85 lines
2.1 KiB
Plaintext
Executable File
85 lines
2.1 KiB
Plaintext
Executable File
#!/sbin/runscript
|
|
# Copyright 1999-2004 Gentoo Foundation
|
|
# Distributed under the terms of the GNU General Public License v2
|
|
|
|
opts="start stop reload"
|
|
|
|
depend() {
|
|
before net
|
|
need logger
|
|
}
|
|
|
|
start() {
|
|
ebegin "Starting firewall"
|
|
|
|
# enable IP forwarding
|
|
echo 1 > /proc/sys/net/ipv4/ip_forward
|
|
|
|
# default policy is DROP
|
|
/sbin/iptables -P INPUT DROP
|
|
/sbin/iptables -P OUTPUT DROP
|
|
/sbin/iptables -P FORWARD DROP
|
|
|
|
# allow esp
|
|
iptables -A INPUT -i eth0 -p 50 -j ACCEPT
|
|
iptables -A OUTPUT -o eth0 -p 50 -j ACCEPT
|
|
|
|
# allow IKE
|
|
iptables -A INPUT -i eth0 -p udp --sport 500 --dport 500 -j ACCEPT
|
|
iptables -A OUTPUT -o eth0 -p udp --dport 500 --sport 500 -j ACCEPT
|
|
|
|
# allow MobIKE
|
|
iptables -A INPUT -i eth0 -p udp --sport 4500 --dport 4500 -j ACCEPT
|
|
iptables -A OUTPUT -o eth0 -p udp --dport 4500 --sport 4500 -j ACCEPT
|
|
|
|
# allow crl fetch from winnetou
|
|
iptables -A INPUT -i eth0 -p tcp --sport 80 -s PH_IP_WINNETOU -j ACCEPT
|
|
iptables -A OUTPUT -o eth0 -p tcp --dport 80 -d PH_IP_WINNETOU -j ACCEPT
|
|
|
|
# allow ssh
|
|
iptables -A INPUT -p tcp --dport 22 -j ACCEPT
|
|
iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
|
|
|
|
# allow icmp in local net
|
|
iptables -A INPUT -i eth1 -p icmp -j ACCEPT
|
|
iptables -A OUTPUT -o eth1 -p icmp -j ACCEPT
|
|
|
|
eend $?
|
|
}
|
|
|
|
stop() {
|
|
ebegin "Stopping firewall"
|
|
for a in `cat /proc/net/ip_tables_names`; do
|
|
/sbin/iptables -F -t $a
|
|
/sbin/iptables -X -t $a
|
|
|
|
if [ $a == nat ]; then
|
|
/sbin/iptables -t nat -P PREROUTING ACCEPT
|
|
/sbin/iptables -t nat -P POSTROUTING ACCEPT
|
|
/sbin/iptables -t nat -P OUTPUT ACCEPT
|
|
elif [ $a == mangle ]; then
|
|
/sbin/iptables -t mangle -P PREROUTING ACCEPT
|
|
/sbin/iptables -t mangle -P INPUT ACCEPT
|
|
/sbin/iptables -t mangle -P FORWARD ACCEPT
|
|
/sbin/iptables -t mangle -P OUTPUT ACCEPT
|
|
/sbin/iptables -t mangle -P POSTROUTING ACCEPT
|
|
elif [ $a == filter ]; then
|
|
/sbin/iptables -t filter -P INPUT ACCEPT
|
|
/sbin/iptables -t filter -P FORWARD ACCEPT
|
|
/sbin/iptables -t filter -P OUTPUT ACCEPT
|
|
fi
|
|
done
|
|
eend $?
|
|
}
|
|
|
|
reload() {
|
|
ebegin "Flushing firewall"
|
|
for a in `cat /proc/net/ip_tables_names`; do
|
|
/sbin/iptables -F -t $a
|
|
/sbin/iptables -X -t $a
|
|
done;
|
|
eend $?
|
|
start
|
|
}
|
|
|