################################################################################ *nat ################################################################################ :PREROUTING ACCEPT [0:0] :INPUT ACCEPT [0:0] :OUTPUT ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] # Remove all rules from all chains. -F # Delete all user-defined chains. -X {{ iptables__nat_v4 }} {{ iptables__nat_all }} COMMIT ################################################################################ *filter ################################################################################ :INPUT {{ 'DROP' if iptables__drop_by_default else 'ACCEPT' }} [0:0] :FORWARD DROP [0:0] :OUTPUT {{ 'DROP' if iptables__drop_by_default else 'ACCEPT' }} [0:0] # Remove all rules from all chains. -F # Delete all user-defined chains. -X ########## # Custom # ########## {{ iptables__filter_prepend0_v6 }} {{ iptables__filter_prepend0_all }} {{ iptables__filter_prepend1_v6 }} {{ iptables__filter_prepend1_all }} {{ iptables__filter_prepend2_v6 }} {{ iptables__filter_prepend2_all }} ####### # SSH # ####### {{ iptables__filter_ssh_before_v6 }} {{ iptables__filter_ssh_before_all }} # Allow incoming SSH. {% if iptables__ssh_ifaces %} {% for iface in iptables__ssh_ifaces %} -A INPUT -i {{ iface }} -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT -A OUTPUT -o {{ iface }} -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT {% endfor %} {% else %} -A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT -A OUTPUT -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT {% endif %} {{ iptables__filter_ssh_after_v6 }} {{ iptables__filter_ssh_after_all }} ############ # Loopback # ############ {{ iptables__filter_loop_before_v6 }} {{ iptables__filter_loop_before_all }} # Allow all loopback (lo) traffic and reject anything # to localhost that does not originate from lo. -A INPUT -i lo -j ACCEPT -A INPUT ! -i lo -s 127.0.0.0/8 -j REJECT -A OUTPUT -o lo -j ACCEPT {{ iptables__filter_loop_after_v6 }} {{ iptables__filter_loop_after_all }} ############ # Outgoing # ############ {{ iptables__filter_out_before_v6 }} {{ iptables__filter_out_before_all }} # Allow all outgoing traffic. {% if iptables__allow_output_ifaces %} {% for iface in iptables__allow_output_ifaces %} -A OUTPUT -o {{ iface }} -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT -A INPUT -i {{ iface }} -m conntrack --ctstate ESTABLISHED -j ACCEPT {% endfor %} {% else %} -A OUTPUT -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT -A INPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT {% endif %} {{ iptables__filter_out_after_v6 }} {{ iptables__filter_out_after_all }} ######## # ICMP # ######## # Allow some important ICMP. -A INPUT -p icmp --icmp-type echo-request -j ACCEPT -A OUTPUT -p icmp --icmp-type echo-request -j ACCEPT -A INPUT -p icmp --icmp-type echo-reply -j ACCEPT -A OUTPUT -p icmp --icmp-type echo-reply -j ACCEPT -A INPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT -A OUTPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT -A INPUT -p icmp --icmp-type time-exceeded -j ACCEPT -A OUTPUT -p icmp --icmp-type time-exceeded -j ACCEPT # Deny other ICMP. -A INPUT -p icmp -j DROP -A OUTPUT -p icmp -j DROP ########## # Custom # ########## {{ iptables__filter_append0_v6 }} {{ iptables__filter_append0_all }} {{ iptables__filter_append1_v6 }} {{ iptables__filter_append1_all }} {{ iptables__filter_append2_v6 }} {{ iptables__filter_append2_all }} COMMIT