format nftables.nix

This commit is contained in:
stuebinm 2024-02-25 17:53:54 +01:00
parent e12cc7dbf5
commit f29830ec93

View file

@ -3,78 +3,76 @@
{ {
networking.firewall.enable = false; networking.firewall.enable = false;
networking.nat.enable = false; networking.nat.enable = false;
boot = { boot = {
kernelModules = [ "nf_nat_ftp" ]; kernelModules = [ "nf_nat_ftp" ];
kernel.sysctl = { kernel.sysctl = {
"net.ipv4.conf.all.forwarding" = true; "net.ipv4.conf.all.forwarding" = true;
"net.ipv4.conf.default.forwarding" = true; "net.ipv4.conf.default.forwarding" = true;
};
}; };
};
networking.nftables = { networking.nftables = {
enable = true; enable = true;
ruleset = '' ruleset = ''
table inet filter { table inet filter {
chain input { chain input {
type filter hook input priority filter type filter hook input priority filter
policy drop policy drop
icmpv6 type { echo-request, echo-reply, mld-listener-query, mld-listener-report, mld-listener-done, nd-router-advert, nd-neighbor-solicit, nd-neighbor-advert, packet-too-big } accept icmpv6 type {
icmp type echo-request accept echo-request,
echo-reply,
mld-listener-query,
mld-listener-report,
mld-listener-done,
nd-router-advert,
nd-neighbor-solicit,
nd-neighbor-advert,
packet-too-big
} accept
ct state invalid drop icmp type echo-request accept
ct state established,related accept
iifname { lo } accept ct state invalid drop
ct state established,related accept
tcp dport { 25, 80, 443, 465, 587, 993, 4190, 62954, 64738 } accept iifname { lo } accept
udp dport { 60000-61000, 64738 } accept tcp dport { 25, 80, 443, 465, 587, 993, 4190, 62954, 64738 } accept
udp dport { 60000-61000, 64738 } accept
# DHCPv6
ip6 daddr fe80::/64 udp dport 546 accept
# DHCPv6 counter
ip6 daddr fe80::/64 udp dport 546 accept }
chain output {
type filter hook output priority filter
policy accept
counter
}
chain forward {
type filter hook forward priority filter
policy accept
counter counter
} }
chain output { }
type filter hook output priority filter
policy accept
counter
}
chain forward {
type filter hook forward priority filter
policy accept
counter
}
}
table ip nat {
chain prerouting {
type nat hook prerouting priority -100
iifname enp35s0 tcp dport { 22 } dnat ${config.containers.gitea.localAddress}:22
}
chain postrouting {
type nat hook postrouting priority 100
iifname lxcbr0 oifname enp35s0 masquerade
iifname ve-* oifname enp35s0 masquerade
}
}
table ip nat {
chain prerouting {
type nat hook prerouting priority -100
iifname enp35s0 tcp dport { 22 } dnat ${config.containers.gitea.localAddress}:22
}
chain postrouting {
type nat hook postrouting priority 100
iifname lxcbr0 oifname enp35s0 masquerade
iifname ve-* oifname enp35s0 masquerade
}
}
''; '';
}; };
} }