mirror of
https://github.com/vincentmli/bpfire.git
synced 2026-04-12 20:16:49 +02:00
suricata: Add rule to skip IPS if a packet has the bypass bit set
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org> Tested-by: Stefan Schantl <stefan.schantl@ipfire.org> Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
This commit is contained in:
committed by
Arne Fitzenreiter
parent
855475580b
commit
49dd3e2946
@@ -134,6 +134,12 @@ function generate_fw_rules {
|
||||
# Flush the firewall chains.
|
||||
flush_fw_chain
|
||||
|
||||
# Skip anything that has the bypass bit set
|
||||
local chain
|
||||
for chain in "${IPS_INPUT_CHAIN}" "${IPS_FORWARD_CHAIN}" "${IPS_OUTPUT_CHAIN}"; do
|
||||
iptables -w -A "${chain}" -m mark --mark "${BYPASS_MARK}/${BYPASS_MASK}" -j RETURN
|
||||
done
|
||||
|
||||
# Check if the array of enabled_ips_zones contains any elements.
|
||||
if [[ ${enabled_ips_zones[@]} ]]; then
|
||||
# Loop through the array and create firewall rules.
|
||||
|
||||
Reference in New Issue
Block a user