summaryrefslogtreecommitdiff
path: root/data/templates/firewall
diff options
context:
space:
mode:
authorNicolas Fort <nicolasfort1988@gmail.com>2024-08-26 18:10:01 +0000
committerNicolas Fort <nicolasfort1988@gmail.com>2024-08-28 12:19:19 +0000
commit8e0e1a99e5510c7575ab8a09145d6b4354692d55 (patch)
tree12c4d27314384f84b67a5e370e9d8f181ea15742 /data/templates/firewall
parent003209eeab231675e82abb8cf6eab7ca0384bc3f (diff)
downloadvyos-1x-8e0e1a99e5510c7575ab8a09145d6b4354692d55.tar.gz
vyos-1x-8e0e1a99e5510c7575ab8a09145d6b4354692d55.zip
T6647: firewall. Introduce patch for accepting ARP and DHCP replies on stateful bridge firewall. This patch is needed because ARP and DHCP are marked as invalid connections. Also, add ehternet-type matcher in bridge firewall.
Diffstat (limited to 'data/templates/firewall')
-rwxr-xr-xdata/templates/firewall/nftables.j28
1 files changed, 7 insertions, 1 deletions
diff --git a/data/templates/firewall/nftables.j2 b/data/templates/firewall/nftables.j2
index 155b7f4d0..034328400 100755
--- a/data/templates/firewall/nftables.j2
+++ b/data/templates/firewall/nftables.j2
@@ -376,8 +376,14 @@ table bridge vyos_filter {
{% if bridge.output is vyos_defined %}
{% for prior, conf in bridge.output.items() %}
- chain VYOS_OUTUT_{{ prior }} {
+ chain VYOS_OUTPUT_{{ prior }} {
type filter hook output priority {{ prior }}; policy accept;
+{% if global_options.apply_to_bridged_traffic is vyos_defined %}
+{% if 'invalid_connections' in global_options.apply_to_bridged_traffic %}
+ ct state invalid udp sport 67 udp dport 68 counter accept
+ ct state invalid ether type arp counter accept
+{% endif %}
+{% endif %}
{% if global_options.state_policy is vyos_defined %}
jump VYOS_STATE_POLICY
{% endif %}