10-custom-filter-chains.nft 1.1 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. ## The firewall4 input, forward and output chains are registered with
  2. ## priority `filter` (0).
  3. ## Uncomment the chains below if you want to stage rules *before* the
  4. ## default firewall input, forward and output chains.
  5. # chain user_pre_input {
  6. # type filter hook input priority -1; policy accept;
  7. # tcp dport ssh ct state new log prefix "SSH connection attempt: "
  8. # }
  9. #
  10. # chain user_pre_forward {
  11. # type filter hook forward priority -1; policy accept;
  12. # }
  13. #
  14. # chain user_pre_output {
  15. # type filter hook output priority -1; policy accept;
  16. # }
  17. ## Uncomment the chains below if you want to stage rules *after* the
  18. ## default firewall input, forward and output chains.
  19. # chain user_post_input {
  20. # type filter hook input priority 1; policy accept;
  21. # ct state new log prefix "Firewall4 accepted ingress: "
  22. # }
  23. #
  24. # chain user_post_forward {
  25. # type filter hook forward priority 1; policy accept;
  26. # ct state new log prefix "Firewall4 accepted forward: "
  27. # }
  28. #
  29. # chain user_post_output {
  30. # type filter hook output priority 1; policy accept;
  31. # ct state new log prefix "Firewall4 accepted egress: "
  32. # }