search for: extra_allowed_incoming_tcp_port

Displaying 3 results from an estimated 3 matches for "extra_allowed_incoming_tcp_port".

2020 Aug 28
4
[Bug 1456] New: Consider eliding empty variables if expanded within an element list
...et This concerns a minor usability issue that I noticed after evaluting some of the criticism in the GitHub issue referenced by bug 1434. In the GitHub issue, one critic complains that this sample ruleset does not work as expected: define BASE_ALLOWED_INCOMING_TCP_PORTS = {22, 80, 443} define EXTRA_ALLOWED_INCOMING_TCP_PORTS = {} table inet filter { chain input { type filter hook input priority 0; policy drop; tcp dport {$BASE_ALLOWED_INCOMING_TCP_PORTS, $EXTRA_ALLOWED_INCOMING_TCP_PORTS} ct state new counter accept } } Currently, this is not permitted by nft's parser. My first thought was...
2020 Oct 27
0
[ANNOUNCE] nftables 0.9.7 release
...IP address" elements = { 1.1.1.1, 1.2.3.4 } } } You can also specify comments in tables and stateful objects (such as quota, limit and counters). * Support for defining empty sets in variables: define BASE_ALLOWED_INCOMING_TCP_PORTS = {22, 80, 443} define EXTRA_ALLOWED_INCOMING_TCP_PORTS = {} table inet x { chain y { type filter hook input priority 0; policy drop; ct state new tcp dport { $BASE_ALLOWED_INCOMING_TCP_PORTS, $EXTRA_ALLOWED_INCOMING_TCP_PORTS } counter accept } } * Allow to use variables in the log prefix string. define f...
2020 Jun 18
10
[Bug 1434] New: Usability improvements, enabling creation of complex firewalls
https://bugzilla.netfilter.org/show_bug.cgi?id=1434 Bug ID: 1434 Summary: Usability improvements, enabling creation of complex firewalls Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft