mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-10-09 00:58:25 -04:00
Hints on disposables and correct nft syntax error
This commit is contained in:
parent
b0be3be4ee
commit
d1e60ccdef
1 changed files with 4 additions and 4 deletions
|
@ -139,7 +139,7 @@ In order to allow networking from qube A (client) to qube B (server) follow thes
|
|||
|
||||
- Now you should be able to reach B from A – test it using e.g. ping issued from A. Note however, that this doesn’t allow you to reach A from B – for this you would need two more rules, with A and B swapped.
|
||||
|
||||
- If everything works as expected, then you should write the above nftables rules into firewallVM’s ``qubes-firewall-user-script`` script. This script is run when the netvm starts up. You should also write relevant rules in A and B’s ``rc.local`` script which is run when the qube is launched. Here’s an example how to update the script:
|
||||
- If everything works as expected, then you should write the above nftables rules into firewallVM’s ``qubes-firewall-user-script`` script. This script is run when the netvm starts up. Remember that you have to perform this change in the disposable template if the firewallVM is a disposable VM; otherwise the change will get lost on restart of the VM. You should also write relevant rules in A and B’s ``rc.local`` script which is run when the qube is launched. Here’s an example how to update the script:
|
||||
|
||||
|
||||
|
||||
|
@ -418,7 +418,7 @@ In this example, we can see 7 packets in the forward rule, and 3 packets in the
|
|||
|
||||
|
||||
|
||||
Once you have confirmed that the counters increase, store the commands used in the previous steps in ``/rw/config/qubes-firewall-user-script`` so they get set on sys-net start-up:
|
||||
Once you have confirmed that the counters increase, store the commands used in the previous steps in ``/rw/config/qubes-firewall-user-script`` so they get set on sys-net start-up, and remember that you have to perform this change in the disposable template if sys-net is a disposable VM; otherwise the change will get lost on restart of the VM:
|
||||
|
||||
.. code:: console
|
||||
|
||||
|
@ -437,7 +437,7 @@ Content of ``/rw/config/qubes-firewall-user-script`` in ``sys-net``:
|
|||
if nft add chain qubes custom-dnat-qubeDEST '{ type nat hook prerouting priority filter +1 ; policy accept; }'
|
||||
then
|
||||
# create the dnat rule
|
||||
nft add rule qubes custom-dnat-qubeDEST iifname ens6 saddr 192.168.x.y/24 tcp dport 443 ct state new,established,related counter dnat 10.137.1.z
|
||||
nft add rule qubes custom-dnat-qubeDEST iifname ens6 ip saddr 192.168.x.y/24 tcp dport 443 ct state new,established,related counter dnat 10.137.1.z
|
||||
|
||||
# allow forwarded traffic
|
||||
nft add rule qubes custom-forward iifname ens6 ip saddr 192.168.x.y/24 ip daddr 10.137.1.z tcp dport 443 ct state new,established,related counter accept
|
||||
|
@ -477,7 +477,7 @@ Third step, code the appropriate new filtering firewall rule to allow new connec
|
|||
|
||||
|
||||
|
||||
Once you have confirmed that the counters increase, store these commands in the script ``/rw/config/qubes-firewall-user-script``
|
||||
Once you have confirmed that the counters increase, store these commands in the script ``/rw/config/qubes-firewall-user-script`` , and remember that you have to perform this change in the disposable template if the firewallVM is a disposable VM; otherwise the change will get lost on restart of the VM.
|
||||
|
||||
.. code:: console
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue