summaryrefslogtreecommitdiff
path: root/data/templates/zone_policy/nftables.j2
blob: fe941f9f882ad314a53dff47bdef73564445b28a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
#!/usr/sbin/nft -f

{% if cleanup_commands is vyos_defined %}
{%     for command in cleanup_commands %}
{{ command }}
{%     endfor %}
{% endif %}

{% if zone is vyos_defined %}
table ip filter {
{%     for zone_name, zone_conf in zone.items() if zone_conf.ipv4 %}
{%         if zone_conf.local_zone is vyos_defined %}
    chain VZONE_{{ zone_name }}_IN {
        iifname lo counter return
{%             for from_zone, from_conf in zone_conf.from.items() if from_conf.firewall.name is vyos_defined %}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME_{{ from_conf.firewall.name }}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone_' + zone_name) }}
    }
    chain VZONE_{{ zone_name }}_OUT {
        oifname lo counter return
{%             for from_zone, from_conf in zone_conf.from_local.items() if from_conf.firewall.name is vyos_defined %}
        oifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME_{{ from_conf.firewall.name }}
        oifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone_' + zone_name) }}
    }
{%         else %}
    chain VZONE_{{ zone_name }} {
        iifname { {{ zone_conf.interface | join(",") }} } counter {{ zone_conf | nft_intra_zone_action(ipv6=False) }}
{%             if zone_conf.intra_zone_filtering is vyos_defined %}
        iifname { {{ zone_conf.interface | join(",") }} } counter return
{%             endif %}
{%             for from_zone, from_conf in zone_conf.from.items() if from_conf.firewall.name is vyos_defined %}
{%                 if zone[from_zone].local_zone is not defined %}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME_{{ from_conf.firewall.name }}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%                 endif %}
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone_' + zone_name) }}
    }
{%         endif %}
{%     endfor %}
}

table ip6 filter {
{%     for zone_name, zone_conf in zone.items() if zone_conf.ipv6 %}
{%         if zone_conf.local_zone is vyos_defined %}
    chain VZONE6_{{ zone_name }}_IN {
        iifname lo counter return
{%             for from_zone, from_conf in zone_conf.from.items() if from_conf.firewall.ipv6_name is vyos_defined %}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME6_{{ from_conf.firewall.ipv6_name }}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone6_' + zone_name) }}
    }
    chain VZONE6_{{ zone_name }}_OUT {
        oifname lo counter return
{%             for from_zone, from_conf in zone_conf.from_local.items() if from_conf.firewall.ipv6_name is vyos_defined %}
        oifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME6_{{ from_conf.firewall.ipv6_name }}
        oifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone6_' + zone_name) }}
    }
{%         else %}
    chain VZONE6_{{ zone_name }} {
        iifname { {{ zone_conf.interface | join(",") }} } counter {{ zone_conf | nft_intra_zone_action(ipv6=True) }}
{%             if zone_conf.intra_zone_filtering is vyos_defined %}
        iifname { {{ zone_conf.interface | join(",") }} } counter return
{%             endif %}
{%             for from_zone, from_conf in zone_conf.from.items() if from_conf.firewall.ipv6_name is vyos_defined %}
{%                 if zone[from_zone].local_zone is not defined %}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter jump NAME6_{{ from_conf.firewall.ipv6_name }}
        iifname { {{ zone[from_zone].interface | join(",") }} } counter return
{%                 endif %}
{%             endfor %}
        {{ zone_conf | nft_default_rule('zone6_' + zone_name) }}
    }
{%         endif %}
{%     endfor %}
}

{%     for zone_name, zone_conf in zone.items() %}
{%         if zone_conf.ipv4 %}
{%             if 'local_zone' in zone_conf %}
insert rule ip filter VYOS_FW_LOCAL counter jump VZONE_{{ zone_name }}_IN
insert rule ip filter VYOS_FW_OUTPUT counter jump VZONE_{{ zone_name }}_OUT
{%             else %}
insert rule ip filter VYOS_FW_FORWARD oifname { {{ zone_conf.interface | join(',') }} } counter jump VZONE_{{ zone_name }}
{%             endif %}
{%         endif %}
{%         if zone_conf.ipv6 %}
{%             if 'local_zone' in zone_conf %}
insert rule ip6 filter VYOS_FW6_LOCAL counter jump VZONE6_{{ zone_name }}_IN
insert rule ip6 filter VYOS_FW6_OUTPUT counter jump VZONE6_{{ zone_name }}_OUT
{%             else %}
insert rule ip6 filter VYOS_FW6_FORWARD oifname { {{ zone_conf.interface | join(',') }} } counter jump VZONE6_{{ zone_name }}
{%             endif %}
{%         endif %}
{%     endfor %}

{# Ensure that state-policy rule is first in the chain #}
{%     if firewall.state_policy is vyos_defined %}
{%         for chain in ['VYOS_FW_FORWARD', 'VYOS_FW_OUTPUT', 'VYOS_FW_LOCAL'] %}
insert rule ip filter {{ chain }} jump VYOS_STATE_POLICY
{%         endfor %}
{%         for chain in ['VYOS_FW6_FORWARD', 'VYOS_FW6_OUTPUT', 'VYOS_FW6_LOCAL'] %}
insert rule ip6 filter {{ chain }} jump VYOS_STATE_POLICY6
{%         endfor %}
{%     endif %}

{% endif %}