summaryrefslogtreecommitdiff
path: root/data/templates/firewall/nftables.j2
diff options
context:
space:
mode:
authorViacheslav Hletenko <v.gletenko@vyos.io>2022-08-13 00:07:41 +0000
committerViacheslav Hletenko <v.gletenko@vyos.io>2022-08-17 10:53:26 +0000
commit69bcdb9a680b33422d041fd03e70c25094bfa6a2 (patch)
tree845bd5bce027e72fd9dfba8f713c1e799bbdf9de /data/templates/firewall/nftables.j2
parent466e3b192d15563bc21fc308fa7916eb5aae8664 (diff)
downloadvyos-1x-69bcdb9a680b33422d041fd03e70c25094bfa6a2.tar.gz
vyos-1x-69bcdb9a680b33422d041fd03e70c25094bfa6a2.zip
nat: T538: Add static NAT one-to-one
Ability to set static NAT (one-to-one) in one rule set nat static rule 10 destination address '203.0.113.0/24' set nat static rule 10 inbound-interface 'eth0' set nat static rule 10 translation address '192.0.2.0/24' It will be enough for PREROUTING and POSTROUTING rules Use a separate table 'vyos_static_nat' as SRC/DST rules and STATIC rules can have the same rule number
Diffstat (limited to 'data/templates/firewall/nftables.j2')
-rw-r--r--data/templates/firewall/nftables.j220
1 files changed, 20 insertions, 0 deletions
diff --git a/data/templates/firewall/nftables.j2 b/data/templates/firewall/nftables.j2
index b91fed615..5971e1bbc 100644
--- a/data/templates/firewall/nftables.j2
+++ b/data/templates/firewall/nftables.j2
@@ -181,6 +181,26 @@ table ip nat {
}
}
+table ip vyos_static_nat {
+ chain PREROUTING {
+ type nat hook prerouting priority -100; policy accept;
+ counter jump VYOS_PRE_DNAT_HOOK
+ }
+
+ chain POSTROUTING {
+ type nat hook postrouting priority 100; policy accept;
+ counter jump VYOS_PRE_SNAT_HOOK
+ }
+
+ chain VYOS_PRE_DNAT_HOOK {
+ return
+ }
+
+ chain VYOS_PRE_SNAT_HOOK {
+ return
+ }
+}
+
table ip6 nat {
chain PREROUTING {
type nat hook prerouting priority -100; policy accept;