summaryrefslogtreecommitdiff
path: root/package
diff options
context:
space:
mode:
authorJo-Philipp Wich <jow@openwrt.org>2010-07-31 13:06:14 +0000
committerJo-Philipp Wich <jow@openwrt.org>2010-07-31 13:06:14 +0000
commitd68e09200e223c466a03242307c97abd25849d82 (patch)
tree110afdf39f09548f59f8ac1673670134e17e485f /package
parentd768b7538e9f610a50fed0b3f66f8b4b49a13e8d (diff)
downloadmtk-20170518-d68e09200e223c466a03242307c97abd25849d82.zip
mtk-20170518-d68e09200e223c466a03242307c97abd25849d82.tar.gz
mtk-20170518-d68e09200e223c466a03242307c97abd25849d82.tar.bz2
firewall: add basic NAT reflection/NAT loopback support
SVN-Revision: 22441
Diffstat (limited to 'package')
-rw-r--r--package/firewall/Makefile3
-rw-r--r--package/firewall/files/reflection.hotplug79
2 files changed, 81 insertions, 1 deletions
diff --git a/package/firewall/Makefile b/package/firewall/Makefile
index c1f3f6e..b489d93 100644
--- a/package/firewall/Makefile
+++ b/package/firewall/Makefile
@@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
PKG_NAME:=firewall
PKG_VERSION:=2
-PKG_RELEASE:=8
+PKG_RELEASE:=9
include $(INCLUDE_DIR)/package.mk
@@ -45,6 +45,7 @@ define Package/firewall/install
$(INSTALL_BIN) ./files/firewall.init $(1)/etc/init.d/firewall
$(INSTALL_DIR) $(1)/etc/hotplug.d/iface
$(INSTALL_DATA) ./files/firewall.hotplug $(1)/etc/hotplug.d/iface/20-firewall
+ $(INSTALL_DATA) ./files/reflection.hotplug $(1)/etc/hotplug.d/iface/30-nat-reflection
$(INSTALL_DIR) $(1)/etc
$(INSTALL_DATA) ./files/firewall.user $(1)/etc
endef
diff --git a/package/firewall/files/reflection.hotplug b/package/firewall/files/reflection.hotplug
new file mode 100644
index 0000000..605ac7c
--- /dev/null
+++ b/package/firewall/files/reflection.hotplug
@@ -0,0 +1,79 @@
+#!/bin/sh
+# Setup NAT reflection rules
+
+. /etc/functions.sh
+
+if [ "$ACTION" = "ifup" ] && [ "$INTERFACE" = "wan" ]; then
+ local wanip=$(uci -P/var/state get network.wan.ipaddr)
+
+ iptables -t nat -F nat_reflection_in 2>/dev/null || {
+ iptables -t nat -N nat_reflection_in
+ iptables -t nat -A prerouting_rule -j nat_reflection_in
+ }
+
+ iptables -t nat -F nat_reflection_out 2>/dev/null || {
+ iptables -t nat -N nat_reflection_out
+ iptables -t nat -A postrouting_rule -j nat_reflection_out
+ }
+
+ setup_fwd() {
+ local cfg="$1"
+
+ local src
+ config_get src "$cfg" src
+
+ [ "$src" = wan ] && {
+ local dest
+ config_get dest "$cfg" dest "lan"
+
+ local lanip=$(uci -P/var/state get network.$dest.ipaddr)
+ local lanmk=$(uci -P/var/state get network.$dest.netmask)
+
+ local proto
+ config_get proto "$cfg" proto
+
+ local epmin epmax extport
+ config_get extport "$cfg" src_dport
+ [ -n "$extport" ] || return
+
+ epmin="${extport%[-:]*}"; epmax="${extport#*[-:]}"
+ [ "$epmin" != "$epmax" ] || epmax=""
+
+ local ipmin ipmax intport
+ config_get intport "$cfg" dest_port "$extport"
+
+ ipmin="${intport%[-:]*}"; ipmax="${intport#*[-:]}"
+ [ "$ipmin" != "$ipmax" ] || ipmax=""
+
+ local exthost
+ config_get exthost "$cfg" src_dip "$wanip"
+
+ local inthost
+ config_get inthost "$cfg" dest_ip
+ [ -n "$inthost" ] || return
+
+ [ "$proto" = tcpudp ] && proto="tcp udp"
+
+ local p
+ for p in ${proto:-tcp udp}; do
+ case "$p" in
+ tcp|udp)
+ iptables -t nat -A nat_reflection_in \
+ -s $lanip/$lanmk -d $exthost \
+ -p $p --dport $epmin${epmax:+:$epmax} \
+ -j DNAT --to $inthost:$ipmin${ipmax:+-$ipmax}
+
+ iptables -t nat -A nat_reflection_out \
+ -s $lanip/$lanmk -d $inthost \
+ -p $p --dport $ipmin${ipmax:+:$ipmax} \
+ -j SNAT --to-source $lanip
+ ;;
+ esac
+ done
+ }
+ }
+
+ config_load firewall
+ config_foreach setup_fwd redirect
+fi
+