iptables -t nat -A postrouting_rule -j nat_reflection_out
}
+ iptables -t filter -F nat_reflection_fwd 2>/dev/null || {
+ iptables -t filter -N nat_reflection_fwd
+ iptables -t filter -A forwarding_rule -j nat_reflection_fwd
+ }
+
find_networks() {
find_networks_cb() {
local cfg="$1"
config_foreach find_networks_cb zone "$1"
}
-
+
setup_fwd() {
local cfg="$1"
+ local reflection
+ config_get_bool reflection "$cfg" reflection 1
+ [ "$reflection" == 1 ] || return
+
local src
config_get src "$cfg" src
- [ "$src" = wan ] && {
+ local target
+ config_get target "$cfg" target DNAT
+
+ [ "$src" = wan ] && [ "$target" = DNAT ] && {
local dest
config_get dest "$cfg" dest "lan"
[ "$proto" = tcpudp ] && proto="tcp udp"
+ [ "${inthost#!}" = "$inthost" ] || return 0
+ [ "${exthost#!}" = "$exthost" ] || return 0
+
local p
for p in ${proto:-tcp udp}; do
case "$p" in
-s $lanip/$lanmk -d $inthost \
-p $p --dport $ipmin${ipmax:+:$ipmax} \
-j SNAT --to-source $lanip
+
+ iptables -t filter -A nat_reflection_fwd \
+ -s $lanip/$lanmk -d $inthost \
+ -p $p --dport $ipmin${ipmax:+:$ipmax} \
+ -j ACCEPT
;;
esac
done
config_load firewall
config_foreach setup_fwd redirect
fi
-