diff options
author | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-08-26 18:10:01 +0000 |
---|---|---|
committer | Nicolas Fort <nicolasfort1988@gmail.com> | 2024-08-28 12:19:19 +0000 |
commit | 8e0e1a99e5510c7575ab8a09145d6b4354692d55 (patch) | |
tree | 12c4d27314384f84b67a5e370e9d8f181ea15742 /data/templates | |
parent | 003209eeab231675e82abb8cf6eab7ca0384bc3f (diff) | |
download | vyos-1x-8e0e1a99e5510c7575ab8a09145d6b4354692d55.tar.gz vyos-1x-8e0e1a99e5510c7575ab8a09145d6b4354692d55.zip |
T6647: firewall. Introduce patch for accepting ARP and DHCP replies on stateful bridge firewall. This patch is needed because ARP and DHCP are marked as invalid connections. Also, add ehternet-type matcher in bridge firewall.
Diffstat (limited to 'data/templates')
-rwxr-xr-x | data/templates/firewall/nftables.j2 | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/data/templates/firewall/nftables.j2 b/data/templates/firewall/nftables.j2 index 155b7f4d0..034328400 100755 --- a/data/templates/firewall/nftables.j2 +++ b/data/templates/firewall/nftables.j2 @@ -376,8 +376,14 @@ table bridge vyos_filter { {% if bridge.output is vyos_defined %} {% for prior, conf in bridge.output.items() %} - chain VYOS_OUTUT_{{ prior }} { + chain VYOS_OUTPUT_{{ prior }} { type filter hook output priority {{ prior }}; policy accept; +{% if global_options.apply_to_bridged_traffic is vyos_defined %} +{% if 'invalid_connections' in global_options.apply_to_bridged_traffic %} + ct state invalid udp sport 67 udp dport 68 counter accept + ct state invalid ether type arp counter accept +{% endif %} +{% endif %} {% if global_options.state_policy is vyos_defined %} jump VYOS_STATE_POLICY {% endif %} |