Le mardi 31 mai 2011 Ã 22:11 +0200, Jozsef Kadlecsik a Ãcrit : > Hi, > > Besides a few bugfixes, ipset 6.7 comes with a new set type called > hash:net,iface. The new type makes possible to store network address and > interface name pairs in a set. That way egress and ingress filtering is > possible with ipset, in just a few rules. Just an example: > > # Define the set for all your networks and fill it out > ipset create nets hash:net > ipset add nets 10.0.0.0/8 > ipset add nets 192.168.0.0/16 > ... > # Define the set with the allowed network, interface pairs > ipset create ifaces hash:net,iface > ipset add ifaces 10.0.0.0/24,eth0 > ipset add ifaces 10.2.0.0/16,eth1 > ... > # Create a chain to handle your networks > iptables -N nets > iptables -A nets -m set --match-set ifaces src,src -j ACCEPT > iptables -A nets -j log-and-drop-spoofed-packets > # Egress and ingress filtering > iptables -t raw -A PREROUTING -m set --match-set nets src -j ifaces > iptables -t raw -A PREROUTING -i external-iface0 -j ACCEPT > iptables -t raw -A PREROUTING -i external-iface1 -j ACCEPT Hi Jozsef I could probably use this feature if plugged into tc filter, so that I really can apply qdisc/class trafic shaping on ingress, to queue packet into right queue, before iptables layer. tc filter add dev ifb0 protocol ip parent 10: handle 2 \ flow ipset ipset keys src \ flowid 1:40 Any plan on this side ? Thanks > ... > iptables -t raw -j log-and-drop-spoofed-packets > # That's all :-) -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html