<feed xmlns='http://www.w3.org/2005/Atom'>
<title>vyos-1x.git/data/templates/firewall, branch current</title>
<subtitle>VyOS command definitions, scripts, and utilities (mirror of https://github.com/vyos/vyos-1x.git)
</subtitle>
<id>https://git.amelek.net/vyos/vyos-1x.git/atom?h=current</id>
<link rel='self' href='https://git.amelek.net/vyos/vyos-1x.git/atom?h=current'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/'/>
<updated>2025-06-26T14:23:13+00:00</updated>
<entry>
<title>vrf: T7544: Ensure correct quoting for VRF ifnames in nftables</title>
<updated>2025-06-26T14:23:13+00:00</updated>
<author>
<name>Andrew Topp</name>
<email>andrewt@telekinetica.net</email>
</author>
<published>2025-06-26T14:23:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=c741a290261eb53d5f9ca4849109f19ced8fda9f'/>
<id>urn:sha1:c741a290261eb53d5f9ca4849109f19ced8fda9f</id>
<content type='text'>
* For VRF create/delete:
  * Simple dquoting, as before, was parsed away by the shell
  * Just escaping the double quotes could cause issues with the shell mangling
    VRF names (however unlikely)
  * Wrapping original quotes in shell-escaped single quotes is a quick &amp; easy
    way to guard against both improper shell parsing and string names being
    taken as nft keywords.

* Firewall configuration:
  * Firewall "interface name" rules support VRF ifnames and used them unquoted,
    fixed for nft_rule template tags (parse_rule)
  * Went through and quoted all iif/oifname usage by zones and interface
    groups. VRF ifnames weren't available for all cases, but there is
    no harm in completeness.
  * For this, also created a simple quoted_join template filter to replace
    any use of |join(',')

* PBR calls nft but doesn't mind the "vni" name - table IDs used instead

I may have missed some niche nft use-cases that would be exposed to this problem.
</content>
</entry>
<entry>
<title>firewall: T6951:  Add a configuration command for ethertypes that bridge firewalls should always accept</title>
<updated>2025-06-17T15:16:51+00:00</updated>
<author>
<name>Nataliia Solomko</name>
<email>natalirs1985@gmail.com</email>
</author>
<published>2025-06-13T09:20:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=8dbc3c5e67cc1fd043a78dd3446a1a733ebd814f'/>
<id>urn:sha1:8dbc3c5e67cc1fd043a78dd3446a1a733ebd814f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T7523: firewall: Accepting invalid traffic for pppoe discovery and wol</title>
<updated>2025-06-05T04:25:21+00:00</updated>
<author>
<name>opswill</name>
<email>will@nixops.org</email>
</author>
<published>2025-06-05T04:04:10+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=bfdba4079b0a76a8c578277adae3f36add832b41'/>
<id>urn:sha1:bfdba4079b0a76a8c578277adae3f36add832b41</id>
<content type='text'>
</content>
</entry>
<entry>
<title>T7512: firewall: Modify accepting invalid traffic for VLAN aware bridge</title>
<updated>2025-06-02T04:52:08+00:00</updated>
<author>
<name>Indrajit Raychaudhuri</name>
<email>irc@indrajit.com</email>
</author>
<published>2025-06-02T04:32:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=b47adae7a3e963bfca3b775f4b84d5121907c76d'/>
<id>urn:sha1:b47adae7a3e963bfca3b775f4b84d5121907c76d</id>
<content type='text'>
Allow accepting invalid packets for ethernet types `8021q` and `8021ad`
in addition to ARP and UDP types so that stateful bridge firewall works
for VLAN-aware bridges in addition to regular bridges.
</content>
</entry>
<entry>
<title>T7386: firewall: allow mix of IPv4 and IPv6 addresses/prefixes/ranges in remote groups</title>
<updated>2025-05-07T14:55:00+00:00</updated>
<author>
<name>Mark Hayes</name>
<email>mark.hayes0338@gmail.com</email>
</author>
<published>2025-04-25T15:10:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=02c63e7ded23ea90d55638f768ff943671c2c574'/>
<id>urn:sha1:02c63e7ded23ea90d55638f768ff943671c2c574</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Merge pull request #4457 from l0crian1/t7358-add-offload-to-global-state</title>
<updated>2025-04-25T15:34:30+00:00</updated>
<author>
<name>Viacheslav Hletenko</name>
<email>v.gletenko@vyos.io</email>
</author>
<published>2025-04-25T15:34:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=df2e9cbc2cbe04a6de0eedfe9154afc87bd3d45d'/>
<id>urn:sha1:df2e9cbc2cbe04a6de0eedfe9154afc87bd3d45d</id>
<content type='text'>
firewall: T7358: add offload option to global state policy</content>
</entry>
<entry>
<title>firewall: T7358: add offload option to global state policy</title>
<updated>2025-04-18T14:26:18+00:00</updated>
<author>
<name>l0crian1</name>
<email>ryan.claridge13@gmail.com</email>
</author>
<published>2025-04-18T14:26:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=12ba00ecdd2927207106f709a3ba2b23448a5997'/>
<id>urn:sha1:12ba00ecdd2927207106f709a3ba2b23448a5997</id>
<content type='text'>
 - fixed CI smoketest failures (again)
</content>
</entry>
<entry>
<title>firewall: T7358: add offload option to global state policy</title>
<updated>2025-04-18T14:16:59+00:00</updated>
<author>
<name>l0crian1</name>
<email>ryan.claridge13@gmail.com</email>
</author>
<published>2025-04-18T14:16:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=76c4fcbad8698f277b2b5ed859edb068359af463'/>
<id>urn:sha1:76c4fcbad8698f277b2b5ed859edb068359af463</id>
<content type='text'>
- Fixed CI smoketest failures
</content>
</entry>
<entry>
<title>firewall: T7358: add offload option to global state policy</title>
<updated>2025-04-16T18:49:44+00:00</updated>
<author>
<name>l0crian1</name>
<email>ryan.claridge13@gmail.com</email>
</author>
<published>2025-04-16T16:31:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=382c6fc6ffe76d7ce418018f69902572701215a3'/>
<id>urn:sha1:382c6fc6ffe76d7ce418018f69902572701215a3</id>
<content type='text'>
Since the jump to the global state chain is inserted before all rules,
it wasn't possible to use offload with the global state policies

This commit adds a new chain for offloaded traffic in the forward
chain and jumps to that chain. Please enter the commit message for your changes. Lines starting
</content>
</entry>
<entry>
<title>geoip: T5636: Add geoip for policy route/route6</title>
<updated>2025-03-28T07:47:24+00:00</updated>
<author>
<name>sskaje</name>
<email>sskaje@gmail.com</email>
</author>
<published>2025-03-28T07:47:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/vyos-1x.git/commit/?id=795154d9009b669f8858ed983c6b7486aaee1125'/>
<id>urn:sha1:795154d9009b669f8858ed983c6b7486aaee1125</id>
<content type='text'>
</content>
</entry>
</feed>
