mirror of
git://projects.qi-hardware.com/openwrt-xburst.git
synced 2024-11-26 06:09:41 +02:00
fix firewall script, add ar7 network if into the bridge by default
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@1522 3c298f89-4303-0410-b956-a3cf2f4a3e73
This commit is contained in:
parent
2c4e287c1d
commit
65157ef12a
@ -5,7 +5,8 @@ ${FAILSAFE:+exit}
|
|||||||
|
|
||||||
. /etc/functions.sh
|
. /etc/functions.sh
|
||||||
. /etc/network.overrides
|
. /etc/network.overrides
|
||||||
[ -e /etc/config/network] && . /etc/config/network
|
[ -e /etc/config/network ] && . /etc/config/network
|
||||||
|
|
||||||
WAN=$(nvram get wan_ifname)
|
WAN=$(nvram get wan_ifname)
|
||||||
LAN=$(nvram get lan_ifname)
|
LAN=$(nvram get lan_ifname)
|
||||||
|
|
||||||
@ -37,7 +38,7 @@ iptables -t nat -N postrouting_rule
|
|||||||
iptables -A INPUT -j input_rule
|
iptables -A INPUT -j input_rule
|
||||||
|
|
||||||
# allow
|
# allow
|
||||||
iptables -A INPUT -i \! $WAN -j ACCEPT # allow from lan/wifi interfaces
|
iptables -A INPUT ${WAN:+-i \! $WAN} -j ACCEPT # allow from lan/wifi interfaces
|
||||||
iptables -A INPUT -p icmp -j ACCEPT # allow ICMP
|
iptables -A INPUT -p icmp -j ACCEPT # allow ICMP
|
||||||
iptables -A INPUT -p gre -j ACCEPT # allow GRE
|
iptables -A INPUT -p gre -j ACCEPT # allow GRE
|
||||||
|
|
||||||
@ -81,7 +82,7 @@ iptables -t nat -N postrouting_rule
|
|||||||
|
|
||||||
# allow
|
# allow
|
||||||
iptables -A FORWARD -i br0 -o br0 -j ACCEPT
|
iptables -A FORWARD -i br0 -o br0 -j ACCEPT
|
||||||
iptables -A FORWARD -i $LAN -o $WAN -j ACCEPT
|
[ -z "$WAN" ] || iptables -A FORWARD -i $LAN -o $WAN -j ACCEPT
|
||||||
|
|
||||||
# reject (what to do with anything not allowed earlier)
|
# reject (what to do with anything not allowed earlier)
|
||||||
# uses the default -P DROP
|
# uses the default -P DROP
|
||||||
@ -89,7 +90,7 @@ iptables -t nat -N postrouting_rule
|
|||||||
### MASQ
|
### MASQ
|
||||||
iptables -t nat -A PREROUTING -j prerouting_rule
|
iptables -t nat -A PREROUTING -j prerouting_rule
|
||||||
iptables -t nat -A POSTROUTING -j postrouting_rule
|
iptables -t nat -A POSTROUTING -j postrouting_rule
|
||||||
iptables -t nat -A POSTROUTING -o $WAN -j MASQUERADE
|
[ -z "$WAN" ] || iptables -t nat -A POSTROUTING -o $WAN -j MASQUERADE
|
||||||
|
|
||||||
## USER RULES
|
## USER RULES
|
||||||
[ -f /etc/firewall.user ] && . /etc/firewall.user
|
[ -f /etc/firewall.user ] && . /etc/firewall.user
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
[ -f /etc/sysconf ] && . /etc/sysconf
|
[ -f /etc/sysconf ] && . /etc/sysconf
|
||||||
|
|
||||||
DEFAULT_lan_proto="static"
|
DEFAULT_lan_proto="static"
|
||||||
DEFAULT_lan_ifname="eth0"
|
DEFAULT_lan_ifname="br0"
|
||||||
DEFAULT_lan_ifnames="eth0"
|
DEFAULT_lan_ifnames="eth0"
|
||||||
DEFAULT_lan_ipaddr=${BR2_SYSCONF_FAILSAFE_IP:-"192.168.1.1"}
|
DEFAULT_lan_ipaddr=${BR2_SYSCONF_FAILSAFE_IP:-"192.168.1.1"}
|
||||||
DEFAULT_lan_netmask=${BR2_SYSCONF_FAILSAFE_NETMASK:-"255.255.255.0"}
|
DEFAULT_lan_netmask=${BR2_SYSCONF_FAILSAFE_NETMASK:-"255.255.255.0"}
|
||||||
|
Loading…
Reference in New Issue
Block a user