firewall4: ipset d'ouvertures ip/port temporaires
This commit is contained in:
parent
fe6f71acbc
commit
7b26e38606
1 changed files with 4 additions and 0 deletions
|
@ -45,6 +45,9 @@ class firewall(base.firewall_routeur):
|
|||
# Portail captif/blacklist soft: ipset des gens ayant cliqué pour continuer à naviguer
|
||||
self.ipset['confirmation'] = base.Ipset("CONFIRMATION", "hash:ip", "")
|
||||
|
||||
# Ouvertures de ports temporaires
|
||||
self.ipset['ip_port_tmp'] = base.Ipset("IP-PORT-TMP", "hash:ip,port", "timeout 3600")
|
||||
|
||||
def blacklist_maj(self, ips):
|
||||
"""Mise à jour des blacklistes"""
|
||||
self.blacklist_hard_maj(ips)
|
||||
|
@ -490,6 +493,7 @@ class firewall(base.firewall_routeur):
|
|||
|
||||
if table == 'filter':
|
||||
pretty_print(table, chain)
|
||||
self.add(table, chain, '-m set --match-set %s dst,dst -j ACCEPT' % self.ipset['ip_port_tmp'] )
|
||||
for net in base.config.NETs['serveurs']:
|
||||
for proto in base.config.firewall.srv_ports_default.keys():
|
||||
if base.config.firewall.srv_ports_default[proto]['output']:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue