123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319 |
- -- Copyright 2008 Steven Barth <steven@midlink.org>
- -- Copyright 2010-2012 Jo-Philipp Wich <jow@openwrt.org>
- -- Licensed to the public under the Apache License 2.0.
- local sys = require "luci.sys"
- local utl = require "luci.util"
- local dsp = require "luci.dispatcher"
- local nxo = require "nixio"
- local ft = require "luci.tools.firewall"
- local nw = require "luci.model.network"
- local m, s, o, k, v
- arg[1] = arg[1] or ""
- m = Map("firewall",
- translate("Firewall - Traffic Rules"),
- translate("This page allows you to change advanced properties of the \
- traffic rule entry, such as matched source and destination \
- hosts."))
- m.redirect = dsp.build_url("admin/network/firewall/rules")
- nw.init(m.uci)
- local rule_type = m.uci:get("firewall", arg[1])
- if rule_type == "redirect" and m:get(arg[1], "target") ~= "SNAT" then
- rule_type = nil
- end
- if not rule_type then
- luci.http.redirect(m.redirect)
- return
- --
- -- SNAT
- --
- elseif rule_type == "redirect" then
- local name = m:get(arg[1], "name") or m:get(arg[1], "_name")
- if not name or #name == 0 then
- name = translate("(Unnamed SNAT)")
- else
- name = "SNAT %s" % name
- end
- m.title = "%s - %s" %{ translate("Firewall - Traffic Rules"), name }
- local wan_zone = nil
- m.uci:foreach("firewall", "zone",
- function(s)
- local n = s.network or s.name
- if n then
- local i
- for i in utl.imatch(n) do
- if i == "wan" then
- wan_zone = s.name
- return false
- end
- end
- end
- end)
- s = m:section(NamedSection, arg[1], "redirect", "")
- s.anonymous = true
- s.addremove = false
- ft.opt_enabled(s, Button)
- ft.opt_name(s, Value, translate("Name"))
- o = s:option(Value, "proto",
- translate("Protocol"),
- translate("You may specify multiple by selecting \"-- custom --\" and \
- then entering protocols separated by space."))
- o:value("all", "All protocols")
- o:value("tcp udp", "TCP+UDP")
- o:value("tcp", "TCP")
- o:value("udp", "UDP")
- o:value("icmp", "ICMP")
- function o.cfgvalue(...)
- local v = Value.cfgvalue(...)
- if not v or v == "tcpudp" then
- return "tcp udp"
- end
- return v
- end
- o = s:option(Value, "src", translate("Source zone"))
- o.nocreate = true
- o.default = "wan"
- o.template = "cbi/firewall_zonelist"
- o = s:option(Value, "src_ip", translate("Source IP address"))
- o.rmempty = true
- o.datatype = "neg(ipaddr)"
- o.placeholder = translate("any")
- luci.sys.net.ipv4_hints(function(ip, name)
- o:value(ip, "%s (%s)" %{ ip, name })
- end)
- o = s:option(Value, "src_port",
- translate("Source port"),
- translate("Match incoming traffic originating from the given source \
- port or port range on the client host."))
- o.rmempty = true
- o.datatype = "neg(portrange)"
- o.placeholder = translate("any")
- o = s:option(Value, "dest", translate("Destination zone"))
- o.nocreate = true
- o.default = "lan"
- o.template = "cbi/firewall_zonelist"
- o = s:option(Value, "dest_ip", translate("Destination IP address"))
- o.datatype = "neg(ip4addr)"
- luci.sys.net.ipv4_hints(function(ip, name)
- o:value(ip, "%s (%s)" %{ ip, name })
- end)
- o = s:option(Value, "dest_port",
- translate("Destination port"),
- translate("Match forwarded traffic to the given destination port or \
- port range."))
- o.rmempty = true
- o.placeholder = translate("any")
- o.datatype = "neg(portrange)"
- o = s:option(Value, "src_dip",
- translate("SNAT IP address"),
- translate("Rewrite matched traffic to the given address."))
- o.rmempty = false
- o.datatype = "ip4addr"
- for k, v in ipairs(nw:get_interfaces()) do
- local a
- for k, a in ipairs(v:ipaddrs()) do
- o:value(a:host():string(), '%s (%s)' %{
- a:host():string(), v:shortname()
- })
- end
- end
- o = s:option(Value, "src_dport", translate("SNAT port"),
- translate("Rewrite matched traffic to the given source port. May be \
- left empty to only rewrite the IP address."))
- o.datatype = "portrange"
- o.rmempty = true
- o.placeholder = translate('Do not rewrite')
- s:option(Value, "extra",
- translate("Extra arguments"),
- translate("Passes additional arguments to iptables. Use with care!"))
- --
- -- Rule
- --
- else
- local name = m:get(arg[1], "name") or m:get(arg[1], "_name")
- if not name or #name == 0 then
- name = translate("(Unnamed Rule)")
- end
- m.title = "%s - %s" %{ translate("Firewall - Traffic Rules"), name }
- s = m:section(NamedSection, arg[1], "rule", "")
- s.anonymous = true
- s.addremove = false
- ft.opt_enabled(s, Button)
- ft.opt_name(s, Value, translate("Name"))
- o = s:option(ListValue, "family", translate("Restrict to address family"))
- o.rmempty = true
- o:value("", translate("IPv4 and IPv6"))
- o:value("ipv4", translate("IPv4 only"))
- o:value("ipv6", translate("IPv6 only"))
- o = s:option(Value, "proto", translate("Protocol"))
- o:value("all", translate("Any"))
- o:value("tcp udp", "TCP+UDP")
- o:value("tcp", "TCP")
- o:value("udp", "UDP")
- o:value("icmp", "ICMP")
- function o.cfgvalue(...)
- local v = Value.cfgvalue(...)
- if not v or v == "tcpudp" then
- return "tcp udp"
- end
- return v
- end
- o = s:option(DynamicList, "icmp_type", translate("Match ICMP type"))
- o:value("", "any")
- o:value("echo-reply")
- o:value("destination-unreachable")
- o:value("network-unreachable")
- o:value("host-unreachable")
- o:value("protocol-unreachable")
- o:value("port-unreachable")
- o:value("fragmentation-needed")
- o:value("source-route-failed")
- o:value("network-unknown")
- o:value("host-unknown")
- o:value("network-prohibited")
- o:value("host-prohibited")
- o:value("TOS-network-unreachable")
- o:value("TOS-host-unreachable")
- o:value("communication-prohibited")
- o:value("host-precedence-violation")
- o:value("precedence-cutoff")
- o:value("source-quench")
- o:value("redirect")
- o:value("network-redirect")
- o:value("host-redirect")
- o:value("TOS-network-redirect")
- o:value("TOS-host-redirect")
- o:value("echo-request")
- o:value("router-advertisement")
- o:value("router-solicitation")
- o:value("time-exceeded")
- o:value("ttl-zero-during-transit")
- o:value("ttl-zero-during-reassembly")
- o:value("parameter-problem")
- o:value("ip-header-bad")
- o:value("required-option-missing")
- o:value("timestamp-request")
- o:value("timestamp-reply")
- o:value("address-mask-request")
- o:value("address-mask-reply")
- o = s:option(Value, "src", translate("Source zone"))
- o.nocreate = true
- o.allowany = true
- o.default = "wan"
- o.template = "cbi/firewall_zonelist"
- o = s:option(Value, "src_mac", translate("Source MAC address"))
- o.datatype = "list(macaddr)"
- o.placeholder = translate("any")
- luci.sys.net.mac_hints(function(mac, name)
- o:value(mac, "%s (%s)" %{ mac, name })
- end)
- o = s:option(Value, "src_ip", translate("Source address"))
- o.datatype = "neg(ipaddr)"
- o.placeholder = translate("any")
- luci.sys.net.ipv4_hints(function(ip, name)
- o:value(ip, "%s (%s)" %{ ip, name })
- end)
- o = s:option(Value, "src_port", translate("Source port"))
- o.datatype = "list(neg(portrange))"
- o.placeholder = translate("any")
- o = s:option(Value, "dest", translate("Destination zone"))
- o.nocreate = true
- o.allowany = true
- o.allowlocal = true
- o.template = "cbi/firewall_zonelist"
- o = s:option(Value, "dest_ip", translate("Destination address"))
- o.datatype = "neg(ipaddr)"
- o.placeholder = translate("any")
- luci.sys.net.ipv4_hints(function(ip, name)
- o:value(ip, "%s (%s)" %{ ip, name })
- end)
- o = s:option(Value, "dest_port", translate("Destination port"))
- o.datatype = "list(neg(portrange))"
- o.placeholder = translate("any")
- o = s:option(ListValue, "target", translate("Action"))
- o.default = "ACCEPT"
- o:value("DROP", translate("drop"))
- o:value("ACCEPT", translate("accept"))
- o:value("REJECT", translate("reject"))
- o:value("NOTRACK", translate("don't track"))
- s:option(Value, "extra",
- translate("Extra arguments"),
- translate("Passes additional arguments to iptables. Use with care!"))
- end
- return m
|