## Turn off iptables filtering for bridges. We'll use ebtables if we need
## to; but right now the model is that we do filtering at the borders, and
## are tolerant of things which are local.
-for filter in arptables iptables ip6tables; do
- run sysctl -q net/bridge/bridge-nf-call-$filter=0
-done
+if [ -x /sbin/brctl ]; then
+ modprobe bridge || :
+ if [ -d /proc/sys/net/bridge ]; then
+ for filter in arptables iptables ip6tables; do
+ run sysctl -q net.bridge.bridge-nf-call-$filter=0
+ done
+ fi
+fi
## Turn on the reverse-path filter, and log weird things.
-setdevopt rp_filter 1
-setdevopt log_martians 1
+setdevopt rp_filter $rp_filter
+setdevopt log_martians $log_martians
## Turn off things which can mess with our routing decisions.
setdevopt accept_source_route 0
m4_divert(94)m4_dnl
## Locally generated packets are all OK.
-run iptables -P OUTPUT ACCEPT
+run ip46tables -P OUTPUT ACCEPT
## Other incoming things are forbidden.
for chain in INPUT FORWARD; do
- run iptables -A $chain -g forbidden
+ run ip46tables -A $chain -g forbidden
done
m4_divert(-1)