Line 1... |
Line 1... |
1 |
#!/bin/sh
|
1 |
#!/bin/sh
|
2 |
#
|
2 |
#
|
3 |
# $Id: alcasar-iptables-local.sh 3044 2022-07-24 21:55:18Z rexy $
|
3 |
# $Id: alcasar-iptables-local.sh 3283 2025-05-18 21:06:00Z rexy $
|
4 |
#
|
4 |
#
|
5 |
# Custom rules for ALCASAR firewall
|
5 |
# Custom rules for ALCASAR firewall
|
6 |
#
|
6 |
#
|
7 |
# Examples:
|
7 |
# Examples:
|
8 |
# - Local MAC addresses filtering (MAC are in '/usr/local/etc/alcasar-iptables-local-mac-filtered'. Format : aa:09:23:2f:4d:ee)
|
8 |
# - Local MAC addresses filtering (MAC are in '/usr/local/etc/alcasar-iptables-local-mac-filtered'. Format : aa:09:23:2f:4d:ee)
|
Line 48... |
Line 48... |
48 |
#SMTP_IP='192.168.111.5'
|
48 |
#SMTP_IP='192.168.111.5'
|
49 |
#SMTP_PORT=25
|
49 |
#SMTP_PORT=25
|
50 |
#$IPTABLES -A OUTPUT -p tcp --dport $SMTP_PORT -d $SMTP_IP -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
|
50 |
#$IPTABLES -A OUTPUT -p tcp --dport $SMTP_PORT -d $SMTP_IP -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
|
51 |
#$IPTABLES -A INPUT -p tcp --sport $SMTP_PORT -s $SMTP_IP -m conntrack --ctstate ESTABLISHED -j ACCEPT
|
51 |
#$IPTABLES -A INPUT -p tcp --sport $SMTP_PORT -s $SMTP_IP -m conntrack --ctstate ESTABLISHED -j ACCEPT
|
52 |
|
52 |
|
53 |
# On autorise un admin à accéder à l'ACC depuis l'extérieur (Internet ou le LAN entre ALCASAR et la BOX)
|
53 |
# On autorise des @IP (managerIPs) à accéder à l'ACC depuis la carte extérieure (Internet ou le LAN entre ALCASAR et la BOX)
|
54 |
# Allow managerIP to access ACC from the external network (Internet or LAN between ALCASAR and the broadband router)
|
54 |
# Allow @IP (managerIPs) to access ACC from the external NICk (Internet or LAN between ALCASAR and the broadband router)
|
55 |
#managerIPs='192.168.0.10'
|
55 |
#managerIPs='192.168.0.10,192.168.0.15'
|
56 |
#externalPort='34443'
|
56 |
#externalPort='34443'
|
57 |
#$IPTABLES -t mangle -A PREROUTING -i $EXTIF -s $managerIPs -p tcp -d $PUBLIC_IP --dport $externalPort -j MARK --set-mark 100
|
57 |
#$IPTABLES -t mangle -A PREROUTING -i $EXTIF -s $managerIPs -p tcp -d $PUBLIC_IP --dport $externalPort -j MARK --set-mark 100
|
58 |
#$IPTABLES -t nat -A PREROUTING -i $EXTIF -s $managerIPs -p tcp -d $PUBLIC_IP --dport $externalPort -j DNAT --to $PRIVATE_IP:443
|
58 |
#$IPTABLES -t nat -A PREROUTING -i $EXTIF -s $managerIPs -p tcp -d $PUBLIC_IP --dport $externalPort -j DNAT --to $PRIVATE_IP:443
|
59 |
#$IPTABLES -A INPUT -i $EXTIF -s $managerIPs -p tcp --dport 443 -m mark --mark 100 -j ACCEPT
|
59 |
#$IPTABLES -A INPUT -i $EXTIF -s $managerIPs -p tcp --dport 443 -m mark --mark 100 -j ACCEPT
|
60 |
|
60 |
|