Initial import
This commit is contained in:
commit
57c6813b9a
|
@ -0,0 +1,41 @@
|
|||
# Default debian config. Please, take a look at conntrackd.conf(5)
|
||||
|
||||
General {
|
||||
HashSize 8192
|
||||
HashLimit 65535
|
||||
|
||||
Syslog on
|
||||
|
||||
LockFile /var/lock/conntrackd.lock
|
||||
|
||||
UNIX {
|
||||
Path /var/run/conntrackd.sock
|
||||
Backlog 20
|
||||
}
|
||||
|
||||
SocketBufferSize 262142
|
||||
SocketBufferSizeMaxGrown 655355
|
||||
|
||||
# default debian service unit file is of Type=notify
|
||||
Systemd on
|
||||
}
|
||||
|
||||
Sync {
|
||||
Mode NOTRACK {
|
||||
DisableInternalCache On
|
||||
DisableExternalCache On
|
||||
}
|
||||
TCP {
|
||||
IPv4_address 10.0.5.1
|
||||
IPv4_Destination_Address 10.0.5.2
|
||||
Port 3780
|
||||
Interface enp0s9
|
||||
SndSocketBuffer 1249280
|
||||
RcvSocketBuffer 1249280
|
||||
Checksum on
|
||||
}
|
||||
Options {
|
||||
TCPWindowTracking Off
|
||||
ExpectationSync On
|
||||
}
|
||||
}
|
|
@ -0,0 +1,19 @@
|
|||
vrrp_instance fw_vrrp {
|
||||
virtual_router_id 42
|
||||
state BACKUP
|
||||
interface enp0s9
|
||||
unicast_peer {
|
||||
10.0.5.2
|
||||
}
|
||||
authentication {
|
||||
auth_type PASS
|
||||
auth_pass foo253
|
||||
}
|
||||
virtual_ipaddress {
|
||||
10.10.32.1/24 dev enp0s3 -nodad
|
||||
10.251.32.2/24 dev enp0s8 -nodad
|
||||
}
|
||||
priority 200
|
||||
advert_int 1
|
||||
nopreempt
|
||||
}
|
|
@ -0,0 +1,53 @@
|
|||
#!/usr/sbin/nft -f
|
||||
|
||||
flush ruleset
|
||||
|
||||
define iface_intern = enp0s3
|
||||
define iface_extern = enp0s8
|
||||
|
||||
table inet filter {
|
||||
chain input {
|
||||
type filter hook input priority 0; policy drop;
|
||||
iif lo accept
|
||||
ct state established,related counter accept
|
||||
}
|
||||
chain output {
|
||||
type filter hook output priority 0; policy drop;
|
||||
counter accept comment "Allow all outbound traffic for FW"
|
||||
}
|
||||
chain global_deny {
|
||||
counter
|
||||
}
|
||||
chain global_accept {
|
||||
icmp type echo-request accept
|
||||
counter
|
||||
}
|
||||
chain forward_traffic_in {
|
||||
type filter hook forward priority 0; policy drop;
|
||||
ct state established,related counter accept comment "Accept already allowed traffic"
|
||||
jump global_deny
|
||||
jump global_accept
|
||||
iif $iface_intern counter goto from_intern
|
||||
iif $iface_extern counter goto from_extern
|
||||
counter log prefix "DROP forward_traffic_in " drop
|
||||
}
|
||||
chain forward_traffic_out {
|
||||
oif $iface_intern counter goto into_intern
|
||||
oif $iface_extern counter goto into_extern
|
||||
counter log prefix "DROP forward_traffic_out " drop
|
||||
}
|
||||
chain from_intern {
|
||||
counter log prefix "DROP from_intern " drop
|
||||
}
|
||||
chain into_intern {
|
||||
counter accept
|
||||
counter log prefix "DROP into_intern " drop
|
||||
}
|
||||
chain from_extern {
|
||||
counter log prefix "DROP from_extern " drop
|
||||
}
|
||||
chain into_extern {
|
||||
counter accept
|
||||
counter log prefix "DROP into_extern " drop
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue