nezzario

The firewall script

Apr 20th, 2014
148
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 2.04 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. # See:
  4. # - https://help.ubuntu.com/community/Router for the source of this doc
  5. # - http://www.tldp.org/HOWTO/IP-Masquerade-HOWTO/stronger-firewall-examples.html
  6. #     for the source's source.
  7.  
  8. echo -e "\n\nLoading simple rc.firewall-iptables version $FWVER..\n"
  9. DEPMOD=/sbin/depmod
  10. MODPROBE=/sbin/modprobe
  11.  
  12. EXTIF="wlan0"
  13. INTIF="eth0"
  14. #INTIF2="eth0"
  15. echo "   External Interface:  $EXTIF"
  16. echo "   Internal Interface:  $INTIF"
  17.  
  18. #======================================================================
  19. #== No editing beyond this line is required for initial MASQ testing ==
  20. echo -en "   loading modules: "
  21. echo "  - Verifying that all kernel modules are ok"
  22. #$DEPMOD -a
  23. echo "----------------------------------------------------------------------"
  24. echo -en "ip_tables, "
  25. $MODPROBE ip_tables
  26. echo -en "nf_conntrack, "
  27. $MODPROBE nf_conntrack
  28. echo -en "nf_conntrack_ftp, "
  29. $MODPROBE nf_conntrack_ftp
  30. echo -en "nf_conntrack_irc, "
  31. $MODPROBE nf_conntrack_irc
  32. echo -en "iptable_nat, "
  33. $MODPROBE iptable_nat
  34. echo -e "nf_nat_ftp, "
  35. $MODPROBE nf_nat_ftp
  36. echo "----------------------------------------------------------------------"
  37. echo -e "   Done loading modules.\n"
  38. echo "   Enabling forwarding.."
  39. echo "1" > /proc/sys/net/ipv4/ip_forward
  40. echo "   Enabling DynamicAddr.."
  41. echo "1" > /proc/sys/net/ipv4/ip_dynaddr
  42. echo "   Clearing any existing rules and setting default policy.."
  43.  
  44. #-A INPUT -i "$EXTIF" -j LOG
  45. #-A INPUT -i "$EXTIF" -j DROP
  46.  
  47. # dude said..  iptables -I INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  48.  
  49. # under output accept
  50.  
  51. iptables-restore <<-EOF
  52. *nat
  53. -A POSTROUTING -o "$EXTIF" -j MASQUERADE
  54. COMMIT
  55. *filter
  56. :INPUT ACCEPT [0:0]
  57. :FORWARD DROP [0:0]
  58. :OUTPUT ACCEPT [0:0]
  59. -A INPUT -i eth0 -p tcp --dport 4 -j ACCEPT
  60. -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
  61. -A FORWARD -i "$EXTIF" -o "$INTIF" -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
  62. -A FORWARD -i "$INTIF" -o "$EXTIF" -j ACCEPT
  63. -A FORWARD -j LOG
  64. COMMIT
  65. EOF
  66.  
  67. echo -e "\nrc.firewall-iptables v$FWVER done.\n"
Advertisement
Add Comment
Please, Sign In to add comment