radius.m4: Take over NAT duties.
[firewall] / radius.m4
CommitLineData
775bd287 1### -*-sh-*-
bfdc045d 2###
a3972fea 3### Firewall configuration for radius
bfdc045d
MW
4###
5### (c) 2008 Mark Wooding
6###
7
8###----- Licensing notice ---------------------------------------------------
9###
10### This program is free software; you can redistribute it and/or modify
11### it under the terms of the GNU General Public License as published by
12### the Free Software Foundation; either version 2 of the License, or
13### (at your option) any later version.
14###
15### This program is distributed in the hope that it will be useful,
16### but WITHOUT ANY WARRANTY; without even the implied warranty of
17### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18### GNU General Public License for more details.
19###
20### You should have received a copy of the GNU General Public License
21### along with this program; if not, write to the Free Software Foundation,
22### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
23
24###--------------------------------------------------------------------------
08926d25
MW
25### Config settings.
26
27## This router is involved in a routing asymmetry.
28setconf(rp_filter, 0)
29setconf(log_martians, 0)
30
31###--------------------------------------------------------------------------
bfdc045d
MW
32### Network interfaces.
33
34m4_divert(44)m4_dnl
35## Interface definitions.
08926d25
MW
36if_dmz=eth0
37if_trusted=eth1
38if_safe=eth2
39if_untrusted=eth3
40if_vpn=$if_dmz,$if_trusted
41if_iodine=$if_dmz,$if_trusted
42if_its_mz=$if_dmz,$if_trusted
43if_its_pi=$if_dmz,$if_trusted
bfdc045d
MW
44
45m4_divert(-1)
46###--------------------------------------------------------------------------
a3972fea 47### radius-specific rules.
bfdc045d
MW
48
49m4_divert(82)m4_dnl
50## Externally visible services.
51allowservices inbound tcp \
a3972fea
MW
52 dns iodine \
53 ssh
bfdc045d 54allowservices inbound udp \
a3972fea
MW
55 dns iodine \
56 tripe
bfdc045d
MW
57
58## Provide DNS resolution to local untrusted hosts.
59for p in tcp udp; do
60 run iptables -A inbound -j ACCEPT \
61 -s 172.29.198.0/24 \
62 -p $p --destination-port $port_dns
63done
64
a3972fea
MW
65## Provide syslog for evolution.
66run iptables -A inbound -j ACCEPT \
67 -s 172.29.198.2 \
68 -p udp --destination-port $port_syslog
69
bfdc045d
MW
70## Other interesting things.
71dnsresolver inbound
bfdc045d 72
27ca7c0e
MW
73## NAT for RFC1918 addresses.
74for i in PREROUTING OUTPUT POSTROUTING; do
75 run iptables -t nat -P $i ACCEPT 2>/dev/null || :
76 run iptables -t nat -F $i 2>/dev/null || :
77done
78run iptables -t nat -F
79run iptables -t nat -X
80
81run iptables -t nat -N outbound
82run iptables -t nat -A outbound -j RETURN ! -o $if_dmz
83run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23
84run iptables -t nat -A outbound -j RETURN -d 62.49.204.144/28
85run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23
86run iptables -t nat -A outbound -j SNAT --to-source 62.49.204.158
87run iptables -t nat -A POSTROUTING -j outbound
88
bfdc045d
MW
89m4_divert(-1)
90###----- That's all, folks --------------------------------------------------