Commit | Line | Data |
---|---|---|
775bd287 | 1 | ### -*-sh-*- |
bfdc045d | 2 | ### |
a3972fea | 3 | ### Firewall configuration for radius |
bfdc045d MW |
4 | ### |
5 | ### (c) 2008 Mark Wooding | |
6 | ### | |
7 | ||
8 | ###----- Licensing notice --------------------------------------------------- | |
9 | ### | |
10 | ### This program is free software; you can redistribute it and/or modify | |
11 | ### it under the terms of the GNU General Public License as published by | |
12 | ### the Free Software Foundation; either version 2 of the License, or | |
13 | ### (at your option) any later version. | |
14 | ### | |
15 | ### This program is distributed in the hope that it will be useful, | |
16 | ### but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | ### GNU General Public License for more details. | |
19 | ### | |
20 | ### You should have received a copy of the GNU General Public License | |
21 | ### along with this program; if not, write to the Free Software Foundation, | |
22 | ### Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. | |
23 | ||
24 | ###-------------------------------------------------------------------------- | |
a3972fea | 25 | ### radius-specific rules. |
bfdc045d | 26 | |
1a42af95 | 27 | m4_divert(86)m4_dnl |
bfdc045d MW |
28 | ## Externally visible services. |
29 | allowservices inbound tcp \ | |
6f74cc82 | 30 | ident \ |
a3972fea | 31 | ssh |
bfdc045d | 32 | allowservices inbound udp \ |
a3972fea | 33 | tripe |
bfdc045d | 34 | |
a3972fea MW |
35 | ## Provide syslog for evolution. |
36 | run iptables -A inbound -j ACCEPT \ | |
37 | -s 172.29.198.2 \ | |
38 | -p udp --destination-port $port_syslog | |
39 | ||
bfdc045d MW |
40 | ## Other interesting things. |
41 | dnsresolver inbound | |
7dde20fa | 42 | dnsserver inbound |
bfdc045d | 43 | |
b44f4404 MW |
44 | ## IPv6 6-in-4 tunnel. |
45 | run iptables -A inbound -j ACCEPT \ | |
46 | -p $proto_ipv6 -s 216.66.80.26 | |
47 | ||
a83c9611 MW |
48 | ## Permitted special forwarding. |
49 | makeset fwd-allow-http nethash || : | |
50 | iptables -A fwd-spec-nofrag -j ACCEPT \ | |
51 | -m set --match-set fwd-allow-http dst \ | |
52 | -p tcp --destination-port $port_http \ | |
53 | -m mark --mark $to_untrusted/$MASK_TO | |
54 | iptables -A fwd-spec-nofrag -j ACCEPT \ | |
55 | -m set --match-set fwd-allow-http src \ | |
56 | -p tcp --destination-port $port_http \ | |
57 | -m mark --mark $from_untrusted/$MASK_FROM \ | |
58 | -m state --state ESTABLISHED | |
59 | ||
d052f343 | 60 | ## BCP38 filtering. Note that addresses here are seen before NAT is applied. |
295959ea MW |
61 | bcp38 4 ppp0 81.2.113.195 81.187.238.128/28 172.29.198.0/23 |
62 | bcp38 6 ppp0 2001:8b0:c92::/48 | |
d052f343 | 63 | |
27ca7c0e MW |
64 | ## NAT for RFC1918 addresses. |
65 | for i in PREROUTING OUTPUT POSTROUTING; do | |
66 | run iptables -t nat -P $i ACCEPT 2>/dev/null || : | |
67 | run iptables -t nat -F $i 2>/dev/null || : | |
68 | done | |
69 | run iptables -t nat -F | |
70 | run iptables -t nat -X | |
71 | ||
72 | run iptables -t nat -N outbound | |
8506ff83 | 73 | run iptables -t nat -A outbound -j RETURN ! -o ppp0 |
27ca7c0e | 74 | run iptables -t nat -A outbound -j RETURN ! -s 172.29.198.0/23 |
295959ea | 75 | run iptables -t nat -A outbound -j RETURN -d 81.187.238.128/28 |
27ca7c0e | 76 | run iptables -t nat -A outbound -j RETURN -d 172.29.198.0/23 |
eec061c0 MW |
77 | |
78 | ## An awful hack. | |
79 | ##run iptables -t nat -A outbound -j DNETMAP --reuse \ | |
295959ea | 80 | ## -s 172.29.199.44 --prefix 81.187.238.142 |
eec061c0 | 81 | ##run iptables -t nat -A outbound -j DNETMAP --reuse \ |
295959ea | 82 | ## -s 172.29.198.34 --prefix 81.187.238.142 |
eec061c0 | 83 | ##run iptables -t nat -A outbound -j DNETMAP --reuse \ |
295959ea | 84 | ## -s 172.29.198.11 --prefix 81.187.238.142 |
eec061c0 MW |
85 | ##run iptables -t nat -A PREROUTING -j DNETMAP |
86 | ||
295959ea | 87 | run iptables -t nat -A outbound -j SNAT --to-source 81.187.238.142 |
27ca7c0e MW |
88 | run iptables -t nat -A POSTROUTING -j outbound |
89 | ||
f6561602 MW |
90 | ## Set up NAT protocol helpers. In particular, SIP needs some special |
91 | ## twiddling. | |
92 | run modprobe nf_conntrack_sip \ | |
93 | ports=5060 \ | |
94 | sip_direct_signalling=0 \ | |
95 | sip_direct_media=0 | |
96 | for p in ftp sip h323; do | |
97 | run modprobe nf_nat_$p | |
98 | done | |
99 | ||
a92589b8 MW |
100 | ## Forbid anything complicated to the NAT address. Be sure to allow ident, |
101 | ## though. | |
295959ea | 102 | run iptables -A INPUT -d 81.187.238.142 -p tcp -j ACCEPT \ |
a92589b8 | 103 | -m multiport --destination-ports=113 |
295959ea | 104 | run iptables -A INPUT -d 81.187.238.142 ! -p icmp -j REJECT |
dad38065 | 105 | |
bfdc045d MW |
106 | m4_divert(-1) |
107 | ###----- That's all, folks -------------------------------------------------- |