summaryrefslogtreecommitdiff
path: root/data
diff options
context:
space:
mode:
authorsarthurdev <965089+sarthurdev@users.noreply.github.com>2022-08-30 17:58:48 +0200
committersarthurdev <965089+sarthurdev@users.noreply.github.com>2022-09-13 11:59:12 +0200
commitf38da6ba4d8218f945c3e6ca6c08dcd5460024be (patch)
treeb3068ba443634cd227af1ca8cae370ed56741c79 /data
parent31587975258a7ca8158ae6b7c490ac5e0ae4dd71 (diff)
downloadvyos-1x-f38da6ba4d8218f945c3e6ca6c08dcd5460024be.tar.gz
vyos-1x-f38da6ba4d8218f945c3e6ca6c08dcd5460024be.zip
firewall: T4605: Rename filter tables to vyos_filter
Diffstat (limited to 'data')
-rw-r--r--data/templates/firewall/nftables-geoip-update.j28
-rw-r--r--data/templates/firewall/nftables.j24
2 files changed, 6 insertions, 6 deletions
diff --git a/data/templates/firewall/nftables-geoip-update.j2 b/data/templates/firewall/nftables-geoip-update.j2
index f9e61a274..832ccc3e9 100644
--- a/data/templates/firewall/nftables-geoip-update.j2
+++ b/data/templates/firewall/nftables-geoip-update.j2
@@ -2,10 +2,10 @@
{% if ipv4_sets is vyos_defined %}
{% for setname, ip_list in ipv4_sets.items() %}
-flush set ip filter {{ setname }}
+flush set ip vyos_filter {{ setname }}
{% endfor %}
-table ip filter {
+table ip vyos_filter {
{% for setname, ip_list in ipv4_sets.items() %}
set {{ setname }} {
type ipv4_addr
@@ -18,10 +18,10 @@ table ip filter {
{% if ipv6_sets is vyos_defined %}
{% for setname, ip_list in ipv6_sets.items() %}
-flush set ip6 filter {{ setname }}
+flush set ip6 vyos_filter {{ setname }}
{% endfor %}
-table ip6 filter {
+table ip6 vyos_filter {
{% for setname, ip_list in ipv6_sets.items() %}
set {{ setname }} {
type ipv6_addr
diff --git a/data/templates/firewall/nftables.j2 b/data/templates/firewall/nftables.j2
index be9ff3a82..dde88d09d 100644
--- a/data/templates/firewall/nftables.j2
+++ b/data/templates/firewall/nftables.j2
@@ -5,7 +5,7 @@
{% if first_install is not vyos_defined %}
delete table ip vyos_filter
{% endif %}
-table ip filter {
+table ip vyos_filter {
chain VYOS_FW_FORWARD {
type filter hook forward priority 0; policy accept;
{% if state_policy is vyos_defined %}
@@ -115,7 +115,7 @@ table ip filter {
{% if first_install is not vyos_defined %}
delete table ip6 vyos_filter
{% endif %}
-table ip6 filter {
+table ip6 vyos_filter {
chain VYOS_FW6_FORWARD {
type filter hook forward priority 0; policy accept;
{% if state_policy is vyos_defined %}