router/nftables.conf

113 lines
3.0 KiB
Plaintext

define WAN = eth0
define LAN = lan0
define FACELESS_TCP_PORTS = { 443, 80, 2222, 2200 }
# define FACELESS_UDP_PORTS = 60000-60009
define DRAGON_TCP_PORTS = { 2221 }
# define DRAGON_UDP_PORTS = 60020-60029
table inet filter {
chain input {
type filter hook input priority filter; policy accept;
iifname "lo" accept
ct state { established, related } accept
ct state invalid drop
ip protocol icmp accept
meta l4proto ipv6-icmp accept
tcp dport { 22 } accept
udp dport { 546, 53, 67 } accept
drop
}
chain forward {
type filter hook forward priority filter; policy accept;
accept
}
chain output {
type filter hook output priority filter; policy accept;
accept
}
}
table ip nat {
chain postrouting {
type nat hook postrouting priority 100; policy accept;
oifname $LAN masquerade
}
chain prerouting {
type nat hook prerouting priority -100; policy accept;
# ip daddr 10.0.0.1 tcp dport ( 2221 ) dnat to 10.0.0.5:22
# ip daddr 10.0.0.1 udp dport ( 60020 ) dnat to 10.0.0.5:60020
# ip daddr 10.0.0.1 udp dport ( 60021 ) dnat to 10.0.0.5:60021
# ip daddr 10.0.0.1 tcp dport ( 80 ) dnat to 10.0.0.10:80
# ip daddr 10.0.0.1 tcp dport ( 443 ) dnat to 10.0.0.10:443
# ip daddr 10.0.0.1 tcp dport ( 2222 ) dnat to 10.0.0.10:2222
# ip daddr 10.0.0.1 tcp dport ( 2200 ) dnat to 10.0.0.10:22
iifname $WAN tcp dport { 443, 80 } dnat to 10.0.0.10
# iifname "lan0" tcp dport { 443, 80 } dnat to 10.0.0.10
}
}
# the following two blocks were generated by restarting systemd-networkd and
# dumping nftables
# nat ipv4 for lan
table ip io.systemd.nat {
set masq_saddr {
type ipv4_addr
flags interval
elements = { 10.0.0.0/24 }
}
map map_port_ipport {
type inet_proto . inet_service : ipv4_addr . inet_service
}
chain prerouting {
type nat hook prerouting priority dstnat + 1; policy accept;
fib daddr type local dnat ip addr . port to meta l4proto . th dport map @map_port_ipport
}
chain output {
type nat hook output priority -99; policy accept;
ip daddr != 127.0.0.0/8 oif "lo" dnat ip addr . port to meta l4proto . th dport map @map_port_ipport
}
chain postrouting {
type nat hook postrouting priority srcnat + 1; policy accept;
ip saddr @masq_saddr masquerade
}
}
# nat ipv6 for lan (probably unnecessary?)
table ip6 io.systemd.nat {
set masq_saddr {
type ipv6_addr
flags interval
}
map map_port_ipport {
type inet_proto . inet_service : ipv6_addr . inet_service
}
chain prerouting {
type nat hook prerouting priority dstnat + 1; policy accept;
fib daddr type local dnat ip6 addr . port to meta l4proto . th dport map @map_port_ipport
}
chain output {
type nat hook output priority -99; policy accept;
ip6 daddr != ::1 oif "lo" dnat ip6 addr . port to meta l4proto . th dport map @map_port_ipport
}
chain postrouting {
type nat hook postrouting priority srcnat + 1; policy accept;
ip6 saddr @masq_saddr masquerade
}
}