summaryrefslogtreecommitdiff
path: root/scripts
AgeCommit message (Collapse)Author
2018-04-19Task T35 - enable prune-deleted-sets for inet6 family firewall templatesMarian Tudosoiu
2018-04-11Task T35 - fixing prune_deleted_sets for inet6 familyMarian Tudosoiu
2018-03-14Task T35 change to place ipv6 address-groups and network groups under group ↵Marian Tudosoiu
config tree
2018-03-12Task T35 - add support for IPv6 firewall adddress and network groupsMarian Tudosoiu
2018-02-19Bug #T171 fix Open Task T171 Unable to Delte Rulemtudosoiu
2017-04-27update the way status of snmpd is calledKim
2016-05-20Revert "vyatta-cfg-firewall: update nfct commands to use the new syntax"Kim Hagen
Debian jessie version still uses older syntax This reverts commit 8c08408d1309b2664067b3a793d7df3b24d36cf3.
2015-11-28vyatta-cfg-firewall: check rules for errors before processing themAlex Harpin
Errors in firewall rules can cause either rules to be overwritten (completely or partially), dropped entirely, or just ending up with an inconsistent state in comparison to the current configuration. This can lead to unpredictable firewall results, which can't even be corrected by deleting all the firewall rules, only a reboot or manual intervention will correct the issue. Checking these rules for consistency in a separate loop before they are applied allows the errors to flagged up and the commit failed before the iptables are touched. Bug #623 http://bugzilla.vyos.net/show_bug.cgi?id=623
2015-11-28vyatta-cfg-firewall: formatting changes for style consistencyAlex Harpin
Update scripts/firewall/vyatta-firewall.pl to maintain style and consistency.
2015-11-28vyatta-cfg-firewall: update nfct commands to use the new syntaxAlex Harpin
Update the nfcft commands to use the new style syntax rather than the old, following the update of conntrack-tools to 1.4.3.
2015-06-24vyatta-cfg-firewall: add port 1536 to the initial ct helper chainAlex Harpin
Add port 1536 to the initial VYATTA_CT_HELPER chain inline with the conntrack sqlnet module change in vyatta-conntrack. Bug #412 http://bugzilla.vyos.net/show_bug.cgi?id=412
2015-05-14Added support for local PBR to vyatta-firewall.plPasi Karkkainen
2015-02-15Add SNPT and DNPT firewall hooks and load ip6t_NPT kernel module (#387)kouak
2014-11-21Fix missing autogenerated chain for IPv6 policy routing.William Steve Applegate
Signed-off-by: Daniil Baturin <daniil@baturin.org>
2014-08-01Bug #45: add port range validation script.Daniil Baturin
2013-05-22Add script to generate trapsJames Davidson
When a firewall configuration change is made, and trap can be generated to track who changed the configuration and what the configuration change was.
2012-11-21fix for 8492. Don't declare error and bail out on attempt to deletion of ipset.Gaurav Sinha
(cherry picked from commit 5853281f2c8514a40608b1e83eca65e4c25aae00)
2012-11-19Bugfix 7613: cleanup firewall groups correctlyJohn Southworth
2012-11-19Add show functions for allowed scripts for firewall groupsGaurav Sinha
(cherry picked from commit 8a2bc83dff27b99a6cde3c396936741d96dc915c) (cherry picked from commit 48abdef97b582c8d857fe338d69492f55dfffdf2)
2012-11-19Add warning prompt before doing resetGaurav Sinha
(cherry picked from commit 3d248225eecc99e3e39c497f3a4bd76d5d3aac96) (cherry picked from commit fffe09f9d7a53d5d74bae6bafc2c7b7409a4babf)
2012-11-19added reset all groups functionsGaurav Sinha
(cherry picked from commit b090e8cf73480ba6bbf967bf1fbd8f59e1a8843d) Conflicts: scripts/firewall/vyatta-ipset.pl (cherry picked from commit 2c2cd1aef9eada852084ecebb3c76e468cc56a2a)
2012-11-19reset functions for named ipset rule implementation with commit lockGaurav Sinha
(cherry picked from commit 6b7808bf6c8dd9d1d9e993969358db2be135beff) Conflicts: scripts/firewall/vyatta-ipset.pl (cherry picked from commit 977f7ad60c252ed3c23176d5e764cd9231784fc7)
2012-11-19initial script for reset firewall group commandGaurav Sinha
(cherry picked from commit c10ab7f443c581ffd31779f6e32b0d28f5c8366f) (cherry picked from commit 2029744d3b7cc83b7568e3fa474c8d079efece38) Conflicts: scripts/firewall/vyatta-ipset.pl
2012-09-05add support for main tableRobert Bays
2012-09-03populate firewall policy tables based on refcountRobert Bays
2012-09-03changes to policy tables to add acceptRobert Bays
updates to dscp node.def for better help text
2012-09-03initial checkin for pbr functionalityRobert Bays
2012-08-22Merge branch 'pacifica' of git.vyatta.com:/git/vyatta-cfg-firewall into pacificaGaurav Sinha
2012-08-22move CT_IGNORE chain up, first in raw tableGaurav Sinha
2012-08-09Bugfix 8271: Remove Vestigial VRRP hooks. The implementation changed and ↵John Southworth
these are no longer needed.
2012-08-07add conntrack raw table ignore chainGaurav Sinha
2012-06-18fix 8112Gaurav Sinha
2012-06-06create nfct helper policies and prepare VYATTA_CT_HELPER chainGaurav Sinha
2012-06-06Merge branch 'user_space_helpers' into pacificaGaurav Sinha
2012-05-14don't add CTHELPER chain by default on boot. add when needed.Gaurav Sinha
2012-04-30service names with hyphen need to be escaped using square brackets.Gaurav Sinha
2012-04-16create CT_HELPER chain in PREROUTING and OUTPUTGaurav Sinha
2012-04-16fixing 7998Gaurav Sinha
2012-03-23include CT_TIMEOUT chain for conntrack timeouts.Gaurav
2012-02-297047:use DEFLT instead of defaultGaurav
2012-02-29fixing 7047Gaurav
2011-12-27Create VRRP output filter to filter IGMP from vmac interfacesJohn Southworth
2011-12-12Setup filter for VRRP vmac interfacesJohn Southworth
2011-12-01Bug 6063 ENH: Provide option(s) to globally allow stateful return trafficMohit Mehta
* add code to set global policy for established, related, invalid states
2011-11-15Move check-params-on-reboot script for conntrack hash size toDaniil Baturin
vyatta-conntrack, update automake rules and debian controls accordingly.
2011-08-29Fix Bug 7477 firewall group negation doesn't work in vc6.3Stig
* use Ipset.pm method rather than CLI path to validate group name when using group as a match condition in a firewall ruleset
2011-07-15Fix Bug 7340 Unable to apply modify firewall to interface when zone policy ↵Mohit Mehta
exists * change commit check to only check if the interface being applied firewall ruleset is in a zone if only the ruleset type is either name|ipv6-name. Thus, ignoring the check when modify rule-set is being applied to an interface (cherry picked from commit 8b2b85a129d3cf23565efe7b0ee15871ebff15c0)
2011-05-20add "two-stage commit" equivalent to previous fix for bug 5227.An-Cheng Huang
2011-05-03modify firewall groups to work with new commitnapa-devAn-Cheng Huang
2011-04-18* Fix Bug 6915 conntrack-hash-size reverts to default after upgradeMohit Mehta
add script conntrack-hash-size in check-params-on-reboot.d to fix problem of 'firewall conntrack-hash-size' value being out-of-sync with the underlying value when newly installed image boots for the first time