[Firehol-support] Errors when running firehol
Jason Miller
jason at milr.com
Fri Jan 23 22:09:44 GMT 2015
I got a lot of errors the first time I tried running firehol 2.0:
Errors are below, I've attached output of firehol debug
--------------------------------------------------------------------------------
ERROR : # 1.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 14 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A out_internet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 2.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 14 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A in_internet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 3.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 14 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A out_internet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 4.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 14 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A in_internet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 5.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 16 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A in_internet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-internet:
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 6.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 16 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A out_internet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-internet:
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 7.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 20 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A out_inet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 8.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 20 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A in_inet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 9.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 20 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A out_inet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 10.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 20 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A in_inet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 11.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 22 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A in_inet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-inet:
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 12.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 22 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A out_inet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-inet:
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 13.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 24 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A in_l2i4_ftp_s2 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 14.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 24 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A out_l2i4_ftp_s2 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 15.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 24 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A in_l2i4_irc_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 16.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 24 of /etc/firehol/firehol.conf
COMMAND : /sbin/iptables -t filter -A out_l2i4_irc_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
iptables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 17.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 28 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A in_l2i6_ftp_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 18.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 28 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A out_l2i6_ftp_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 19.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 28 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A in_l2i6_irc_s4 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 20.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line 28 of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A out_l2i6_irc_s4 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 21.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line FIN of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A INPUT -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-unknown:
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 22.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line FIN of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A OUTPUT -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-unknown:
OUTPUT :
ip6tables: No chain/target/match by that name.
--------------------------------------------------------------------------------
ERROR : # 23.
WHAT : A runtime command failed to execute (returned error 1).
SOURCE : line FIN of /etc/firehol/firehol.conf
COMMAND : /sbin/ip6tables -t filter -A FORWARD -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=PASS-unknown:
OUTPUT :
ip6tables: No chain/target/match by that name.
-------------- next part --------------
FireHOL: Saving your old firewall to a temporary file: OK
FireHOL: Processing file /etc/firehol/firehol.conf: OK
# === CONFIGURATION STATEMENT =================================================
# CONF: 1>>> version 6
# === CONFIGURATION STATEMENT =================================================
# CONF: 7>>> interface br0 en3ps0
# INFO>>> Creating chain 'in_en3ps0' under 'INPUT' in table 'filter'
/sbin/iptables -t filter -P INPUT ACCEPT
/sbin/iptables -t filter -P OUTPUT ACCEPT
/sbin/iptables -t filter -P FORWARD ACCEPT
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A OUTPUT -o lo -j ACCEPT
/sbin/iptables -t filter -N in_en3ps0
/sbin/ip6tables -t filter -P INPUT ACCEPT
/sbin/ip6tables -t filter -P OUTPUT ACCEPT
/sbin/ip6tables -t filter -P FORWARD ACCEPT
/sbin/ip6tables -A INPUT -i lo -j ACCEPT
/sbin/ip6tables -A OUTPUT -o lo -j ACCEPT
/sbin/ip6tables -t filter -N in_en3ps0
/sbin/iptables -t filter -A INPUT -i br0 -j in_en3ps0
/sbin/ip6tables -t filter -A INPUT -i br0 -j in_en3ps0
# INFO>>> Creating chain 'out_en3ps0' under 'OUTPUT' in table 'filter'
/sbin/iptables -t filter -N out_en3ps0
/sbin/ip6tables -t filter -N out_en3ps0
/sbin/iptables -t filter -A OUTPUT -o br0 -j out_en3ps0
/sbin/ip6tables -t filter -A OUTPUT -o br0 -j out_en3ps0
# === CONFIGURATION STATEMENT =================================================
# CONF: 8>>> policy accept
# INFO>>> Setting policy of en3ps0 to accept
# === CONFIGURATION STATEMENT =================================================
# CONF: 10>>> interface en2ps0 internet src not unroutable_ips\(\)
# INFO>>> Finilizing interface 'en3ps0'
/sbin/iptables -t filter -A in_en3ps0 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A in_en3ps0 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/iptables -t filter -A out_en3ps0 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A out_en3ps0 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/iptables -t filter -A in_en3ps0 -j ACCEPT
/sbin/ip6tables -t filter -A in_en3ps0 -j ACCEPT
/sbin/iptables -t filter -A out_en3ps0 -j ACCEPT
/sbin/ip6tables -t filter -A out_en3ps0 -j ACCEPT
# INFO>>> Creating chain 'in_internet' under 'INPUT' in table 'filter'
/sbin/iptables -t filter -N in_internet
/sbin/iptables -t filter -A in_internet -s 0.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A in_internet -s 127.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A in_internet -s 240.0.0.0/4 -j RETURN
/sbin/iptables -t filter -A in_internet -s 10.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A in_internet -s 169.254.0.0/16 -j RETURN
/sbin/iptables -t filter -A in_internet -s 172.16.0.0/12 -j RETURN
/sbin/iptables -t filter -A in_internet -s 192.0.2.0/24 -j RETURN
/sbin/iptables -t filter -A in_internet -s 192.88.99.0/24 -j RETURN
/sbin/iptables -t filter -A in_internet -s 192.168.0.0/16 -j RETURN
/sbin/iptables -t filter -A INPUT -i en2ps0 -j in_internet
# INFO>>> Creating chain 'out_internet' under 'OUTPUT' in table 'filter'
/sbin/iptables -t filter -N out_internet
/sbin/iptables -t filter -A out_internet -d 0.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A out_internet -d 127.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A out_internet -d 240.0.0.0/4 -j RETURN
/sbin/iptables -t filter -A out_internet -d 10.0.0.0/8 -j RETURN
/sbin/iptables -t filter -A out_internet -d 169.254.0.0/16 -j RETURN
/sbin/iptables -t filter -A out_internet -d 172.16.0.0/12 -j RETURN
/sbin/iptables -t filter -A out_internet -d 192.0.2.0/24 -j RETURN
/sbin/iptables -t filter -A out_internet -d 192.88.99.0/24 -j RETURN
/sbin/iptables -t filter -A out_internet -d 192.168.0.0/16 -j RETURN
/sbin/iptables -t filter -A OUTPUT -o en2ps0 -j out_internet
# === CONFIGURATION STATEMENT =================================================
# CONF: 11>>> server smtps accept
# INFO>>> Preparing for service 'smtps' of type 'server' under interface 'internet'
# INFO>>> Creating chain 'in_internet_smtps_s1' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_smtps_s1
/sbin/iptables -t filter -A in_internet -j in_internet_smtps_s1
# INFO>>> Creating chain 'out_internet_smtps_s1' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_smtps_s1
/sbin/iptables -t filter -A out_internet -j out_internet_smtps_s1
# INFO>>> Running simple rules for server 'smtps'
# INFO>>> Rules for smtps server, with server port(s) 'tcp/465' and client port(s) 'default'
/sbin/iptables -t filter -A in_internet_smtps_s1 -p tcp --sport 1024:65535 --dport 465 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_internet_smtps_s1 -p tcp --sport 465 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 12>>> server https accept
# INFO>>> Preparing for service 'https' of type 'server' under interface 'internet'
# INFO>>> Creating chain 'in_internet_https_s2' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_https_s2
/sbin/iptables -t filter -A in_internet -j in_internet_https_s2
# INFO>>> Creating chain 'out_internet_https_s2' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_https_s2
/sbin/iptables -t filter -A out_internet -j out_internet_https_s2
# INFO>>> Running simple rules for server 'https'
# INFO>>> Rules for https server, with server port(s) 'tcp/443' and client port(s) 'default'
/sbin/iptables -t filter -A in_internet_https_s2 -p tcp --sport 1024:65535 --dport 443 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_internet_https_s2 -p tcp --sport 443 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 13>>> server ssh accept
# INFO>>> Preparing for service 'ssh' of type 'server' under interface 'internet'
# INFO>>> Creating chain 'in_internet_ssh_s3' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_ssh_s3
/sbin/iptables -t filter -A in_internet -j in_internet_ssh_s3
# INFO>>> Creating chain 'out_internet_ssh_s3' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_ssh_s3
/sbin/iptables -t filter -A out_internet -j out_internet_ssh_s3
# INFO>>> Running simple rules for server 'ssh'
# INFO>>> Rules for ssh server, with server port(s) 'tcp/22' and client port(s) 'default'
/sbin/iptables -t filter -A in_internet_ssh_s3 -p tcp --sport 1024:65535 --dport 22 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_internet_ssh_s3 -p tcp --sport 22 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 14>>> client all accept
# INFO>>> Preparing for service 'all' of type 'client' under interface 'internet'
# INFO>>> Creating chain 'in_internet_all_c4' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_all_c4
/sbin/iptables -t filter -A in_internet -j in_internet_all_c4
# INFO>>> Creating chain 'out_internet_all_c4' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_all_c4
/sbin/iptables -t filter -A out_internet -j out_internet_all_c4
# INFO>>> Running complex rules function rules_all() for client 'all'
/sbin/iptables -t filter -A out_internet_all_c4 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A in_internet_all_c4 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 14>>> client ftp accept
# INFO>>> Preparing for service 'ftp' of type 'client' under interface 'internet'
# INFO>>> Creating chain 'in_internet_ftp_c5' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_ftp_c5
/sbin/iptables -t filter -A in_internet -j in_internet_ftp_c5
# INFO>>> Creating chain 'out_internet_ftp_c5' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_ftp_c5
/sbin/iptables -t filter -A out_internet -j out_internet_ftp_c5
# INFO>>> Adding kernel module 'nf_conntrack_ftp' in the list of kernel modules to load
# INFO>>> Running simple rules for client 'ftp'
# INFO>>> Rules for ftp client, with server port(s) 'tcp/21' and client port(s) 'default'
/sbin/iptables -t filter -A out_internet_ftp_c5 -p tcp --sport 32768:61000 --dport 21 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A in_internet_ftp_c5 -p tcp --sport 21 --dport 32768:61000 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for ftp client, with helper 'ftp'
/sbin/iptables -t filter -A out_internet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
/sbin/iptables -t filter -A in_internet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 14>>> client irc accept
# INFO>>> Preparing for service 'irc' of type 'client' under interface 'internet'
# INFO>>> Creating chain 'in_internet_irc_c6' under 'in_internet' in table 'filter'
/sbin/iptables -t filter -N in_internet_irc_c6
/sbin/iptables -t filter -A in_internet -j in_internet_irc_c6
# INFO>>> Creating chain 'out_internet_irc_c6' under 'out_internet' in table 'filter'
/sbin/iptables -t filter -N out_internet_irc_c6
/sbin/iptables -t filter -A out_internet -j out_internet_irc_c6
# INFO>>> Adding kernel module 'nf_conntrack_irc' in the list of kernel modules to load
# INFO>>> Running simple rules for client 'irc'
# INFO>>> Rules for irc client, with server port(s) 'tcp/6667' and client port(s) 'default'
/sbin/iptables -t filter -A out_internet_irc_c6 -p tcp --sport 32768:61000 --dport 6667 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A in_internet_irc_c6 -p tcp --sport 6667 --dport 32768:61000 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for irc client, with helper 'irc'
/sbin/iptables -t filter -A out_internet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
/sbin/iptables -t filter -A in_internet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 16>>> interface WAN6 inet src not unroutable_ips\(\)
# INFO>>> Finilizing interface 'internet'
/sbin/iptables -t filter -A in_internet -m conntrack --ctstate RELATED -j ACCEPT
/sbin/iptables -t filter -A out_internet -m conntrack --ctstate RELATED -j ACCEPT
/sbin/iptables -t filter -A in_internet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-internet:
/sbin/iptables -t filter -A in_internet -j DROP
/sbin/iptables -t filter -A out_internet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-internet:
/sbin/iptables -t filter -A out_internet -j DROP
# INFO>>> Creating chain 'in_inet' under 'INPUT' in table 'filter'
/sbin/ip6tables -t filter -N in_inet
/sbin/ip6tables -t filter -A in_inet -s ::/8 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 0100::/8 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 0200::/7 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 0400::/6 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 0800::/5 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 1000::/4 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 4000::/3 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 6000::/3 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s 8000::/3 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s A000::/3 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s C000::/3 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s E000::/4 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s F000::/5 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s F800::/6 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s FE00::/9 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s FEC0::/10 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s FC00::/7 -j RETURN
/sbin/ip6tables -t filter -A in_inet -s FE80::/10 -j RETURN
/sbin/ip6tables -t filter -A INPUT -i WAN6 -j in_inet
# INFO>>> Creating chain 'out_inet' under 'OUTPUT' in table 'filter'
/sbin/ip6tables -t filter -N out_inet
/sbin/ip6tables -t filter -A out_inet -d ::/8 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 0100::/8 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 0200::/7 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 0400::/6 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 0800::/5 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 1000::/4 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 4000::/3 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 6000::/3 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d 8000::/3 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d A000::/3 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d C000::/3 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d E000::/4 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d F000::/5 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d F800::/6 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d FE00::/9 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d FEC0::/10 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d FC00::/7 -j RETURN
/sbin/ip6tables -t filter -A out_inet -d FE80::/10 -j RETURN
/sbin/ip6tables -t filter -A OUTPUT -o WAN6 -j out_inet
# === CONFIGURATION STATEMENT =================================================
# CONF: 17>>> server smtps accept
# INFO>>> Preparing for service 'smtps' of type 'server' under interface 'inet'
# INFO>>> Creating chain 'in_inet_smtps_s1' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_smtps_s1
/sbin/ip6tables -t filter -A in_inet -j in_inet_smtps_s1
# INFO>>> Creating chain 'out_inet_smtps_s1' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_smtps_s1
/sbin/ip6tables -t filter -A out_inet -j out_inet_smtps_s1
# INFO>>> Running simple rules for server 'smtps'
# INFO>>> Rules for smtps server, with server port(s) 'tcp/465' and client port(s) 'default'
/sbin/ip6tables -t filter -A in_inet_smtps_s1 -p tcp --sport 1024:65535 --dport 465 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_inet_smtps_s1 -p tcp --sport 465 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 18>>> server https accept
# INFO>>> Preparing for service 'https' of type 'server' under interface 'inet'
# INFO>>> Creating chain 'in_inet_https_s2' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_https_s2
/sbin/ip6tables -t filter -A in_inet -j in_inet_https_s2
# INFO>>> Creating chain 'out_inet_https_s2' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_https_s2
/sbin/ip6tables -t filter -A out_inet -j out_inet_https_s2
# INFO>>> Running simple rules for server 'https'
# INFO>>> Rules for https server, with server port(s) 'tcp/443' and client port(s) 'default'
/sbin/ip6tables -t filter -A in_inet_https_s2 -p tcp --sport 1024:65535 --dport 443 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_inet_https_s2 -p tcp --sport 443 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 19>>> server ssh accept
# INFO>>> Preparing for service 'ssh' of type 'server' under interface 'inet'
# INFO>>> Creating chain 'in_inet_ssh_s3' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_ssh_s3
/sbin/ip6tables -t filter -A in_inet -j in_inet_ssh_s3
# INFO>>> Creating chain 'out_inet_ssh_s3' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_ssh_s3
/sbin/ip6tables -t filter -A out_inet -j out_inet_ssh_s3
# INFO>>> Running simple rules for server 'ssh'
# INFO>>> Rules for ssh server, with server port(s) 'tcp/22' and client port(s) 'default'
/sbin/ip6tables -t filter -A in_inet_ssh_s3 -p tcp --sport 1024:65535 --dport 22 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_inet_ssh_s3 -p tcp --sport 22 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 20>>> client all accept
# INFO>>> Preparing for service 'all' of type 'client' under interface 'inet'
# INFO>>> Creating chain 'in_inet_all_c4' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_all_c4
/sbin/ip6tables -t filter -A in_inet -j in_inet_all_c4
# INFO>>> Creating chain 'out_inet_all_c4' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_all_c4
/sbin/ip6tables -t filter -A out_inet -j out_inet_all_c4
# INFO>>> Running complex rules function rules_all() for client 'all'
/sbin/ip6tables -t filter -A out_inet_all_c4 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A in_inet_all_c4 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 20>>> client ftp accept
# INFO>>> Preparing for service 'ftp' of type 'client' under interface 'inet'
# INFO>>> Creating chain 'in_inet_ftp_c5' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_ftp_c5
/sbin/ip6tables -t filter -A in_inet -j in_inet_ftp_c5
# INFO>>> Creating chain 'out_inet_ftp_c5' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_ftp_c5
/sbin/ip6tables -t filter -A out_inet -j out_inet_ftp_c5
# INFO>>> Running simple rules for client 'ftp'
# INFO>>> Rules for ftp client, with server port(s) 'tcp/21' and client port(s) 'default'
/sbin/ip6tables -t filter -A out_inet_ftp_c5 -p tcp --sport 32768:61000 --dport 21 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A in_inet_ftp_c5 -p tcp --sport 21 --dport 32768:61000 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for ftp client, with helper 'ftp'
/sbin/ip6tables -t filter -A out_inet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
/sbin/ip6tables -t filter -A in_inet_ftp_c5 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 20>>> client irc accept
# INFO>>> Preparing for service 'irc' of type 'client' under interface 'inet'
# INFO>>> Creating chain 'in_inet_irc_c6' under 'in_inet' in table 'filter'
/sbin/ip6tables -t filter -N in_inet_irc_c6
/sbin/ip6tables -t filter -A in_inet -j in_inet_irc_c6
# INFO>>> Creating chain 'out_inet_irc_c6' under 'out_inet' in table 'filter'
/sbin/ip6tables -t filter -N out_inet_irc_c6
/sbin/ip6tables -t filter -A out_inet -j out_inet_irc_c6
# INFO>>> Running simple rules for client 'irc'
# INFO>>> Rules for irc client, with server port(s) 'tcp/6667' and client port(s) 'default'
/sbin/ip6tables -t filter -A out_inet_irc_c6 -p tcp --sport 32768:61000 --dport 6667 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A in_inet_irc_c6 -p tcp --sport 6667 --dport 32768:61000 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for irc client, with helper 'irc'
/sbin/ip6tables -t filter -A out_inet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
/sbin/ip6tables -t filter -A in_inet_irc_c6 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 22>>> router l2i4 inface en3ps0 outface en2ps0
# INFO>>> Finilizing interface 'inet'
/sbin/ip6tables -t filter -A in_inet -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A out_inet -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A in_inet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-inet:
/sbin/ip6tables -t filter -A in_inet -j DROP
/sbin/ip6tables -t filter -A out_inet -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-inet:
/sbin/ip6tables -t filter -A out_inet -j DROP
# INFO>>> Creating chain 'in_l2i4' under 'FORWARD' in table 'filter'
/sbin/iptables -t filter -N in_l2i4
/sbin/iptables -t filter -A FORWARD -i en3ps0 -o en2ps0 -j in_l2i4
# INFO>>> Creating chain 'out_l2i4' under 'FORWARD' in table 'filter'
/sbin/iptables -t filter -N out_l2i4
/sbin/iptables -t filter -A FORWARD -i en2ps0 -o en3ps0 -j out_l2i4
# === CONFIGURATION STATEMENT =================================================
# CONF: 23>>> masquerade
# INFO>>> Initializing masquerade on interface 'en2ps0'
/sbin/iptables -t nat -A POSTROUTING -o en2ps0 -j MASQUERADE
# === CONFIGURATION STATEMENT =================================================
# CONF: 24>>> route all accept
# INFO>>> Preparing for service 'all' of type 'server' under interface 'l2i4'
# INFO>>> Creating chain 'in_l2i4_all_s1' under 'in_l2i4' in table 'filter'
/sbin/iptables -t filter -N in_l2i4_all_s1
/sbin/iptables -t filter -A in_l2i4 -j in_l2i4_all_s1
# INFO>>> Creating chain 'out_l2i4_all_s1' under 'out_l2i4' in table 'filter'
/sbin/iptables -t filter -N out_l2i4_all_s1
/sbin/iptables -t filter -A out_l2i4 -j out_l2i4_all_s1
# INFO>>> Running complex rules function rules_all() for server 'all'
/sbin/iptables -t filter -A in_l2i4_all_s1 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_l2i4_all_s1 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 24>>> server ftp accept
# INFO>>> Preparing for service 'ftp' of type 'server' under interface 'l2i4'
# INFO>>> Creating chain 'in_l2i4_ftp_s2' under 'in_l2i4' in table 'filter'
/sbin/iptables -t filter -N in_l2i4_ftp_s2
/sbin/iptables -t filter -A in_l2i4 -j in_l2i4_ftp_s2
# INFO>>> Creating chain 'out_l2i4_ftp_s2' under 'out_l2i4' in table 'filter'
/sbin/iptables -t filter -N out_l2i4_ftp_s2
/sbin/iptables -t filter -A out_l2i4 -j out_l2i4_ftp_s2
# INFO>>> Adding kernel module 'nf_nat_ftp' in the list of kernel modules to load
# INFO>>> Running simple rules for server 'ftp'
# INFO>>> Rules for ftp server, with server port(s) 'tcp/21' and client port(s) 'default'
/sbin/iptables -t filter -A in_l2i4_ftp_s2 -p tcp --sport 1024:65535 --dport 21 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_l2i4_ftp_s2 -p tcp --sport 21 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for ftp server, with helper 'ftp'
/sbin/iptables -t filter -A in_l2i4_ftp_s2 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
/sbin/iptables -t filter -A out_l2i4_ftp_s2 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 24>>> server irc accept
# INFO>>> Preparing for service 'irc' of type 'server' under interface 'l2i4'
# INFO>>> Creating chain 'in_l2i4_irc_s3' under 'in_l2i4' in table 'filter'
/sbin/iptables -t filter -N in_l2i4_irc_s3
/sbin/iptables -t filter -A in_l2i4 -j in_l2i4_irc_s3
# INFO>>> Creating chain 'out_l2i4_irc_s3' under 'out_l2i4' in table 'filter'
/sbin/iptables -t filter -N out_l2i4_irc_s3
/sbin/iptables -t filter -A out_l2i4 -j out_l2i4_irc_s3
# INFO>>> Adding kernel module 'nf_nat_irc' in the list of kernel modules to load
# INFO>>> Running simple rules for server 'irc'
# INFO>>> Rules for irc server, with server port(s) 'tcp/6667' and client port(s) 'default'
/sbin/iptables -t filter -A in_l2i4_irc_s3 -p tcp --sport 1024:65535 --dport 6667 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/iptables -t filter -A out_l2i4_irc_s3 -p tcp --sport 6667 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for irc server, with helper 'irc'
/sbin/iptables -t filter -A in_l2i4_irc_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
/sbin/iptables -t filter -A out_l2i4_irc_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 26>>> router l2i6 inface en3ps0 outface he6
# INFO>>> Finilizing router 'l2i4'
/sbin/iptables -t filter -A in_l2i4 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/iptables -t filter -A out_l2i4 -m conntrack --ctstate RELATED -j ACCEPT
# INFO>>> Creating chain 'in_l2i6' under 'FORWARD' in table 'filter'
/sbin/ip6tables -t filter -N in_l2i6
/sbin/ip6tables -t filter -A FORWARD -i en3ps0 -o he6 -j in_l2i6
# INFO>>> Creating chain 'out_l2i6' under 'FORWARD' in table 'filter'
/sbin/ip6tables -t filter -N out_l2i6
/sbin/ip6tables -t filter -A FORWARD -i he6 -o en3ps0 -j out_l2i6
# === CONFIGURATION STATEMENT =================================================
# CONF: 27>>> server ipv6error accept
# INFO>>> Preparing for service 'ipv6error' of type 'server' under interface 'l2i6'
# INFO>>> Creating chain 'in_l2i6_ipv6error_s1' under 'in_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N in_l2i6_ipv6error_s1
/sbin/ip6tables -t filter -A in_l2i6 -j in_l2i6_ipv6error_s1
# INFO>>> Creating chain 'out_l2i6_ipv6error_s1' under 'out_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N out_l2i6_ipv6error_s1
/sbin/ip6tables -t filter -A out_l2i6 -j out_l2i6_ipv6error_s1
# INFO>>> Running complex rules function rules_ipv6error() for server 'ipv6error'
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type destination-unreachable -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type packet-too-big -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type packet-too-big -j ACCEPT
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type ttl-zero-during-transit -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type ttl-zero-during-transit -j ACCEPT
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type ttl-zero-during-reassembly -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type ttl-zero-during-reassembly -j ACCEPT
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type unknown-header-type -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type unknown-header-type -j ACCEPT
/sbin/ip6tables -t filter -A in_l2i6_ipv6error_s1 -p icmpv6 -m conntrack --ctstate ESTABLISHED\,RELATED --icmpv6-type unknown-option -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ipv6error_s1 -p icmpv6 --icmpv6-type unknown-option -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 28>>> route all accept
# INFO>>> Preparing for service 'all' of type 'server' under interface 'l2i6'
# INFO>>> Creating chain 'in_l2i6_all_s2' under 'in_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N in_l2i6_all_s2
/sbin/ip6tables -t filter -A in_l2i6 -j in_l2i6_all_s2
# INFO>>> Creating chain 'out_l2i6_all_s2' under 'out_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N out_l2i6_all_s2
/sbin/ip6tables -t filter -A out_l2i6 -j out_l2i6_all_s2
# INFO>>> Running complex rules function rules_all() for server 'all'
/sbin/ip6tables -t filter -A in_l2i6_all_s2 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_all_s2 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 28>>> server ftp accept
# INFO>>> Preparing for service 'ftp' of type 'server' under interface 'l2i6'
# INFO>>> Creating chain 'in_l2i6_ftp_s3' under 'in_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N in_l2i6_ftp_s3
/sbin/ip6tables -t filter -A in_l2i6 -j in_l2i6_ftp_s3
# INFO>>> Creating chain 'out_l2i6_ftp_s3' under 'out_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N out_l2i6_ftp_s3
/sbin/ip6tables -t filter -A out_l2i6 -j out_l2i6_ftp_s3
# INFO>>> Running simple rules for server 'ftp'
# INFO>>> Rules for ftp server, with server port(s) 'tcp/21' and client port(s) 'default'
/sbin/ip6tables -t filter -A in_l2i6_ftp_s3 -p tcp --sport 1024:65535 --dport 21 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ftp_s3 -p tcp --sport 21 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for ftp server, with helper 'ftp'
/sbin/ip6tables -t filter -A in_l2i6_ftp_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_ftp_s3 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper ftp -j ACCEPT
# === CONFIGURATION STATEMENT =================================================
# CONF: 28>>> server irc accept
# INFO>>> Preparing for service 'irc' of type 'server' under interface 'l2i6'
# INFO>>> Creating chain 'in_l2i6_irc_s4' under 'in_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N in_l2i6_irc_s4
/sbin/ip6tables -t filter -A in_l2i6 -j in_l2i6_irc_s4
# INFO>>> Creating chain 'out_l2i6_irc_s4' under 'out_l2i6' in table 'filter'
/sbin/ip6tables -t filter -N out_l2i6_irc_s4
/sbin/ip6tables -t filter -A out_l2i6 -j out_l2i6_irc_s4
# INFO>>> Running simple rules for server 'irc'
# INFO>>> Rules for irc server, with server port(s) 'tcp/6667' and client port(s) 'default'
/sbin/ip6tables -t filter -A in_l2i6_irc_s4 -p tcp --sport 1024:65535 --dport 6667 -m conntrack --ctstate NEW\,ESTABLISHED -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_irc_s4 -p tcp --sport 6667 --dport 1024:65535 -m conntrack --ctstate ESTABLISHED -j ACCEPT
# INFO>>> Rules for irc server, with helper 'irc'
/sbin/ip6tables -t filter -A in_l2i6_irc_s4 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6_irc_s4 -m conntrack --ctstate ESTABLISHED\,RELATED -m helper --helper irc -j ACCEPT
# INFO>>> Finilizing router 'l2i6'
/sbin/ip6tables -t filter -A in_l2i6 -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A out_l2i6 -m conntrack --ctstate RELATED -j ACCEPT
# INFO>>> Finilizing firewall policies
/sbin/ip6tables -t filter -A INPUT -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A OUTPUT -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A FORWARD -m conntrack --ctstate RELATED -j ACCEPT
/sbin/ip6tables -t filter -A INPUT -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=IN-unknown:
/sbin/ip6tables -t filter -A INPUT -j DROP
/sbin/ip6tables -t filter -A OUTPUT -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=OUT-unknown:
/sbin/ip6tables -t filter -A OUTPUT -j DROP
/sbin/ip6tables -t filter -A FORWARD -m limit --limit 1/second --limit-burst 5 -j LOG --log-level warning --log-prefix=PASS-unknown:
/sbin/ip6tables -t filter -A FORWARD -j DROP
More information about the Firehol-support
mailing list