求助 nftables ipv6 相关 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
WingOwO
V2EX    宽带症候群

求助 nftables ipv6 相关

  •  
  •   WingOwO 2024-04-17 14:44:58 +08:00 1427 次点击
    这是一个创建于 541 天前的主题,其中的信息可能已经有所发展或是发生改变。

    配置了 nftables IPv6 防火墙, 打算是开放 22 和 1874 端口

    发现更新配置后, 有时候配置不起效, 改成完全开放端口, 再改回去, 端口限制才会起效

    也有时候起效了, 但只能持续一段时间, 过一段时间之后就无法访问

    现在关闭 IPV6 防火墙之后是完全可以正常访问的

    求助这里是有什么问题吗?

    这里是整张配置表, 也顺便配置了路由

    flush ruleset define EV_WORLD = enp0 define DEV_LAN = enp1 define DEV_WLAN = wlp define DEV_COM = podman0 define NET_PRIVATE = 192.168.1.0/22 define NET_COM = 10.88.0.0/16 table ip global { chain inbound_world { icmp type echo-request limit rate 5/second accept ip protocol . th dport vmap { udp . 53 : accept, tcp . 53 : accept, udp . 67 : accept } } chain inbound_private_lan { icmp type echo-request limit rate 5/second accept ip protocol . th dport vmap { tcp . 22 : accept, udp . 53 : accept, tcp . 53 : accept, udp . 67 : accept, tcp . 1874 : accept } } chain inbound_private_wlan { icmp type echo-request limit rate 5/second accept ip protocol . th dport vmap { tcp . 22 : accept, udp . 53 : accept, tcp . 53 : accept, udp . 67 : accept, tcp . 1874 : accept} } chain inbound { type filter hook input priority 0; policy drop; ct state vmap { established : accept, related : accept, invalid : drop } iifname vmap { lo : accept, $DEV_WORLD : jump inbound_world, $DEV_LAN : jump inbound_private_lan, $DEV_WLAN : jump inbound_private_wlan } } chain forward { type filter hook forward priority 0; policy drop; ct state vmap { established : accept, related : accept, invalid : drop } meta iifname . meta oifname { $DEV_LAN . $DEV_WORLD, $DEV_WLAN . $DEV_WORLD, $DEV_WORLD . $DEV_LAN, $DEV_WORLD . $DEV_WLAN, $DEV_LAN . $DEV_WLAN, $DEV_WLAN . $DEV_LAN, $DEV_COM . $DEV_WORLD, $DEV_WORLD . $DEV_COM} accept } chain postrouting { type nat hook postrouting priority 100; policy accept; ip saddr $NET_PRIVATE meta oifname $DEV_WORLD counter masquerade ip saddr $NET_COM meta oifname $DEV_WORLD counter masquerade } } table ip6 ip6global { chain inbound_world { icmpv6 type { echo-request, nd-neighbor-solicit } limit rate 5/second accept tcp dport { 22, 1874 } accept #生效后, 一段时间后失效 } chain inbound { type filter hook input priority 0; policy drop; ct state vmap { established : accept, related : accept, invalid : drop } iifname vmap { lo : accept, $DEV_WORLD : jump inbound_world } } } 
    4 条回复    2024-06-16 11:57:23 +08:00
    yjzll
        1
    yjzll  
       2024-04-17 22:03:07 +08:00
    limit rate 5/second 加个重新计数的参数试试
    lsl9119
        2
    lsl9119  
       2024-06-10 20:47:03 +08:00
    请问解决了么?我也遇到类似的情况
    WingOwO
        3
    WingOwO  
    OP
       2024-06-11 17:41:35 +08:00
    @lsl9119 #2
    解决了, 我的拓扑是光猫分配的 IPv6 , 然后我的防火墙阻止了 ICMPv6 协议, 导致分配不了 IPv6 到我的服务器
    (但是使用命令 <ip addr> 还是能看到已经分配的 IPv6 地址)
    最后我在防火墙允许 ICMPv6 的 SLAAC 协议 就没问题了
    可以检查下是 SLAAC 分配还是 DHCPv6 分配, 如果是 DHCPv6 协议分配的话, 放行对应的端口就好
    lsl9119
        4
    lsl9119  
       2024-06-16 11:57:23 +08:00 via iPhone
    我是 openwrt 做拨号的光猫只是桥接,和你这个还不太一样,谢谢回复
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     5312 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 22ms UTC 09:06 PVG 17:06 LAX 02:06 JFK 05:06
    Do have faith in what you're doing.
    ubao snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86