]> git.ipfire.org Git - people/teissler/ipfire-2.x.git/blame_incremental - config/firewall/firewall-policy
firewall-policy: Remove empty line.
[people/teissler/ipfire-2.x.git] / config / firewall / firewall-policy
... / ...
CommitLineData
1#!/bin/sh
2###############################################################################
3# #
4# IPFire.org - A linux based firewall #
5# Copyright (C) 2013 Alexander Marx <amarx@ipfire.org> #
6# #
7# This program is free software: you can redistribute it and/or modify #
8# it under the terms of the GNU General Public License as published by #
9# the Free Software Foundation, either version 3 of the License, or #
10# (at your option) any later version. #
11# #
12# This program is distributed in the hope that it will be useful, #
13# but WITHOUT ANY WARRANTY; without even the implied warranty of #
14# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
15# GNU General Public License for more details. #
16# #
17# You should have received a copy of the GNU General Public License #
18# along with this program. If not, see <http://www.gnu.org/licenses/>. #
19# #
20###############################################################################
21
22eval $(/usr/local/bin/readhash /var/ipfire/ethernet/settings)
23eval $(/usr/local/bin/readhash /var/ipfire/firewall/settings)
24eval $(/usr/local/bin/readhash /var/ipfire/optionsfw/settings)
25
26function iptables() {
27 /sbin/iptables --wait "$@"
28}
29
30iptables -F POLICYFWD
31iptables -F POLICYOUT
32iptables -F POLICYIN
33
34if [ -f "/var/ipfire/red/iface" ]; then
35 IFACE="$(</var/ipfire/red/iface)"
36fi
37
38# Figure out what devices are configured.
39HAVE_BLUE="false"
40HAVE_ORANGE="false"
41
42case "${CONFIG_TYPE}" in
43 2)
44 HAVE_ORANGE="true"
45 ;;
46 3)
47 HAVE_BLUE="true"
48 ;;
49 4)
50 HAVE_BLUE="true"
51 HAVE_ORANGE="true"
52 ;;
53esac
54
55HAVE_IPSEC="true"
56HAVE_OPENVPN="true"
57
58# INPUT
59
60# IPsec INPUT
61case "${HAVE_IPSEC},${POLICY}" in
62 true,MODE1) ;;
63 true,*)
64 iptables -A POLICYIN -m policy --pol ipsec --dir in -j ACCEPT
65 ;;
66esac
67
68# OpenVPN INPUT
69# Allow direct access to the internal IP addresses of the firewall
70# from remote subnets if forward policy is allowed.
71case "${HAVE_OPENVPN},${POLICY}" in
72 true,MODE1) ;;
73 true,*)
74 iptables -A POLICYIN -i tun+ -j ACCEPT
75 ;;
76esac
77
78case "${FWPOLICY2}" in
79 REJECT)
80 if [ "${DROPINPUT}" = "on" ]; then
81 iptables -A POLICYIN -m limit --limit 10/minute -j LOG --log-prefix "REJECT_INPUT "
82 fi
83 iptables -A POLICYIN -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_INPUT"
84 ;;
85 *) # DROP
86 if [ "${DROPINPUT}" = "on" ]; then
87 iptables -A POLICYIN -m limit --limit 10/minute -j LOG --log-prefix "DROP_INPUT "
88 fi
89 iptables -A POLICYIN -j DROP -m comment --comment "DROP_INPUT"
90 ;;
91esac
92
93# FORWARD
94case "${POLICY}" in
95 MODE1)
96 case "${FWPOLICY}" in
97 REJECT)
98 if [ "${DROPFORWARD}" = "on" ]; then
99 iptables -A POLICYFWD -m limit --limit 10/minute -j LOG --log-prefix "REJECT_FORWARD "
100 fi
101 iptables -A POLICYFWD -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_FORWARD"
102 ;;
103 *) # DROP
104 if [ "${DROPFORWARD}" = "on" ]; then
105 iptables -A POLICYFWD -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD "
106 fi
107 iptables -A POLICYFWD -j DROP -m comment --comment "DROP_FORWARD"
108 ;;
109 esac
110 ;;
111
112 *)
113 # Access from GREEN is granted to everywhere
114 if [ "${IFACE}" = "${GREEN_DEV}" ]; then
115 # internet via green
116 # don't check source IP/NET if IFACE is GREEN
117 iptables -A POLICYFWD -i "${GREEN_DEV}" -j ACCEPT
118 else
119 iptables -A POLICYFWD -i "${GREEN_DEV}" -s "${GREEN_NETADDRESS}/${GREEN_NETMASK}" -j ACCEPT
120 fi
121
122 # Grant access for IPsec VPN connections
123 iptables -A POLICYFWD -m policy --pol ipsec --dir in -j ACCEPT
124
125 # Grant access for OpenVPN connections
126 iptables -A POLICYFWD -i tun+ -j ACCEPT
127
128 if [ -n "${IFACE}" ]; then
129 if [ "${HAVE_BLUE}" = "true" ] && [ -n "${BLUE_DEV}" ]; then
130 iptables -A POLICYFWD -i "${BLUE_DEV}" -s "${BLUE_NETADDRESS}/${BLUE_NETMASK}" -o "${IFACE}" -j ACCEPT
131 fi
132
133 if [ "${HAVE_ORANGE}" = "true" ] && [ -n "${ORANGE_DEV}" ]; then
134 iptables -A POLICYFWD -i "${ORANGE_DEV}" -s "${ORANGE_NETADDRESS}/${ORANGE_NETMASK}" -o "${IFACE}" -j ACCEPT
135 fi
136 fi
137
138 if [ "${DROPFORWARD}" = "on" ]; then
139 iptables -A POLICYFWD -m limit --limit 10/minute -j LOG --log-prefix "DROP_FORWARD "
140 fi
141 iptables -A POLICYFWD -m comment --comment "DROP_FORWARD" -j DROP
142 ;;
143esac
144
145# OUTGOING
146case "${POLICY1}" in
147 MODE1)
148 case "${FWPOLICY1}" in
149 REJECT)
150 if [ "${DROPOUTGOING}" = "on" ]; then
151 iptables -A POLICYOUT -m limit --limit 10/minute -j LOG --log-prefix "REJECT_OUTPUT "
152 fi
153 iptables -A POLICYOUT -j REJECT --reject-with icmp-host-unreachable -m comment --comment "DROP_OUTPUT"
154 ;;
155 *) # DROP
156 if [ "${DROPOUTGOING}" == "on" ]; then
157 iptables -A POLICYOUT -m limit --limit 10/minute -j LOG --log-prefix "DROP_OUTPUT "
158 fi
159 iptables -A POLICYOUT -j DROP -m comment --comment "DROP_OUTPUT"
160 ;;
161 esac
162 ;;
163 *)
164 iptables -A POLICYOUT -j ACCEPT
165 iptables -A POLICYOUT -m comment --comment "DROP_OUTPUT" -j DROP
166 ;;
167esac
168
169exit 0