2.2 KiB
*filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0]
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m state –state RELATED,ESTABLISHED -j ACCEPT -A OUTPUT -m state –state RELATED,ESTABLISHED -j ACCEPT
{% if blocked_ips is defined %} {% for ip in blocked_ips %} -A INPUT -s {{ ip }} -j DROP {% endfor %} {% endif %}
-A INPUT -m conntrack –ctstate NEW -m tcp -p tcp –dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp –dport 5666 -s 192.168.1.10 -j ACCEPT -A INPUT -p tcp -m tcp –dport 5666 -s 192.168.1.166 -j ACCEPT
-A INPUT -p tcp -m tcp –dport 5666 -s 209.132.181.102 -j ACCEPT -A INPUT -p tcp -m tcp –dport 5666 -s 209.132.181.35 -j ACCEPT
{% if tcp_ports_eth0 is defined %} {% for port in tcp_ports_eth0 %} -A INPUT -p tcp -m tcp -i eth0 –dport {{ port }} -j ACCEPT {% endfor %} {% endif %}
{% if udp_ports_eth0 is defined %} {% for port in udp_ports_eth0 %} -A INPUT -p udp -m udp -i eth0 –dport {{ port }} -j ACCEPT {% endfor %} {% endif %}
{% if tcp_ports_eth1 is defined %} {% for port in tcp_ports_eth1 %} -A INPUT -p tcp -m tcp -i eth1 –dport {{ port }} -j ACCEPT {% endfor %} {% endif %}
{% if udp_ports_eth1 is defined %} {% for port in udp_ports_eth1 %} -A INPUT -p udp -m udp -i eth1 –dport {{ port }} -j ACCEPT {% endfor %} {% endif %}
{% if custom_rules is defined %} {% for rule in custom_rules %} {{ rule }} {% endfor %} {% endif %}
-A INPUT -j REJECT –reject-with icmp-host-prohibited -A FORWARD -j REJECT –reject-with icmp-host-prohibited COMMIT
{% if nat_rules %} *nat :PREROUTING ACCEPT [0:] :INPUT ACCEPT [0:] :OUTPUT ACCEPT [0:0] :POSTROUTING ACCEPT [0:0]
{% for rule in nat_rules %} {{ rule }} {% endfor %} COMMIT {% endif %}