Add nftables.conf workstation firewall config
This commit is contained in:
parent
74210dcea8
commit
840147f9d6
1 changed files with 43 additions and 0 deletions
43
roles/debian/files/nftables.conf
Executable file
43
roles/debian/files/nftables.conf
Executable file
|
@ -0,0 +1,43 @@
|
|||
#!/usr/sbin/nft -f
|
||||
|
||||
flush ruleset
|
||||
|
||||
table inet filter {
|
||||
chain input {
|
||||
type filter hook input priority 0; policy accept;
|
||||
|
||||
# Accept any localhost and libvirt traffic.
|
||||
iif "lo" accept
|
||||
iif "virbr0" accept
|
||||
|
||||
# Accept traffic originated from us.
|
||||
ct state established,related accept
|
||||
|
||||
# Open ports for public services.
|
||||
tcp dport ssh ct state new accept
|
||||
tcp dport 8000 ct state new accept # Python HTTP server.
|
||||
|
||||
# Accept neighbour discovery otherwise IPv6 connectivity breaks.
|
||||
ip6 nexthdr icmpv6 icmpv6 type { nd-neighbor-solicit, nd-router-advert, nd-neighbor-advert } accept
|
||||
|
||||
# Count and drop any other traffic.
|
||||
counter drop
|
||||
}
|
||||
|
||||
chain forward {
|
||||
type filter hook forward priority 0; policy accept;
|
||||
}
|
||||
|
||||
chain output {
|
||||
type filter hook output priority 0; policy accept;
|
||||
}
|
||||
}
|
||||
|
||||
table ip nat {
|
||||
chain postrouting {
|
||||
type nat hook postrouting priority 100;
|
||||
|
||||
# Masquerade NAT traffic (useful for VMs).
|
||||
masquerade
|
||||
}
|
||||
}
|
Loading…
Reference in a new issue