Re: ipset issues

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 25 May 2016, Art Emius wrote:

> Recently I've encountered an issue with using ipset in my firewall.
> 
> I use Debian Linux 8.4, running in virtual machine inside ESXi 5.5.
> My host is 192.168.1.2, remote host is 192.168.1.1.
> I'm running ssh server on my host and want to limit access to it using
> one rule with two sets of different types like this:
> 
> iptables -t filter -A INPUT -m set --match-set NETS_IFACE src,src -m
> set --match-set SSH src,dst,dst -j ACCEPT
> iptables -p OUTPUT ACCEPT
> 
> ipset create SSH hash:ip,port,ip hashsize 8 maxelem 8 family inet
> ipset add SSH 192.168.1.1,tcp:22,192.168.1.2
> 
> ipset create NETS_IFACE hash:net,iface hashsize 128 maxelem 128 family inet
> ipset add NETS_IFACE 192.168.1.0/24,eth1

You should use "--match-set NETS_IFACE src,dst" in the rule above if you 
want to limit the access to the traffic from the 192.168.1.0/24 subnet 
received on interface eth1 only.

> It doesn't work this way. eth1 really exists and handle traffic.
> But If I use rule like this it works fine.
> iptables -t filter -A INPUT -i eth1 -m set --match-set SSH src,dst,dst -j ACCEPT

Best regards,
Jozsef
-
E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxxxxxx
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences
          H-1525 Budapest 114, POB. 49, Hungary
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux