2 # Copyright 1999-2004 Gentoo Foundation
3 # Distributed under the terms of the GNU General Public License v2
5 opts="start stop reload"
13 ebegin "Starting firewall"
15 # enable IP forwarding
16 echo 1 > /proc/sys/net/ipv4/ip_forward
18 # default policy is DROP
19 /sbin/iptables -P INPUT DROP
20 /sbin/iptables -P OUTPUT DROP
21 /sbin/iptables -P FORWARD DROP
24 iptables -A INPUT -i eth0 -p 50 -j ACCEPT
25 iptables -A OUTPUT -o eth0 -p 50 -j ACCEPT
28 iptables -A INPUT -i eth0 -p udp --sport 500 --dport 500 -j ACCEPT
29 iptables -A OUTPUT -o eth0 -p udp --dport 500 --sport 500 -j ACCEPT
32 iptables -A INPUT -i eth0 -p udp --sport 4500 --dport 4500 -j ACCEPT
33 iptables -A OUTPUT -o eth0 -p udp --dport 4500 --sport 4500 -j ACCEPT
35 # allow crl fetch from winnetou
36 iptables -A INPUT -i eth0 -p tcp --sport 80 -s PH_IP_WINNETOU -j ACCEPT
37 iptables -A OUTPUT -o eth0 -p tcp --dport 80 -d PH_IP_WINNETOU -j ACCEPT
39 # allow RADIUS protocol with alice
40 iptables -A INPUT -i eth1 -p udp --sport 1812 -s PH_IP_ALICE -j ACCEPT
41 iptables -A OUTPUT -o eth1 -p udp --dport 1812 -d PH_IP_ALICE -j ACCEPT
43 # allow RADIUS accounting protocol with alice
44 iptables -A INPUT -i eth1 -p udp --sport 1813 -s PH_IP_ALICE -j ACCEPT
45 iptables -A OUTPUT -o eth1 -p udp --dport 1813 -d PH_IP_ALICE -j ACCEPT
48 iptables -A INPUT -p tcp --dport 22 -j ACCEPT
49 iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT
55 ebegin "Stopping firewall"
56 for a in `cat /proc/net/ip_tables_names`; do
57 /sbin/iptables -F -t $a
58 /sbin/iptables -X -t $a
60 if [ $a == nat ]; then
61 /sbin/iptables -t nat -P PREROUTING ACCEPT
62 /sbin/iptables -t nat -P POSTROUTING ACCEPT
63 /sbin/iptables -t nat -P OUTPUT ACCEPT
64 elif [ $a == mangle ]; then
65 /sbin/iptables -t mangle -P PREROUTING ACCEPT
66 /sbin/iptables -t mangle -P INPUT ACCEPT
67 /sbin/iptables -t mangle -P FORWARD ACCEPT
68 /sbin/iptables -t mangle -P OUTPUT ACCEPT
69 /sbin/iptables -t mangle -P POSTROUTING ACCEPT
70 elif [ $a == filter ]; then
71 /sbin/iptables -t filter -P INPUT ACCEPT
72 /sbin/iptables -t filter -P FORWARD ACCEPT
73 /sbin/iptables -t filter -P OUTPUT ACCEPT
80 ebegin "Flushing firewall"
81 for a in `cat /proc/net/ip_tables_names`; do
82 /sbin/iptables -F -t $a
83 /sbin/iptables -X -t $a