Firewall-SOSDG/options.default

93 lines
1.9 KiB
Plaintext
Raw Normal View History

# This is for testing purposes.
IPTABLES=/bin/true
IP6TABLES=/bin/true
2009-08-13 13:53:20 -06:00
# Uncomment below to actually activate firewall
#IPTABLES=/sbin/iptables
#IP6TABLES=/sbin/ip6tables
# Don't forget to rename this file to 'options'!
# I'm trying to make this config as simple as possible. Comment out
# options you don't want to use, uncomment them to use them.
# Do we want NAT/Conntrack/Forward features?
2009-08-13 13:53:20 -06:00
NAT=1
CONNTRACK=1
FORWARD=1
# Blocking incoming connections by default?
2009-08-13 13:53:20 -06:00
BLOCKINCOMING=1
# Clamp MSS, useful on DSL/VPN links
2009-08-13 13:53:20 -06:00
#CLAMPMSS=ppp0
2009-08-13 15:12:04 -06:00
# Do we run a LAN DHCP server?
2009-11-16 13:39:19 -07:00
#LANDHCPSERVER=1
# Internal Interface
#INTINF=ppp+
2009-08-13 15:12:04 -06:00
# Port forwardings, requires NAT
PORTFW=$BASEDIR/port-forwards
2009-08-13 13:53:20 -06:00
# TCP/UDP/Protocol to allow
2009-08-13 13:53:20 -06:00
TCPPORTS="20 21 22 53 80 113 123 443"
UDPPORTS="53"
# common protocols to allow include ipsec, gre, and ipv6
ALLOWEDPROTO="41 47 50 51"
# IPs that are allowed to bypass firewall
2009-08-13 13:53:20 -06:00
TRUSTEDIP="127.0.0.1"
# Don't track these IPs, useful in some occasions. Don't
# use otherwise.
2009-08-13 13:53:20 -06:00
DONTTRACK="127.0.0.1"
# IP range(s) to forward
2009-08-13 15:56:21 -06:00
ROUTING=$BASEDIR/ipv4-routing
# IP ranges(s) to NAT using SNAT.
2009-08-13 13:53:20 -06:00
NATRANGE="192.168.1.0/24"
# External IP and interface for SNAT
2009-08-13 13:53:20 -06:00
NATEXTIP="172.16.1.1"
NATEXTIF="eth0"
2009-11-16 13:39:19 -07:00
2009-08-29 18:52:40 -06:00
# IP Ranges to block all traffic incoming/outgoing
BLOCKEDIP=$BASEDIR/blocked
# IPv6 related features. Commenting out IPV6 variable disables ALL
# IPv6 related items
IPV6=1
# IPv6 Forwarding
#IPV6FORWARD=1
# Default block all incoming ipv6 connections?
IPV6BLOCKINCOMING=1
# Special case for routers that have ipv6 clients behind them.
# Useful if clients do not have proper ipv6 firewalls.
#IPV6ROUTEDCLIENTBLOCK=1
# Interface IPv6 comes in on (either tunnel or real network interface)
#IPV6INT=he-ipv6
2009-08-23 16:43:56 -06:00
# LAN interface for IPv6
#IPV6LAN=eth1
# Trusted IPv6 ranges
2009-08-13 13:53:20 -06:00
IPV6TRUSTED="::1"
# Allowed incoming IPv6 ports (for now, use $TCPPORTS and $UDPPORTS to
# have same for both ipv4 and ipv6)
2009-08-13 13:53:20 -06:00
IPV6TCP=$TCPPORTS
IPV6UDP=$UDPPORTS
# IPv6 range to forward
2009-08-13 13:53:20 -06:00
#IPV6FORWARDRANGE=""