Add support for WireGuard.

This commit is contained in:
2021-11-22 18:35:58 +01:00
parent 1d2d6a6fae
commit b464b0c039
8 changed files with 310 additions and 0 deletions

View File

@ -35,6 +35,7 @@ standard_telnet_port=23
standard_tftp_udp_port=69
standard_timeserver_port=37
standard_vpn_port=1194
standard_wg_port=51820
standard_whois_port=43
standard_xymon_port=1984

View File

@ -22,9 +22,17 @@ ext_if_static_3=""
ext_ifs_static="$ext_if_static_1 $ext_if_static_2 $ext_if_static_3"
# - VPN Interfaces
# -
# - (blank separated list)
# -
vpn_ifs="tun+"
# - WireGuard Interfaces
# -
# - (blank separated list)
# -
wg_ifs="wg+"
# - Local Interfaces
local_if_1=""
local_if_2=""

View File

@ -26,9 +26,17 @@ ext_if_static_3=""
ext_ifs_static="$ext_if_static_1 $ext_if_static_2 $ext_if_static_3"
# - VPN Interfaces
# -
# - (blank separated list)
# -
vpn_ifs="tun+"
# - WireGuard Interfaces
# -
# - (blank separated list)
# -
wg_ifs="wg+"
# - Local Interfaces
local_if_1=""
local_if_2=""

View File

@ -536,6 +536,36 @@ declare -A vpn_server_dmz_arr
vpn_local_net_ports="1194"
# ======
# - WireGuard Service
# ======
# - WireGuard Service on Gateway?
# -
local_wg_service=true
wg_gw_ports="$standard_wg_port"
# - WireGuard Services DMZ (reachable also from WAN)
# -
# - wg_server_dmz_arr=[<ip-address>]=<dsl-device>
# -
# - Note:
# - Each extern interface can have only one thuch service
# -
# - wg_server_dmz_arr[192.168.10.1]=$ext_if_dsl_2
# - wg_server_dmz_arr[192.168.10.13]=$ext_if_dsl_1
# -
# - Multiple settins of this parameter is possible
# -
declare -A wg_server_dmz_arr
# - Local WireGuard Ports
# -
# - Blank separated list
# -
wg_local_net_ports="$standard_wg_port"
# ======
# - DHCP Service
# ======
@ -1530,6 +1560,10 @@ allow_samba_requests_out=true
allow_vpn_out=true
vpn_out_ports="1194 1195 1196"
# WireGuard
#
allow_wg_out=true
wg_out_ports="$standard_wg_port"
allow_cisco_vpn_out=true
cisco_vpn_out_ports="$standard_isakmp_port $standard_ipsec_nat_t"

View File

@ -521,6 +521,36 @@ declare -A vpn_server_dmz_arr
vpn_local_net_ports="1194"
# ======
# - WireGuard Service
# ======
# - WireGuard Service on Gateway?
# -
local_wg_service=true
wg_gw_ports="$standard_wg_port"
# - WireGuard Services DMZ (reachable also from WAN)
# -
# - wg_server_dmz_arr=[<ip-address>]=<dsl-device>
# -
# - Note:
# - Each extern interface can have only one thuch service
# -
# - wg_server_dmz_arr[2001:6f8:107e:63::20]=$ext_if_dsl_2
# - wg_server_dmz_arr[2001:6f8:107e:63::40]=$ext_if_dsl_1
# -
# - Multiple settins of this parameter is possible
# -
declare -A wg_server_dmz_arr
# - Local WireGuard Ports
# -
# - Blank separated list
# -
wg_local_net_ports="$standard_wg_port"
# ======
# - DHCP Service
# ======
@ -1445,6 +1475,10 @@ allow_samba_requests_out=true
allow_vpn_out=true
vpn_out_ports="1194 1195 1196"
# WireGuard
#
allow_wg_out=true
wg_out_ports="$standard_wg_port"
allow_cisco_vpn_out=true
cisco_vpn_out_ports="$standard_isakmp_port $standard_ipsec_nat_t"

View File

@ -542,6 +542,25 @@ for _port in $vpn_out_ports ; do
vpn_out_port_arr+=("$_port")
done
# ---
# - WireGuard Ports
# ---
declare -a wg_gw_port_arr
for _port in $wg_gw_ports ; do
wg_gw_port_arr+=("$_port")
done
declare -a wg_local_net_port_arr
for _port in $wg_local_net_ports ; do
wg_local_net_port_arr+=("$_port")
done
declare -a wg_out_port_arr
if [[ -z "$wg_out_ports" ]] ; then
wg_out_ports="$standard_wg_port"
fi
for _port in $wg_out_ports ; do
wg_out_port_arr+=("$_port")
done
# ---
# - Rsync Out Ports
# --