- Registriert
- Dez. 2002
- Beiträge
- 537
Ergänzung ()
Code:
firewall {
all-ping enable
broadcast-ping disable
ipv6-name WANv6_IN {
default-action drop
description "WAN inbound traffic forwarded to LAN"
enable-default-log
rule 3001 {
action accept
description "allow established/related sessions"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 3002 {
action drop
description "drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
}
ipv6-name WANv6_LOCAL {
default-action drop
description "packets from internet to gateway"
enable-default-log
rule 3001 {
action accept
description "Allow neighbor advertisements"
icmpv6 {
type neighbor-advertisement
}
protocol ipv6-icmp
}
rule 3002 {
action accept
description "Allow neighbor solicitation"
icmpv6 {
type neighbor-solicitation
}
protocol ipv6-icmp
}
rule 3003 {
action accept
description "allow established/related sessions"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 3004 {
action accept
description "Allow DHCPv6"
destination {
port 546
}
protocol udp
source {
port 547
}
}
rule 3005 {
action accept
description "Allow router advertisements"
icmpv6 {
type router-advertisement
}
protocol ipv6-icmp
}
rule 3006 {
action drop
description "drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
}
ipv6-name WANv6_OUT {
default-action accept
description "packets to internet"
}
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "packets from internet to intranet"
rule 3001 {
action accept
description "allow established/related sessions"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 3002 {
action drop
description "drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 3001 {
action accept
description "allow established/related sessions"
state {
established enable
invalid disable
new disable
related enable
}
}
rule 3002 {
action drop
description "drop invalid state"
state {
established disable
invalid enable
new disable
related disable
}
}
}
name WAN_OUT {
default-action accept
description "packets to internet"
}
receive-redirects disable
send-redirects enable
source-validation strict
syn-cookies enable
}
interfaces {
ethernet eth0 {
address dhcp
description WAN
dhcpv6-pd {
pd 0 {
interface switch0 {
prefix-id 1
}
prefix-length 62
}
prefix-only
rapid-commit enable
}
duplex auto
firewall {
in {
ipv6-name WANv6_IN
name WAN_IN
}
local {
ipv6-name WANv6_LOCAL
name WAN_LOCAL
}
out {
ipv6-name WANv6_OUT
name WAN_OUT
}
}
ipv6 {
address {
autoconf
}
dup-addr-detect-transmits 1
}
poe {
output off
}
speed auto
}
ethernet eth1 {
description PC
duplex auto
poe {
output off
}
speed auto
}
ethernet eth2 {
description SWITCH
duplex auto
poe {
output off
}
speed auto
}
ethernet eth3 {
description Local
disable
duplex auto
poe {
output off
}
speed auto
}
ethernet eth4 {
description AP
duplex auto
poe {
output 24v
}
speed auto
}
ethernet eth5 {
disable
duplex auto
speed auto
}
loopback lo {
}
switch switch0 {
address 192.168.1.1/24
description LAN
ipv6 {
dup-addr-detect-transmits 1
router-advert {
cur-hop-limit 64
default-preference high
link-mtu 0
managed-flag false
max-interval 600
name-server fe80::7683:c2ff:fefd:b26a
other-config-flag false
prefix ::/64 {
autonomous-flag true
on-link-flag true
valid-lifetime 2592000
}
reachable-time 0
retrans-timer 0
send-advert true
}
}
mtu 1500
switch-port {
interface eth1 {
}
interface eth2 {
}
interface eth4 {
}
vlan-aware disable
}
}
}
protocols {
}
service {
dhcp-server {
disabled false
hostfile-update disable
shared-network-name ALTHIR-DHCP {
authoritative enable
subnet 192.168.1.0/24 {
default-router 192.168.1.1
dns-server 192.168.1.111
domain-name alt.hir
lease 86400
start 192.168.1.230 {
stop 192.168.1.250
}
static-mapping ..........
}
unifi-controller 192.168.1.111
}
}
static-arp disable
use-dnsmasq disable
}
dns {
forwarding {
cache-size 150
listen-on switch0
name-server 192.168.1.111
}
}
gui {
http-port 80
https-port 443
older-ciphers enable
}
nat {
rule 5010 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
ubnt-discover {
disable
}
unms {
disable
}
}
system {
analytics-handler {
send-analytics-report false
}
crash-handler {
send-crash-report false
}
domain-name alt.hir
host-name ALTHIR-EDGE
login {
user althir {
authentication {
encrypted-password ********
}
level admin
}
}
name-server 192.168.1.111
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
offload {
hwnat enable
ipsec enable
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone Europe/Berlin
}
traffic-control {
smart-queue QoS {
upload {
ecn enable
flows 1024
fq-quantum 1514
limit 10240
rate 40mbit
}
wan-interface eth0
}
}
/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:suspend@1:system@5:ubnt-l2tp@1:ubnt-pptp@1:ubnt-udapi-server@1:ubnt-unms@2:ubnt-util@1:vrrp@1:vyatta-netflow@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v2.0.9.5346345.201028.1647 */
so bekomme ich jetzt die /61 auf switch0 mit prefix only auf eth0
Zuletzt bearbeitet: