adds iptables rules to allow established connections, internal network traffic, and Docker communication
This commit is contained in:
parent
a242530770
commit
3cb256f6e5
@ -22,7 +22,7 @@
|
|||||||
firewall = {
|
firewall = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|
||||||
# Only truly external ports
|
# External ports
|
||||||
allowedTCPPorts = [
|
allowedTCPPorts = [
|
||||||
80 # HTTP
|
80 # HTTP
|
||||||
443 # HTTPS
|
443 # HTTPS
|
||||||
@ -64,6 +64,24 @@
|
|||||||
"enp39s0".allowedTCPPorts = internalPorts;
|
"enp39s0".allowedTCPPorts = internalPorts;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
extraCommands = ''
|
||||||
|
# Allow established connections
|
||||||
|
iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
|
||||||
|
|
||||||
|
# Allow internal network traffic
|
||||||
|
iptables -A INPUT -i docker0 -j ACCEPT
|
||||||
|
iptables -A INPUT -i tailscale0 -j ACCEPT
|
||||||
|
iptables -A INPUT -s 192.168.86.0/24 -j ACCEPT
|
||||||
|
|
||||||
|
# Allow Docker container communication
|
||||||
|
iptables -A DOCKER-USER -i docker0 -o docker0 -j ACCEPT
|
||||||
|
|
||||||
|
# Allow traffic between different Docker networks
|
||||||
|
iptables -A FORWARD -i br-* -o br-* -j ACCEPT
|
||||||
|
iptables -A FORWARD -i docker0 -o br-* -j ACCEPT
|
||||||
|
iptables -A FORWARD -i br-* -o docker0 -j ACCEPT
|
||||||
|
'';
|
||||||
|
|
||||||
# Required for Tailscale
|
# Required for Tailscale
|
||||||
checkReversePath = "loose";
|
checkReversePath = "loose";
|
||||||
};
|
};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user