Support dhcp client on gateway on extern interfaces.
This commit is contained in:
@ -186,6 +186,7 @@ $ip6t -F -t raw
|
||||
$ip6t -X
|
||||
$ip6t -Z
|
||||
|
||||
#$ip6t -t nat -A POSTROUTING -o $ext_if_static_1 -j MASQUERADE
|
||||
$ip6t -I FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
|
||||
|
||||
echo_done # Flushing firewall iptable (IPv6)..
|
||||
@ -1144,7 +1145,21 @@ echo -e "\t\033[37m\033[1mAdd Rules for Services..\033[m"
|
||||
# - DHCP
|
||||
# ---
|
||||
|
||||
echononl "\t\tDHCP"
|
||||
echononl "\t\tLocal DHCP Client"
|
||||
|
||||
if [[ ${#dhcp_client_interfaces_arr[@]} -gt 0 ]] ; then
|
||||
for _dev in ${dhcp_client_interfaces_arr[@]} ; do
|
||||
$ip6t -A INPUT -i $_dev -p udp -m udp --dport 546 -j ACCEPT
|
||||
$ip6t -A OUTPUT -o $_dev -p udp -m udp --dport 547 -j ACCEPT
|
||||
done
|
||||
|
||||
echo_done
|
||||
else
|
||||
echo_skipped
|
||||
fi
|
||||
|
||||
|
||||
echononl "\t\tDHCP Service (local network only)"
|
||||
|
||||
if $local_dhcp_service ; then
|
||||
for _dev in ${local_if_arr[@]} ; do
|
||||
@ -1190,13 +1205,13 @@ echononl "\t\tDNS out only"
|
||||
for _dev in ${ext_if_arr[@]} ; do
|
||||
# - out from local and virtual mashine(s)
|
||||
$ip6t -A OUTPUT -o $_dev -p udp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
#$ip6t -A OUTPUT -o $_dev -p tcp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
$ip6t -A OUTPUT -o $_dev -p tcp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
|
||||
# - Only useful (needed) if kernel forwarding is activated (kernel_forward_between_interfaces=true)
|
||||
if $kernel_forward_between_interfaces && ! $permit_local_net_to_inet ; then
|
||||
# - forward from virtual mashine(s)
|
||||
$ip6t -A FORWARD -o $_dev -p udp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
#$ip6t -A FORWARD -o $_dev -p tcp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
$ip6t -A FORWARD -o $_dev -p tcp --dport 53 -m conntrack --ctstate NEW -j ACCEPT
|
||||
fi
|
||||
done
|
||||
|
||||
|
Reference in New Issue
Block a user