -j ACCEPT
133 # Grant access for OpenVPN connections
134 iptables
-A POLICYFWD
-i tun
+ -j ACCEPT
136 if [ -n "${IFACE}" ]; then
137 if [ "${HAVE_BLUE}" = "true" ] && [ -n "${BLUE_DEV}" ]; then
138 iptables
-A POLICYFWD
-i "${BLUE_DEV}" -s "${BLUE_NETADDRESS}/${BLUE_NETMASK}" -o "${IFACE}" -j ACCEPT
141 if [ "${HAVE_ORANGE}" = "true" ] && [ -n "${ORANGE_DEV}" ]; then
142 iptables
-A POLICYFWD
-i "${ORANGE_DEV}" -s "${ORANGE_NETADDRESS}/${ORANGE_NETMASK}" -o "${IFACE}" -j ACCEPT
146 if [ "${DROPFORWARD}" = "on" ]; then
147 iptables
-A POLICYFWD
-m limit
--limit 10/minute
-j LOG
--log-prefix "DROP_FORWARD "
149 iptables
-A POLICYFWD
-m comment
--comment "DROP_FORWARD" -j DROP
156 case "${FWPOLICY1}" in
158 if [ "${DROPOUTGOING}" = "on" ]; then
159 iptables
-A POLICYOUT
-m limit
--limit 10/minute
-j LOG
--log-prefix "REJECT_OUTPUT "
161 iptables
-A POLICYOUT
-j REJECT
--reject-with icmp-host-unreachable
-m comment
--comment "DROP_OUTPUT"
164 if [ "${DROPOUTGOING}" == "on" ]; then
165 iptables
-A POLICYOUT
-m limit
--limit 10/minute
-j LOG
--log-prefix "DROP_OUTPUT "
167 iptables
-A POLICYOUT
-j DROP
-m comment
--comment "DROP_OUTPUT"
172 iptables
-A POLICYOUT
-j ACCEPT
173 iptables
-A POLICYOUT
-m comment
--comment "DROP_OUTPUT" -j DROP