Changeset b68978d in freewrt for package/iptables
- Timestamp:
- Aug 17, 2025, 12:45:07 PM (4 months ago)
- Branches:
- freewrt_2_0
- Children:
- f15c9543
- Parents:
- b07a1b5
- git-author:
- Waldemar Brodkorb <wbx@…> (08/17/25 12:44:26)
- git-committer:
- Waldemar Brodkorb <wbx@…> (08/17/25 12:45:07)
- Location:
- package/iptables
- Files:
-
- 1 added
- 3 edited
-
Config.in (modified) (3 diffs)
-
Makefile (modified) (2 diffs)
-
files/firewall.conf (modified) (4 diffs)
-
ipkg/iptables-mod-reject.control (added)
Legend:
- Unmodified
- Added
- Removed
-
package/iptables/Config.in
rb07a1b5 rb68978d 16 16 http://www.iptables.org/ 17 17 18 config FWRT_PACKAGE_IP6TABLES 19 prompt "ip6tables......................... IPv6 firewall administration tool" 20 tristate 21 default n 22 select FWRT_COMPILE_IPTABLES 23 select FWRT_PACKAGE_KMOD_IPV6 24 help 25 IPv6 firewall, NAT, and packet mangling tools. 26 27 http://www.iptables.org/ 28 29 config FWRT_PACKAGE_IPTABLES_FIREWALL_SCRIPT 30 prompt "iptables-fw-script.............. FreeWRT's firewall script" 31 tristate 32 default y 33 depends FWRT_PACKAGE_IPTABLES 34 help 35 FreeWRT's default firewall script 36 18 37 config FWRT_PACKAGE_IPTABLES_MOD_CONNTRACK 19 38 prompt "iptables-mod-conntrack.......... Iptables extensions for connection tracking" … … 21 40 default n 22 41 depends FWRT_PACKAGE_IPTABLES 23 select FWRT_PACKAGE_KMOD_IPT_CONNTRACK24 42 help 25 43 Iptables (IPv4) extensions for connection tracking 26 44 27 Includes: 28 * libipt_conntrack 29 * libipt_helper 30 * libipt_connmark/CONNMARK 45 config FWRT_PACKAGE_IPTABLES_MOD_REJECT 46 prompt "iptables-mod-reject............. Iptables extensions for REJECT target" 47 tristate 48 default n 49 depends FWRT_PACKAGE_IPTABLES 50 help 51 Iptables (IPv4) extensions for REJECT target 31 52 32 53 config FWRT_PACKAGE_IPTABLES_MOD_FILTER … … 141 162 http://www.iptables.org/ 142 163 143 config FWRT_PACKAGE_IPTABLES_FIREWALL_SCRIPT144 prompt "iptables-fw-script.............. FreeWRT's firewall script"145 tristate146 default y147 depends FWRT_PACKAGE_IPTABLES148 help149 FreeWRT's default firewall script150 151 config FWRT_PACKAGE_IP6TABLES152 prompt "ip6tables......................... IPv6 firewall administration tool"153 tristate154 default n155 select FWRT_COMPILE_IPTABLES156 select FWRT_PACKAGE_KMOD_IPV6157 help158 IPv6 firewall, NAT, and packet mangling tools.159 160 http://www.iptables.org/ -
package/iptables/Makefile
rb07a1b5 rb68978d 36 36 37 37 $(eval $(call PKG_template,IPTABLES_MOD_CONNTRACK,iptables-mod-conntrack,$(PKG_VERSION)-$(PKG_RELEASE),$(ARCH))) 38 $(eval $(call PKG_template,IPTABLES_MOD_REJECT,iptables-mod-reject,$(PKG_VERSION)-$(PKG_RELEASE),$(ARCH))) 39 $(eval $(call PKG_template,IPTABLES_MOD_TCPMSS,iptables-mod-tcpmss,$(PKG_VERSION)-$(PKG_RELEASE),$(ARCH))) 38 40 $(eval $(call PKG_template,IPTABLES_MOD_EXTRA,iptables-mod-extra,$(PKG_VERSION)-$(PKG_RELEASE),$(ARCH))) 39 41 $(eval $(call PKG_template,IPTABLES_MOD_FILTER,iptables-mod-filter,$(PKG_VERSION)-$(PKG_RELEASE),$(ARCH))) … … 45 47 46 48 $(eval $(call IPKG_plugin_template,IPTABLES_MOD_CONNTRACK,$(IPT_CONNTRACK-m))) 49 $(eval $(call IPKG_plugin_template,IPTABLES_MOD_REJECT,$(IPT_REJECT-m))) 50 $(eval $(call IPKG_plugin_template,IPTABLES_MOD_TCPMSS,$(IPT_TCPMSS-m))) 47 51 $(eval $(call IPKG_plugin_template,IPTABLES_MOD_EXTRA,$(IPT_EXTRA-m))) 48 52 $(eval $(call IPKG_plugin_template,IPTABLES_MOD_FILTER,$(IPT_FILTER-m),layer7-install)) -
package/iptables/files/firewall.conf
rb07a1b5 rb68978d 4 4 exit 1 5 5 ### Interfaces 6 WAN= ppp07 LAN= br08 WLAN= eth16 WAN=eth0.1 7 LAN=eth0.0 8 WLAN=wlan0 9 9 10 10 ###################################################################### … … 26 26 27 27 # base case 28 iptables -A INPUT -m state --state INVALID -j DROP29 iptables -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT30 iptables -A INPUT -p tcp --tcp-flags SYN SYN --tcp-option \!2 -j DROP28 iptables -A INPUT -m conntrack --ctstate INVALID -j DROP 29 iptables -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 30 iptables -A INPUT -p tcp --tcp-flags SYN SYN \! --tcp-option 2 -j DROP 31 31 32 32 # custom rules … … 46 46 47 47 # base case 48 iptables -A OUTPUT -m state --state INVALID -j DROP49 iptables -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT48 iptables -A OUTPUT -m conntrack --ctstate INVALID -j DROP 49 iptables -A OUTPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 50 50 51 51 ### FORWARD … … 53 53 54 54 # base case 55 iptables -A FORWARD -m state --state INVALID -j DROP55 iptables -A FORWARD -m conntrack --ctstate INVALID -j DROP 56 56 iptables -A FORWARD -p tcp -o $WAN --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 57 iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT57 iptables -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 58 58 59 59 # custom rules
Note:
See TracChangeset
for help on using the changeset viewer.
