From 74d068a92c91b1f5a5640e0cf5f94675ad154221 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Gardais=20J=C3=A9r=C3=A9my?= Date: Wed, 9 Aug 2017 15:01:35 +0200 Subject: [PATCH] Rollback to inet family (for ipv4 and ipv6). --- CHANGELOG.md | 1 + README.md | 4 ++-- templates/etc/nftables.conf.j2 | 2 +- 3 files changed, 4 insertions(+), 3 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 95f2e50..199fe6d 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -3,6 +3,7 @@ ### Features * Manage nftables service at startup. +* Rollback to inet family to manage both ipv4 and ipv6. ### Default Rules * Use more sets and vars definitions to avoid multiple rules. diff --git a/README.md b/README.md index 1415623..22230c4 100644 --- a/README.md +++ b/README.md @@ -140,7 +140,7 @@ flush ruleset include "/etc/nftables.d/defines.nft" -table ip firewall { +table inet firewall { chain global { # 000 state management ct state established,related accept @@ -155,7 +155,7 @@ table ip firewall { And you can get all rules and definitons by displaying the ruleset on the host : `$ nft list ruleset` : ``` -table ip firewall { +table inet firewall { set blackhole { type ipv4_addr elements = { 255.255.255.255, 224.0.0.1, 224.0.0.251} diff --git a/templates/etc/nftables.conf.j2 b/templates/etc/nftables.conf.j2 index 64fc939..625579d 100755 --- a/templates/etc/nftables.conf.j2 +++ b/templates/etc/nftables.conf.j2 @@ -9,7 +9,7 @@ flush ruleset include "/etc/nftables.d/defines.nft" -table ip firewall { +table inet firewall { chain global { {% for group, rules in globalmerged|dictsort %} # {{ group }}