1515# KIND, either express or implied. See the License for the
1616# specific language governing permissions and limitations
1717# under the License.
18- from CsDatabag import CsDataBag
18+ from CsDatabag import CsDataBag , CsCmdLine
1919from CsApp import CsApache , CsDnsmasq , CsPasswdSvc
20+ import CsHelper
2021import logging
2122from netaddr import IPAddress , IPNetwork
2223import CsHelper
@@ -197,7 +198,7 @@ def is_added(self):
197198 return self .get_attr ("add" )
198199
199200 def to_str (self ):
200- print (self .address )
201+ pprint (self .address )
201202
202203
203204class CsDevice :
@@ -370,6 +371,8 @@ def fw_router(self):
370371 self .fw .append (["mangle" , "front" ,
371372 "-A FIREWALL_%s " % self .address ['public_ip' ] +
372373 "-m state --state RELATED,ESTABLISHED -j ACCEPT" ])
374+ self .fw .append (["mangle" , "" ,
375+ "-A FIREWALL_%s DROP" % self .address ['public_ip' ]])
373376 self .fw .append (["mangle" , "" ,
374377 "-A VPN_%s -m state --state RELATED,ESTABLISHED -j ACCEPT" % self .address ['public_ip' ]])
375378 self .fw .append (["mangle" , "" ,
@@ -387,7 +390,8 @@ def fw_router(self):
387390
388391 self .fw .append (["filter" , "" , "-A INPUT -d 224.0.0.18/32 -j ACCEPT" ])
389392 self .fw .append (["filter" , "" , "-A INPUT -d 225.0.0.50/32 -j ACCEPT" ])
390- self .fw .append (["filter" , "" , "-A INPUT -i %s -m state --state RELATED,ESTABLISHED -j ACCEPT" % self .dev ])
393+ self .fw .append (["filter" , "" , "-A INPUT -i %s -m state --state RELATED,ESTABLISHED -j ACCEPT" %
394+ self .dev ])
391395 self .fw .append (["filter" , "" , "-A INPUT -p icmp -j ACCEPT" ])
392396 self .fw .append (["filter" , "" , "-A INPUT -i lo -j ACCEPT" ])
393397
@@ -430,13 +434,6 @@ def fw_vpcrouter(self):
430434 self .fw .append (["mangle" , "front" , "-A PREROUTING " +
431435 "-m state --state RELATED,ESTABLISHED " +
432436 "-j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff" ])
433-
434- self .fw .append (["" , "front" , "-A FORWARD -j NETWORK_STATS" ])
435- self .fw .append (["" , "front" , "-A INPUT -j NETWORK_STATS" ])
436- self .fw .append (["" , "front" , "-A OUTPUT -j NETWORK_STATS" ])
437-
438- self .fw .append (["filter" , "" , "-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT" ])
439-
440437 if self .get_type () in ["guest" ]:
441438 self .fw .append (["filter" , "" , "-A FORWARD -d %s -o %s -j ACL_INBOUND_%s" %
442439 (self .address ['network' ], self .dev , self .dev )])
@@ -475,14 +472,22 @@ def fw_vpcrouter(self):
475472 ])
476473
477474 if self .get_type () in ["public" ]:
475+ self .fw .append (["" , "front" ,
476+ "-A FORWARD -o %s -d %s -j ACL_INBOUND_%s" % (
477+ self .dev , self .address ['network' ], self .dev )
478+ ])
478479 self .fw .append (
479480 ["mangle" , "" , "-A FORWARD -j VPN_STATS_%s" % self .dev ])
480481 self .fw .append (
481482 ["mangle" , "" , "-A VPN_STATS_%s -o %s -m mark --mark 0x525/0xffffffff" % (self .dev , self .dev )])
482483 self .fw .append (
483484 ["mangle" , "" , "-A VPN_STATS_%s -i %s -m mark --mark 0x524/0xffffffff" % (self .dev , self .dev )])
484485 self .fw .append (
485- ["" , "front" , "-A FORWARD -j NETWORK_STATS_eth1" ])
486+ ["" , "front" , "-A FORWARD -j NETWORK_STATS_%s" % self .dev ])
487+
488+ self .fw .append (["" , "front" , "-A FORWARD -j NETWORK_STATS" ])
489+ self .fw .append (["" , "front" , "-A INPUT -j NETWORK_STATS" ])
490+ self .fw .append (["" , "front" , "-A OUTPUT -j NETWORK_STATS" ])
486491
487492 self .fw .append (["" , "" , "-A NETWORK_STATS -i eth0 -o eth2 -p tcp" ])
488493 self .fw .append (["" , "" , "-A NETWORK_STATS -i eth2 -o eth0 -p tcp" ])
@@ -491,11 +496,9 @@ def fw_vpcrouter(self):
491496
492497 self .fw .append (["filter" , "" , "-A INPUT -d 224.0.0.18/32 -j ACCEPT" ])
493498 self .fw .append (["filter" , "" , "-A INPUT -d 225.0.0.50/32 -j ACCEPT" ])
494- self .fw .append (["filter" , "" , "-A INPUT -i %s -m state --state RELATED,ESTABLISHED -j ACCEPT" % self .dev ])
495- self .fw .append (["filter" , "" , "-A INPUT -i lo -j ACCEPT" ])
499+
496500 self .fw .append (["filter" , "" , "-A INPUT -p icmp -j ACCEPT" ])
497501 self .fw .append (["filter" , "" , "-A INPUT -i eth0 -p tcp -m tcp --dport 3922 -m state --state NEW,ESTABLISHED -j ACCEPT" ])
498- self .fw .append (["filter" , "" , "-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT" ])
499502
500503 self .fw .append (["filter" , "" , "-P INPUT DROP" ])
501504 self .fw .append (["filter" , "" , "-P FORWARD DROP" ])
0 commit comments