Hi Paulo, On Wed, Dec 27, 2017 at 04:25:56PM -0200, paulo bruck wrote: > Hy Guys. Me again 80) > > I'm studing nftables I think it would be better IMHO to do a cut and > paste at link below that talks about Sets I can create an account for you, so you can edit this yourself. Let me know and I'll send you the token privately. Thanks. > before > ############################################ > Named sets > > You can create the named sets with the following command: > > % nft add set filter blackhole { type ipv4_addr\;} > > Note that blackhole is the name of the set in this case. The type > option indicates the data type that this set stores, which is an IPv4 > address in this case. Current maximum name length is 16 characters. > > % nft add element filter blackhole { 192.168.3.4 } > % nft add element filter blackhole { 192.168.1.4, 192.168.1.5 } > > Then, you can use it from the rule: > > % nft add rule ip input ip saddr @blackhole drop > > Named sets can be updated anytime, so you can add and delete element from them. > > Eric Leblond in his Why you will love nftables article shows a very > simple example to compare iptables with nftables: > > ip6tables -A INPUT -p tcp -m multiport --dports 23,80,443 -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbor-solicitation -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type echo-request -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type router-advertisement -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbor-advertisement -j ACCEPT > > Which can be expressed in nftables with a couple of rules that provide a set: > > % nft add rule ip6 filter input tcp dport {telnet, http, https} accept > % nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, > echo-request, nd-router-advert, nd-neighbor-advert } accept > #################################################### > > after > > ###################################################### > Eric Leblond in his Why you will love nftables article shows a very > simple example to compare iptables with nftables: > > ip6tables -A INPUT -p tcp -m multiport --dports 23,80,443 -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbor-solicitation -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type echo-request -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type router-advertisement -j ACCEPT > ip6tables -A INPUT -p icmpv6 --icmpv6-type neighbor-advertisement -j ACCEPT > > Which can be expressed in nftables with a couple of rules that provide a set: > > % nft add rule ip6 filter input tcp dport {telnet, http, https} accept > % nft add rule ip6 filter input icmpv6 type { nd-neighbor-solicit, > echo-request, nd-router-advert, nd-neighbor-advert } accept > > > Named sets > > You can create the named sets with the following command: > > % nft add set filter blackhole { type ipv4_addr\;} > > Note that blackhole is the name of the set in this case. The type > option indicates the data type that this set stores, which is an IPv4 > address in this case. Current maximum name length is 16 characters. > > % nft add element filter blackhole { 192.168.3.4 } > % nft add element filter blackhole { 192.168.1.4, 192.168.1.5 } > > Then, you can use it from the rule: > > % nft add rule ip input ip saddr @blackhole drop > > Named sets can be updated anytime, so you can add and delete element from them. > > ############################################################# > > best regards > -- > To unsubscribe from this list: send the line "unsubscribe netfilter" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html