2023-03-29 13:30:45 -05:00
|
|
|
#!/bin/vbash
|
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to IOT
|
|
|
|
set firewall name local-iot default-action 'drop'
|
|
|
|
set firewall name local-iot description 'From LOCAL to IOT'
|
|
|
|
set firewall name local-iot enable-default-log
|
|
|
|
set firewall name local-iot rule 100 action 'accept'
|
|
|
|
set firewall name local-iot rule 100 description 'Rule: accept_igmp'
|
|
|
|
set firewall name local-iot rule 100 protocol '2'
|
|
|
|
set firewall name local-iot rule 110 action 'accept'
|
|
|
|
set firewall name local-iot rule 110 description 'Rule: accept_mdns'
|
|
|
|
set firewall name local-iot rule 110 destination port 'mdns'
|
|
|
|
set firewall name local-iot rule 110 protocol 'udp'
|
|
|
|
set firewall name local-iot rule 110 source port 'mdns'
|
|
|
|
set firewall name local-iot rule 200 action 'accept'
|
|
|
|
set firewall name local-iot rule 200 description 'Rule: accept_discovery_from_sonos_controllers'
|
|
|
|
set firewall name local-iot rule 200 destination port '1900,1901,1902,57621'
|
|
|
|
set firewall name local-iot rule 200 protocol 'udp'
|
|
|
|
set firewall name local-iot rule 200 source group address-group 'sonos_controllers'
|
|
|
|
set firewall name local-iot rule 999 action 'drop'
|
|
|
|
set firewall name local-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-iot rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to LAN
|
|
|
|
set firewall name local-lan default-action 'drop'
|
|
|
|
set firewall name local-lan description 'From LOCAL to LAN'
|
|
|
|
set firewall name local-lan enable-default-log
|
|
|
|
set firewall name local-lan rule 999 action 'drop'
|
|
|
|
set firewall name local-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-lan rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to SERVERS
|
|
|
|
set firewall name local-servers default-action 'drop'
|
|
|
|
set firewall name local-servers description 'From LOCAL to SERVERS'
|
|
|
|
set firewall name local-servers enable-default-log
|
|
|
|
set firewall name local-servers rule 40 action 'accept'
|
|
|
|
set firewall name local-servers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name local-servers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name local-servers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name local-servers rule 70 action 'accept'
|
|
|
|
set firewall name local-servers rule 70 description 'Rule: accept_bgp'
|
|
|
|
set firewall name local-servers rule 70 destination port 'bgp'
|
|
|
|
set firewall name local-servers rule 70 protocol 'tcp'
|
|
|
|
set firewall name local-servers rule 100 action 'accept'
|
|
|
|
set firewall name local-servers rule 100 description 'Rule: accept_k8s_api'
|
|
|
|
set firewall name local-servers rule 100 destination port '6443'
|
|
|
|
set firewall name local-servers rule 100 protocol 'tcp'
|
|
|
|
set firewall name local-servers rule 200 action 'accept'
|
|
|
|
set firewall name local-servers rule 200 description 'Rule: accept_vector_syslog'
|
|
|
|
set firewall name local-servers rule 200 destination group address-group 'k8s_vector_aggregator'
|
|
|
|
set firewall name local-servers rule 200 destination port '6001'
|
|
|
|
set firewall name local-servers rule 200 protocol 'tcp'
|
|
|
|
set firewall name local-servers rule 999 action 'drop'
|
|
|
|
set firewall name local-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-servers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to CONTAINERS
|
|
|
|
set firewall name local-containers default-action 'accept'
|
|
|
|
set firewall name local-containers description 'From LOCAL to CONTAINERS'
|
|
|
|
set firewall name local-containers rule 40 action 'accept'
|
|
|
|
set firewall name local-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name local-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name local-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name local-containers rule 999 action 'drop'
|
|
|
|
set firewall name local-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-containers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to TRUSTED
|
|
|
|
set firewall name local-trusted default-action 'drop'
|
|
|
|
set firewall name local-trusted description 'From LOCAL to TRUSTED'
|
|
|
|
set firewall name local-trusted enable-default-log
|
|
|
|
set firewall name local-trusted rule 100 action 'accept'
|
|
|
|
set firewall name local-trusted rule 100 description 'Rule: accept_igmp'
|
|
|
|
set firewall name local-trusted rule 100 protocol '2'
|
|
|
|
set firewall name local-trusted rule 110 action 'accept'
|
|
|
|
set firewall name local-trusted rule 110 description 'Rule: accept_mdns'
|
|
|
|
set firewall name local-trusted rule 110 destination port 'mdns'
|
|
|
|
set firewall name local-trusted rule 110 protocol 'udp'
|
|
|
|
set firewall name local-trusted rule 110 source port 'mdns'
|
|
|
|
set firewall name local-trusted rule 200 action 'accept'
|
|
|
|
set firewall name local-trusted rule 200 description 'Rule: accept_discovery_from_sonos_players'
|
|
|
|
set firewall name local-trusted rule 200 destination port '1900,1901,1902'
|
|
|
|
set firewall name local-trusted rule 200 protocol 'udp'
|
|
|
|
set firewall name local-trusted rule 200 source group address-group 'sonos_players'
|
|
|
|
set firewall name local-trusted rule 300 action 'accept'
|
|
|
|
set firewall name local-trusted rule 300 description 'Rule: accept_wireguard'
|
|
|
|
set firewall name local-trusted rule 300 source port '51820'
|
|
|
|
set firewall name local-trusted rule 300 protocol 'udp'
|
|
|
|
set firewall name local-trusted rule 999 action 'drop'
|
|
|
|
set firewall name local-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-trusted rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to VIDEO
|
|
|
|
set firewall name local-video default-action 'drop'
|
|
|
|
set firewall name local-video description 'From LOCAL to VIDEO'
|
|
|
|
set firewall name local-video enable-default-log
|
|
|
|
set firewall name local-video rule 999 action 'drop'
|
|
|
|
set firewall name local-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name local-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name local-video rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From LOCAL to WAN
|
|
|
|
set firewall name local-wan default-action 'accept'
|
|
|
|
set firewall name local-wan description 'From LOCAL to WAN'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From WAN to IOT
|
|
|
|
set firewall name wan-iot default-action 'drop'
|
|
|
|
set firewall name wan-iot description 'From WAN to IOT'
|
|
|
|
set firewall name wan-iot enable-default-log
|
|
|
|
set firewall name wan-iot rule 999 action 'drop'
|
|
|
|
set firewall name wan-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-iot rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From WAN to LAN
|
|
|
|
set firewall name wan-lan default-action 'drop'
|
|
|
|
set firewall name wan-lan description 'From WAN to LAN'
|
|
|
|
set firewall name wan-lan enable-default-log
|
|
|
|
set firewall name wan-lan rule 999 action 'drop'
|
|
|
|
set firewall name wan-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-lan rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From WAN to LOCAL
|
|
|
|
set firewall name wan-local default-action 'drop'
|
|
|
|
set firewall name wan-local description 'From WAN to LOCAL'
|
|
|
|
set firewall name wan-local enable-default-log
|
|
|
|
set firewall name wan-local rule 1 action 'drop'
|
|
|
|
set firewall name wan-local rule 1 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-local rule 1 state invalid 'enable'
|
|
|
|
set firewall name wan-local rule 1 log 'enable'
|
|
|
|
set firewall name wan-local rule 100 action 'accept'
|
|
|
|
set firewall name wan-local rule 100 description 'Rule: accept_wireguard'
|
|
|
|
set firewall name wan-local rule 100 destination port '51820'
|
|
|
|
set firewall name wan-local rule 100 protocol 'udp'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From WAN to SERVERS
|
|
|
|
set firewall name wan-servers default-action 'drop'
|
|
|
|
set firewall name wan-servers description 'From WAN to SERVERS'
|
|
|
|
set firewall name wan-servers enable-default-log
|
|
|
|
set firewall name wan-servers rule 100 action 'accept'
|
|
|
|
set firewall name wan-servers rule 100 destination port 32400
|
|
|
|
set firewall name wan-servers rule 100 protocol 'tcp'
|
|
|
|
set firewall name wan-servers rule 100 destination address 10.1.1.12
|
|
|
|
set firewall name wan-servers rule 999 action 'drop'
|
|
|
|
set firewall name wan-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-servers rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From WAN to CONTAINERS
|
|
|
|
set firewall name wan-containers default-action 'drop'
|
|
|
|
set firewall name wan-containers description 'From WAN to CONTAINERS'
|
|
|
|
set firewall name wan-containers enable-default-log
|
|
|
|
set firewall name wan-containers rule 999 action 'drop'
|
|
|
|
set firewall name wan-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-containers rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From WAN to TRUSTED
|
|
|
|
set firewall name wan-trusted default-action 'drop'
|
|
|
|
set firewall name wan-trusted description 'From WAN to TRUSTED'
|
|
|
|
set firewall name wan-trusted enable-default-log
|
|
|
|
set firewall name wan-trusted rule 999 action 'drop'
|
|
|
|
set firewall name wan-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-trusted rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From WAN to VIDEO
|
|
|
|
set firewall name wan-video default-action 'drop'
|
|
|
|
set firewall name wan-video description 'From WAN to VIDEO'
|
|
|
|
set firewall name wan-video enable-default-log
|
|
|
|
set firewall name wan-video rule 999 action 'drop'
|
|
|
|
set firewall name wan-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name wan-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name wan-video rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From LAN to IoT
|
2023-03-29 13:30:45 -05:00
|
|
|
set firewall name lan-iot default-action 'drop'
|
|
|
|
set firewall name lan-iot description 'From LAN to IOT'
|
|
|
|
set firewall name lan-iot enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-iot rule 999 action 'drop'
|
|
|
|
set firewall name lan-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-iot rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From LAN to LOCAL
|
|
|
|
set firewall name lan-local default-action 'drop'
|
|
|
|
set firewall name lan-local description 'From LAN to LOCAL'
|
|
|
|
set firewall name lan-local enable-default-log
|
2023-09-15 09:55:51 -05:00
|
|
|
set firewall name lan-local rule 40 action 'accept'
|
|
|
|
set firewall name lan-local rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name lan-local rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name lan-local rule 40 protocol 'tcp_udp'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-local rule 50 action 'accept'
|
|
|
|
set firewall name lan-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name lan-local rule 50 destination port '67,68'
|
|
|
|
set firewall name lan-local rule 50 protocol 'udp'
|
|
|
|
set firewall name lan-local rule 50 source port '67,68'
|
|
|
|
set firewall name lan-local rule 60 action 'accept'
|
|
|
|
set firewall name lan-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name lan-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name lan-local rule 60 protocol 'udp'
|
|
|
|
set firewall name lan-local rule 70 action 'accept'
|
|
|
|
set firewall name lan-local rule 70 description 'Rule: accept_node_speed_exporter'
|
|
|
|
set firewall name lan-local rule 70 destination port '9798,9100'
|
|
|
|
set firewall name lan-local rule 70 protocol 'tcp'
|
|
|
|
set firewall name lan-local rule 80 action 'accept'
|
|
|
|
set firewall name lan-local rule 80 description 'Rule: accept perfmon3'
|
|
|
|
set firewall name lan-local rule 80 destination port '5201'
|
|
|
|
set firewall name lan-local rule 80 protocol 'tcp'
|
|
|
|
set firewall name lan-local rule 999 action 'drop'
|
|
|
|
set firewall name lan-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-local rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From LAN to SERVERS
|
|
|
|
set firewall name lan-servers default-action 'drop'
|
|
|
|
set firewall name lan-servers description 'From LAN to SERVERS'
|
|
|
|
set firewall name lan-servers enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-servers rule 999 action 'drop'
|
|
|
|
set firewall name lan-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-servers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-05-25 12:05:22 -05:00
|
|
|
# From LAN to CONTAINERS
|
2023-05-25 11:11:13 -05:00
|
|
|
set firewall name lan-containers default-action 'accept'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name lan-containers description 'From LAN to CONTAINERS'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-containers rule 40 action 'accept'
|
|
|
|
set firewall name lan-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name lan-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name lan-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name lan-containers rule 999 action 'drop'
|
|
|
|
set firewall name lan-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-containers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From LAN to TRUSTED
|
|
|
|
set firewall name lan-trusted default-action 'drop'
|
|
|
|
set firewall name lan-trusted description 'From LAN to TRUSTED'
|
|
|
|
set firewall name lan-trusted enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-trusted rule 999 action 'drop'
|
|
|
|
set firewall name lan-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-trusted rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From LAN to VIDEO
|
|
|
|
set firewall name lan-video default-action 'drop'
|
|
|
|
set firewall name lan-video description 'From LAN to VIDEO'
|
|
|
|
set firewall name lan-video enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name lan-video rule 999 action 'drop'
|
|
|
|
set firewall name lan-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name lan-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name lan-video rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From LAN to WAN
|
|
|
|
set firewall name lan-wan default-action 'accept'
|
|
|
|
set firewall name lan-wan description 'From LAN to WAN'
|
|
|
|
|
|
|
|
# From SERVERS to IOT
|
|
|
|
set firewall name servers-iot default-action 'drop'
|
|
|
|
set firewall name servers-iot description 'From SERVERS to IOT'
|
|
|
|
set firewall name servers-iot enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-iot rule 100 action 'accept'
|
|
|
|
set firewall name servers-iot rule 100 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name servers-iot rule 100 protocol 'tcp'
|
|
|
|
set firewall name servers-iot rule 100 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-iot rule 110 action 'accept'
|
|
|
|
set firewall name servers-iot rule 110 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name servers-iot rule 110 protocol 'icmp'
|
|
|
|
set firewall name servers-iot rule 110 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-iot rule 999 action 'drop'
|
|
|
|
set firewall name servers-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-iot rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From SERVERS to LAN
|
|
|
|
set firewall name servers-lan default-action 'drop'
|
|
|
|
set firewall name servers-lan description 'From SERVERS to LAN'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name servers-lan enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-lan rule 999 action 'drop'
|
|
|
|
set firewall name servers-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-lan rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From SERVERS to LOCAL
|
|
|
|
set firewall name servers-local default-action 'drop'
|
|
|
|
set firewall name servers-local description 'From SERVERS to LOCAL'
|
|
|
|
set firewall name servers-local enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-local rule 50 action 'accept'
|
|
|
|
set firewall name servers-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name servers-local rule 50 destination port '67,68'
|
|
|
|
set firewall name servers-local rule 50 protocol 'udp'
|
|
|
|
set firewall name servers-local rule 50 source port '67,68'
|
|
|
|
set firewall name servers-local rule 60 action 'accept'
|
|
|
|
set firewall name servers-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name servers-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name servers-local rule 60 protocol 'udp'
|
|
|
|
set firewall name servers-local rule 70 action 'accept'
|
|
|
|
set firewall name servers-local rule 70 description 'Rule: accept_bgp'
|
|
|
|
set firewall name servers-local rule 70 destination port 'bgp'
|
|
|
|
set firewall name servers-local rule 70 protocol 'tcp'
|
|
|
|
set firewall name servers-local rule 80 action 'accept'
|
|
|
|
set firewall name servers-local rule 80 description 'Rule: accept_tftp'
|
|
|
|
set firewall name servers-local rule 80 destination port '69'
|
|
|
|
set firewall name servers-local rule 80 protocol 'udp'
|
|
|
|
set firewall name servers-local rule 90 action 'accept'
|
|
|
|
set firewall name servers-local rule 90 description 'Rule: accept_dns'
|
|
|
|
set firewall name servers-local rule 90 destination port 'domain,domain-s'
|
|
|
|
set firewall name servers-local rule 90 protocol 'tcp_udp'
|
|
|
|
set firewall name servers-local rule 100 action 'accept'
|
|
|
|
set firewall name servers-local rule 100 description 'Rule: accept_node_exporter_from_k8s_nodes'
|
|
|
|
set firewall name servers-local rule 100 destination port '9100'
|
|
|
|
set firewall name servers-local rule 100 protocol 'tcp'
|
|
|
|
set firewall name servers-local rule 100 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-local rule 110 action 'accept'
|
|
|
|
set firewall name servers-local rule 110 description 'Rule: accept_speedtest_exporter_from_k8s_nodes'
|
|
|
|
set firewall name servers-local rule 110 destination port '9798'
|
|
|
|
set firewall name servers-local rule 110 protocol 'tcp'
|
|
|
|
set firewall name servers-local rule 110 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-local rule 999 action 'drop'
|
|
|
|
set firewall name servers-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-local rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-05-25 12:05:22 -05:00
|
|
|
# From SERVERS to CONTAINERS
|
2023-05-25 11:11:13 -05:00
|
|
|
set firewall name servers-containers default-action 'accept'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name servers-containers description 'From SERVERS to CONTAINERS'
|
2023-05-25 11:11:13 -05:00
|
|
|
set firewall name servers-containers enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-containers rule 40 action 'accept'
|
|
|
|
set firewall name servers-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name servers-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name servers-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name servers-containers rule 100 action 'accept'
|
|
|
|
set firewall name servers-containers rule 100 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name servers-containers rule 100 protocol 'tcp'
|
|
|
|
set firewall name servers-containers rule 100 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-containers rule 999 action 'drop'
|
|
|
|
set firewall name servers-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-containers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From SERVERS to TRUSTED
|
|
|
|
set firewall name servers-trusted default-action 'drop'
|
|
|
|
set firewall name servers-trusted description 'From SERVERS to TRUSTED'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name servers-trusted enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-trusted rule 999 action 'drop'
|
|
|
|
set firewall name servers-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-trusted rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From SERVERS to VIDEO
|
|
|
|
set firewall name servers-video default-action 'drop'
|
|
|
|
set firewall name servers-video description 'From SERVERS to VIDEO'
|
|
|
|
set firewall name servers-video enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name servers-video rule 100 action 'accept'
|
|
|
|
set firewall name servers-video rule 100 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name servers-video rule 100 protocol 'tcp_udp'
|
|
|
|
set firewall name servers-video rule 100 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name servers-video rule 999 action 'drop'
|
|
|
|
set firewall name servers-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name servers-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name servers-video rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From SERVERS to WAN
|
|
|
|
set firewall name servers-wan default-action 'accept'
|
|
|
|
set firewall name servers-wan description 'From SERVERS to WAN'
|
|
|
|
|
2023-05-25 12:05:22 -05:00
|
|
|
# From CONTAINERS to IOT
|
|
|
|
set firewall name containers-iot default-action 'drop'
|
|
|
|
set firewall name containers-iot description 'From CONTAINERS to IOT'
|
|
|
|
set firewall name containers-iot enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-iot rule 999 action 'drop'
|
|
|
|
set firewall name containers-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-iot rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to LAN
|
|
|
|
set firewall name containers-lan default-action 'drop'
|
|
|
|
set firewall name containers-lan description 'From CONTAINERS to LAN'
|
|
|
|
set firewall name containers-lan enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-lan rule 999 action 'drop'
|
|
|
|
set firewall name containers-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-lan rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to LOCAL
|
|
|
|
set firewall name containers-local default-action 'drop'
|
|
|
|
set firewall name containers-local description 'From CONTAINERS to LOCAL'
|
|
|
|
set firewall name containers-local enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-local rule 50 action 'accept'
|
|
|
|
set firewall name containers-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name containers-local rule 50 destination port '67,68'
|
|
|
|
set firewall name containers-local rule 50 protocol 'udp'
|
|
|
|
set firewall name containers-local rule 50 source port '67,68'
|
|
|
|
set firewall name containers-local rule 60 action 'accept'
|
|
|
|
set firewall name containers-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name containers-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name containers-local rule 60 protocol 'udp'
|
|
|
|
set firewall name containers-local rule 999 action 'drop'
|
|
|
|
set firewall name containers-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-local rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to SERVERS
|
|
|
|
set firewall name containers-servers default-action 'accept'
|
|
|
|
set firewall name containers-servers description 'From CONTAINERS to SERVERS'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-servers rule 999 action 'drop'
|
|
|
|
set firewall name containers-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-servers rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to TRUSTED
|
|
|
|
set firewall name containers-trusted default-action 'drop'
|
|
|
|
set firewall name containers-trusted description 'From CONTAINERS to TRUSTED'
|
|
|
|
set firewall name containers-trusted enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-trusted rule 999 action 'drop'
|
|
|
|
set firewall name containers-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-trusted rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to VIDEO
|
|
|
|
set firewall name containers-video default-action 'drop'
|
|
|
|
set firewall name containers-video description 'From CONTAINERS to VIDEO'
|
|
|
|
set firewall name containers-video enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name containers-video rule 999 action 'drop'
|
|
|
|
set firewall name containers-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name containers-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name containers-video rule 999 log 'enable'
|
2023-05-25 12:05:22 -05:00
|
|
|
|
|
|
|
# From CONTAINERS to WAN
|
|
|
|
set firewall name containers-wan default-action 'accept'
|
|
|
|
set firewall name containers-wan description 'From CONTAINERS to WAN'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to IOT
|
|
|
|
set firewall name trusted-iot default-action 'accept'
|
|
|
|
set firewall name trusted-iot description 'From TRUSTED to IOT'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-iot rule 100 action 'accept'
|
|
|
|
set firewall name trusted-iot rule 100 description 'Rule: accept_app_control_from_sonos_controllers_tcp'
|
|
|
|
set firewall name trusted-iot rule 100 destination port '80,443,445,1400,3400,3401,3500,4070,4444'
|
|
|
|
set firewall name trusted-iot rule 100 protocol 'tcp'
|
|
|
|
set firewall name trusted-iot rule 100 source group address-group 'sonos_controllers'
|
|
|
|
set firewall name trusted-iot rule 110 action 'accept'
|
|
|
|
set firewall name trusted-iot rule 110 description 'Rule: accept_app_control_from_sonos_controllers_udp'
|
|
|
|
set firewall name trusted-iot rule 110 destination port '136-139,1900-1901,2869,10243,10280-10284,5353,6969'
|
|
|
|
set firewall name trusted-iot rule 110 protocol 'udp'
|
|
|
|
set firewall name trusted-iot rule 110 source group address-group 'sonos_controllers'
|
|
|
|
set firewall name trusted-iot rule 999 action 'drop'
|
|
|
|
set firewall name trusted-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-iot rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to LAN
|
|
|
|
set firewall name trusted-lan default-action 'accept'
|
|
|
|
set firewall name trusted-lan description 'From TRUSTED to LAN'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-lan rule 999 action 'drop'
|
|
|
|
set firewall name trusted-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-lan rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to LOCAL
|
|
|
|
set firewall name trusted-local default-action 'drop'
|
|
|
|
set firewall name trusted-local description 'From TRUSTED to LOCAL'
|
|
|
|
set firewall name trusted-local enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-local rule 50 action 'accept'
|
|
|
|
set firewall name trusted-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name trusted-local rule 50 destination port '67,68'
|
|
|
|
set firewall name trusted-local rule 50 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 50 source port '67,68'
|
|
|
|
set firewall name trusted-local rule 60 action 'accept'
|
|
|
|
set firewall name trusted-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name trusted-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name trusted-local rule 60 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 100 action 'accept'
|
|
|
|
set firewall name trusted-local rule 100 description 'Rule: accept_igmp'
|
|
|
|
set firewall name trusted-local rule 100 protocol '2'
|
|
|
|
set firewall name trusted-local rule 110 action 'accept'
|
|
|
|
set firewall name trusted-local rule 110 description 'Rule: accept_mdns'
|
|
|
|
set firewall name trusted-local rule 110 destination port 'mdns'
|
|
|
|
set firewall name trusted-local rule 110 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 110 source port 'mdns'
|
|
|
|
set firewall name trusted-local rule 120 action 'accept'
|
|
|
|
set firewall name trusted-local rule 120 description 'Rule: accept_dns'
|
|
|
|
set firewall name trusted-local rule 120 destination port 'domain,domain-s'
|
|
|
|
set firewall name trusted-local rule 120 protocol 'tcp_udp'
|
|
|
|
set firewall name trusted-local rule 200 action 'accept'
|
|
|
|
set firewall name trusted-local rule 200 description 'Rule: accept_ssh'
|
|
|
|
set firewall name trusted-local rule 200 destination port 'ssh'
|
|
|
|
set firewall name trusted-local rule 200 protocol 'tcp'
|
|
|
|
set firewall name trusted-local rule 210 action 'accept'
|
|
|
|
set firewall name trusted-local rule 210 description 'Rule: accept_vyos_api'
|
|
|
|
set firewall name trusted-local rule 210 destination port '8443'
|
|
|
|
set firewall name trusted-local rule 210 protocol 'tcp'
|
|
|
|
set firewall name trusted-local rule 220 action 'accept'
|
|
|
|
set firewall name trusted-local rule 220 description 'Rule: accept_wireguard'
|
|
|
|
set firewall name trusted-local rule 220 destination port '51820'
|
|
|
|
set firewall name trusted-local rule 220 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 300 action 'accept'
|
|
|
|
set firewall name trusted-local rule 300 description 'Rule: accept_discovery_from_sonos_players'
|
|
|
|
set firewall name trusted-local rule 300 destination port '1900,1901,1902'
|
|
|
|
set firewall name trusted-local rule 300 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 300 source group address-group 'sonos_players'
|
|
|
|
set firewall name trusted-local rule 310 action 'accept'
|
|
|
|
set firewall name trusted-local rule 310 description 'Rule: accept_discovery_from_sonos_controllers'
|
|
|
|
set firewall name trusted-local rule 310 destination port '1900,1901,1902,57621'
|
|
|
|
set firewall name trusted-local rule 310 protocol 'udp'
|
|
|
|
set firewall name trusted-local rule 310 source group address-group 'sonos_controllers'
|
|
|
|
set firewall name trusted-local rule 999 action 'drop'
|
|
|
|
set firewall name trusted-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-local rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to SERVERS
|
|
|
|
set firewall name trusted-servers default-action 'accept'
|
|
|
|
set firewall name trusted-servers description 'From TRUSTED to SERVERS'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-servers rule 999 action 'drop'
|
|
|
|
set firewall name trusted-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-servers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-05-25 12:05:22 -05:00
|
|
|
# From TRUSTED to CONTAINERS
|
2023-05-25 11:11:13 -05:00
|
|
|
set firewall name trusted-containers default-action 'accept'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name trusted-containers description 'From TRUSTED to CONTAINERS'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-containers rule 40 action 'accept'
|
|
|
|
set firewall name trusted-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name trusted-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name trusted-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name trusted-containers rule 999 action 'drop'
|
|
|
|
set firewall name trusted-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-containers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to VIDEO
|
|
|
|
set firewall name trusted-video default-action 'accept'
|
|
|
|
set firewall name trusted-video description 'From TRUSTED to VIDEO'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name trusted-video rule 999 action 'drop'
|
|
|
|
set firewall name trusted-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name trusted-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name trusted-video rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From TRUSTED to WAN
|
|
|
|
set firewall name trusted-wan default-action 'accept'
|
|
|
|
set firewall name trusted-wan description 'From TRUSTED to WAN'
|
|
|
|
|
2023-07-29 06:50:41 -05:00
|
|
|
# From IOT to LAN
|
|
|
|
set firewall name iot-lan default-action 'drop'
|
|
|
|
set firewall name iot-lan description 'From IOT to LAN'
|
|
|
|
set firewall name iot-lan enable-default-log
|
|
|
|
set firewall name iot-lan rule 999 action 'drop'
|
|
|
|
set firewall name iot-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-lan rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to LOCAL
|
|
|
|
set firewall name iot-local default-action 'drop'
|
|
|
|
set firewall name iot-local description 'From IOT to LOCAL'
|
|
|
|
set firewall name iot-local enable-default-log
|
|
|
|
set firewall name iot-local rule 50 action 'accept'
|
|
|
|
set firewall name iot-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name iot-local rule 50 destination port '67,68'
|
|
|
|
set firewall name iot-local rule 50 protocol 'udp'
|
|
|
|
set firewall name iot-local rule 50 source port '67,68'
|
|
|
|
set firewall name iot-local rule 60 action 'accept'
|
|
|
|
set firewall name iot-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name iot-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name iot-local rule 60 protocol 'udp'
|
|
|
|
set firewall name iot-local rule 100 action 'accept'
|
|
|
|
set firewall name iot-local rule 100 description 'Rule: accept_igmp'
|
|
|
|
set firewall name iot-local rule 100 protocol '2'
|
|
|
|
set firewall name iot-local rule 110 action 'accept'
|
|
|
|
set firewall name iot-local rule 110 description 'Rule: accept_mdns'
|
|
|
|
set firewall name iot-local rule 110 destination port 'mdns'
|
|
|
|
set firewall name iot-local rule 110 protocol 'udp'
|
|
|
|
set firewall name iot-local rule 110 source port 'mdns'
|
|
|
|
set firewall name iot-local rule 120 action 'accept'
|
|
|
|
set firewall name iot-local rule 120 description 'Rule: accept_dns'
|
|
|
|
set firewall name iot-local rule 120 destination port 'domain,domain-s'
|
|
|
|
set firewall name iot-local rule 120 protocol 'tcp_udp'
|
|
|
|
set firewall name iot-local rule 200 action 'accept'
|
|
|
|
set firewall name iot-local rule 200 description 'Rule: accept_discovery_from_sonos_players'
|
|
|
|
set firewall name iot-local rule 200 destination port '1900,1901,1902'
|
|
|
|
set firewall name iot-local rule 200 protocol 'udp'
|
|
|
|
set firewall name iot-local rule 200 source group address-group 'sonos_players'
|
|
|
|
set firewall name iot-local rule 210 action 'accept'
|
|
|
|
set firewall name iot-local rule 210 description 'Rule: accept_discovery_from_sonos_controllers'
|
|
|
|
set firewall name iot-local rule 210 destination port '1900,1901,1902,57621'
|
|
|
|
set firewall name iot-local rule 210 protocol 'udp'
|
|
|
|
set firewall name iot-local rule 210 source group address-group 'sonos_controllers'
|
|
|
|
set firewall name iot-local rule 999 action 'drop'
|
|
|
|
set firewall name iot-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-local rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to SERVERS
|
|
|
|
set firewall name iot-servers default-action 'drop'
|
|
|
|
set firewall name iot-servers description 'From IOT to SERVERS'
|
|
|
|
set firewall name iot-servers enable-default-log
|
|
|
|
set firewall name iot-servers rule 100 action 'accept'
|
|
|
|
set firewall name iot-servers rule 100 description 'Rule: accept_nas_smb_from_scanners'
|
|
|
|
set firewall name iot-servers rule 100 destination group address-group 'nas'
|
|
|
|
set firewall name iot-servers rule 100 destination port 'microsoft-ds'
|
|
|
|
set firewall name iot-servers rule 100 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 100 source group address-group 'scanners'
|
|
|
|
set firewall name iot-servers rule 200 action 'accept'
|
|
|
|
set firewall name iot-servers rule 200 description 'Rule: accept_plex_from_plex_clients'
|
|
|
|
set firewall name iot-servers rule 200 destination group address-group 'k8s_plex'
|
|
|
|
set firewall name iot-servers rule 200 destination port '32400'
|
|
|
|
set firewall name iot-servers rule 200 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 200 source group address-group 'plex_clients'
|
|
|
|
set firewall name iot-servers rule 210 action 'accept'
|
|
|
|
set firewall name iot-servers rule 300 action 'accept'
|
|
|
|
set firewall name iot-servers rule 300 description 'Rule: accept_mqtt_from_mqtt_clients'
|
|
|
|
set firewall name iot-servers rule 300 destination group address-group 'k8s_mqtt'
|
|
|
|
set firewall name iot-servers rule 300 destination port '1883'
|
|
|
|
set firewall name iot-servers rule 300 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 300 source group address-group 'mqtt_clients'
|
|
|
|
set firewall name iot-servers rule 310 action 'accept'
|
|
|
|
set firewall name iot-servers rule 310 description 'Rule: accept_mqtt_from_esp'
|
|
|
|
set firewall name iot-servers rule 310 destination group address-group 'k8s_mqtt'
|
|
|
|
set firewall name iot-servers rule 310 destination port '1883'
|
|
|
|
set firewall name iot-servers rule 310 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 310 source group address-group 'esp'
|
|
|
|
set firewall name iot-servers rule 400 action 'accept'
|
|
|
|
set firewall name iot-servers rule 400 description 'Rule: accept_k8s_ingress_from_sonos_players'
|
|
|
|
set firewall name iot-servers rule 400 destination group address-group 'k8s_ingress'
|
|
|
|
set firewall name iot-servers rule 400 destination port 'http,https'
|
|
|
|
set firewall name iot-servers rule 400 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 400 source group address-group 'sonos_players'
|
|
|
|
set firewall name iot-servers rule 420 action 'accept'
|
|
|
|
set firewall name iot-servers rule 420 description 'Rule: accept_k8s_ingress_from_allowed_devices'
|
|
|
|
set firewall name iot-servers rule 420 destination group address-group 'k8s_ingress'
|
|
|
|
set firewall name iot-servers rule 420 destination port 'http,https'
|
|
|
|
set firewall name iot-servers rule 420 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 420 source group address-group 'k8s_ingress_allowed'
|
|
|
|
set firewall name iot-servers rule 500 action 'accept'
|
|
|
|
set firewall name iot-servers rule 500 description 'Rule: accept_vector_journald_from_allowed_devices'
|
|
|
|
set firewall name iot-servers rule 500 destination group address-group 'k8s_vector_aggregator'
|
|
|
|
set firewall name iot-servers rule 500 destination port '6002'
|
|
|
|
set firewall name iot-servers rule 500 protocol 'tcp'
|
|
|
|
set firewall name iot-servers rule 500 source group address-group 'vector_journald_allowed'
|
|
|
|
set firewall name iot-servers rule 999 action 'drop'
|
|
|
|
set firewall name iot-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-servers rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to CONTAINERS
|
|
|
|
set firewall name iot-containers default-action 'accept'
|
|
|
|
set firewall name iot-containers description 'From IOT to CONTAINERS'
|
|
|
|
set firewall name iot-containers rule 40 action 'accept'
|
|
|
|
set firewall name iot-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name iot-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name iot-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name iot-containers rule 999 action 'drop'
|
|
|
|
set firewall name iot-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-containers rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to TRUSTED
|
|
|
|
set firewall name iot-trusted default-action 'drop'
|
|
|
|
set firewall name iot-trusted description 'From IOT to TRUSTED'
|
|
|
|
set firewall name iot-trusted enable-default-log
|
|
|
|
set firewall name iot-trusted rule 100 action 'accept'
|
|
|
|
set firewall name iot-trusted rule 100 description 'Rule: accept_udp_from_sonos_players_to_sonos_controllers'
|
|
|
|
set firewall name iot-trusted rule 100 destination group address-group 'sonos_controllers'
|
|
|
|
set firewall name iot-trusted rule 100 destination port '30000-65535'
|
|
|
|
set firewall name iot-trusted rule 100 protocol 'udp'
|
|
|
|
set firewall name iot-trusted rule 100 source group address-group 'sonos_players'
|
|
|
|
set firewall name iot-trusted rule 110 action 'accept'
|
|
|
|
set firewall name iot-trusted rule 110 description 'Rule: accept_tcp_from_sonos_players_to_sonos_controllers'
|
|
|
|
set firewall name iot-trusted rule 110 destination group address-group 'sonos_controllers'
|
|
|
|
set firewall name iot-trusted rule 110 destination port '1400,3400,3401,3500,30000-65535'
|
|
|
|
set firewall name iot-trusted rule 110 protocol 'tcp'
|
|
|
|
set firewall name iot-trusted rule 110 source group address-group 'sonos_players'
|
|
|
|
set firewall name iot-trusted rule 999 action 'drop'
|
|
|
|
set firewall name iot-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-trusted rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to VIDEO
|
|
|
|
set firewall name iot-video default-action 'drop'
|
|
|
|
set firewall name iot-video description 'From IOT to VIDEO'
|
|
|
|
set firewall name iot-video enable-default-log
|
|
|
|
set firewall name iot-video rule 100 action 'accept'
|
|
|
|
set firewall name iot-video rule 100 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name iot-video rule 100 protocol 'tcp'
|
|
|
|
set firewall name iot-video rule 100 source group address-group 'k8s_nodes'
|
|
|
|
set firewall name iot-video rule 999 action 'drop'
|
|
|
|
set firewall name iot-video rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name iot-video rule 999 state invalid 'enable'
|
|
|
|
set firewall name iot-video rule 999 log 'enable'
|
|
|
|
|
|
|
|
# From IOT to WAN
|
|
|
|
set firewall name iot-wan default-action 'accept'
|
|
|
|
set firewall name iot-wan description 'From IOT to WAN'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to IOT
|
|
|
|
set firewall name video-iot default-action 'drop'
|
|
|
|
set firewall name video-iot description 'From VIDEO to IOT'
|
|
|
|
set firewall name video-iot enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-iot rule 100 action 'accept'
|
|
|
|
set firewall name video-iot rule 100 description 'Rule: allow connecting to hass'
|
|
|
|
set firewall name video-iot rule 100 protocol 'tcp'
|
|
|
|
set firewall name video-iot rule 100 destination group address-group 'k8s_hass'
|
|
|
|
set firewall name video-iot rule 100 destination port '8123'
|
|
|
|
set firewall name video-iot rule 999 action 'drop'
|
|
|
|
set firewall name video-iot rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-iot rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-iot rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to LAN
|
|
|
|
set firewall name video-lan default-action 'drop'
|
|
|
|
set firewall name video-lan description 'From VIDEO to LAN'
|
|
|
|
set firewall name video-lan enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-lan rule 999 action 'drop'
|
|
|
|
set firewall name video-lan rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-lan rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-lan rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to LOCAL
|
|
|
|
set firewall name video-local default-action 'drop'
|
|
|
|
set firewall name video-local description 'From VIDEO to LOCAL'
|
|
|
|
set firewall name video-local enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-local rule 50 action 'accept'
|
|
|
|
set firewall name video-local rule 50 description 'Rule: accept_dhcp'
|
|
|
|
set firewall name video-local rule 50 destination port '67,68'
|
|
|
|
set firewall name video-local rule 50 protocol 'udp'
|
|
|
|
set firewall name video-local rule 50 source port '67,68'
|
|
|
|
set firewall name video-local rule 60 action 'accept'
|
|
|
|
set firewall name video-local rule 60 description 'Rule: accept_ntp'
|
|
|
|
set firewall name video-local rule 60 destination port 'ntp'
|
|
|
|
set firewall name video-local rule 60 protocol 'udp'
|
|
|
|
set firewall name video-local rule 999 action 'drop'
|
|
|
|
set firewall name video-local rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-local rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-local rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to SERVERS
|
|
|
|
set firewall name video-servers default-action 'drop'
|
|
|
|
set firewall name video-servers description 'From VIDEO to SERVERS'
|
|
|
|
set firewall name video-servers enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-servers rule 100 action 'accept'
|
|
|
|
set firewall name video-servers rule 100 description 'Rule: accept_k8s_nodes'
|
|
|
|
set firewall name video-servers rule 100 protocol 'udp'
|
|
|
|
set firewall name video-servers rule 100 destination group address-group 'k8s_nodes'
|
|
|
|
set firewall name video-servers rule 100 source port '6987-6989'
|
|
|
|
set firewall name video-servers rule 999 action 'drop'
|
|
|
|
set firewall name video-servers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-servers rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-servers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
2023-05-25 12:05:22 -05:00
|
|
|
# From VIDEO to CONTAINERS
|
2023-05-25 11:11:13 -05:00
|
|
|
set firewall name video-containers default-action 'accept'
|
2023-05-25 12:05:22 -05:00
|
|
|
set firewall name video-containers description 'From VIDEO to CONTAINERS'
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-containers rule 40 action 'accept'
|
|
|
|
set firewall name video-containers rule 40 description 'Rule: accept_dns'
|
|
|
|
set firewall name video-containers rule 40 destination port 'domain,domain-s'
|
|
|
|
set firewall name video-containers rule 40 protocol 'tcp_udp'
|
|
|
|
set firewall name video-containers rule 999 action 'drop'
|
|
|
|
set firewall name video-containers rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-containers rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-containers rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to TRUSTED
|
|
|
|
set firewall name video-trusted default-action 'drop'
|
|
|
|
set firewall name video-trusted description 'From VIDEO to TRUSTED'
|
|
|
|
set firewall name video-trusted enable-default-log
|
2023-07-29 06:50:41 -05:00
|
|
|
set firewall name video-trusted rule 999 action 'drop'
|
|
|
|
set firewall name video-trusted rule 999 description 'Rule: drop_invalid'
|
|
|
|
set firewall name video-trusted rule 999 state invalid 'enable'
|
|
|
|
set firewall name video-trusted rule 999 log 'enable'
|
2023-03-29 13:30:45 -05:00
|
|
|
|
|
|
|
# From VIDEO to WAN
|
|
|
|
set firewall name video-wan default-action 'drop'
|
|
|
|
set firewall name video-wan description 'From VIDEO to WAN'
|