树莓派上的 Linux 路由器配置 VPN (IPv6)

来自 Alpine Linux

我已将此部分从主文章 树莓派上的 Linux 路由器配置 VPN 中分离出来,IPv6 的实现需要对初始文章进行一些更改才能工作。但我没有在此处复制所有内容,只复制了与 IPv6 相关的内容。

引言

IPv6 为我们的网络引入了许多新的复杂性。如果您已完成之前的仅 IPv4 指南 树莓派上的 Linux 路由器配置 VPN,请继续阅读。

您的 VPN 提供商可能只为您提供单栈连接(没有 IPv6)。您将无法在 VLAN 3 上实现 IPv6 寻址,以通过 VPN 传输您的 IPv6 流量。如果您的 ISP 为您提供 IPv6 寻址,您仍然可以在 VLAN2 上实现寻址,以将流量直接传输到您的 ISP。在本例中,我两者都做了。

如果您对 IPv6 了解不多,那么这些页面可能会让您快速入门。


Network Diagram IPv4 and IPv6
IPv4 和 IPv6 网络图

启用 IPv6 支持

假设您正在使用 Alpine Linux 内核,IPv6 支持作为单独的模块提供。

modprobe ipv6

要将模块添加到我们的启动配置中。

echo "ipv6" >> /etc/modules

/etc/sysctl.d/local.conf

修改 sysctl 部分以包含 IPv6 支持

# Controls IP packet forwarding
net.ipv4.ip_forward = 1

# Needed to use fwmark
net.ipv4.conf.all.rp_filter = 2

# https://vk5tu.livejournal.com/37206.html
# What's this special value "2"? Originally the value was "1", but this 
# disabled autoconfiguration on all interfaces. That is, you couldn't appear 
# to be a router on some interfaces and appear to be a host on other 
# interfaces. But that's exactly the mental model of a ADSL router. 

# Controls IP packet forwarding
net.ipv6.conf.all.forwarding = 2
net.ipv6.conf.default.forwarding = 2

# Accept Router Advertisments
net.ipv6.conf.all.accept_ra = 2
net.ipv6.conf.default.accept_ra = 2

# We are a router so disable temporary addresses
net.ipv6.conf.all.use_tempaddr = 0
net.ipv6.conf.default.use_tempaddr = 0

/etc/network/interfaces

为每个 VLAN 添加一个 IPv6 接口。请注意,我们不需要为 VLAN2 添加一个,因为 dhcpcd 将使用我们 ISP 的路由器通告来处理它。另请注意,.(点表示法)表示 VLAN 接口,而 :(冒号表示法)在之前的文章中用于表示接口上别名的 IP 地址。

我们在这里需要 VLAN 的原因是每个 VLAN 都有自己的广播域,我们不希望我们的路由器通告将路由和地址放在所有接口上。它还有助于我们实现更安全的设计,但这需要一个可管理交换机。

# VLAN 2 - DESTINED FOR ISP
auto eth0.2
iface eth0.2 inet static
    address 192.168.2.1
    netmask 255.255.255.0
    broadcast 192.168.2.255
    post-up /etc/network/fwmark_rules

# VLAN 3 - DESTINED FOR VPN
auto eth0.3
iface eth0.3 inet static
    address 192.168.3.1
    netmask 255.255.255.0
    broadcast 192.168.3.255

iface eth0.3 inet6 static
    address fde4:8dba:82e1:fff3::1
    netmask 64
    autoconf 0
    accept_ra 0
    privext 0

# VLAN 4 - LAN ONLY
auto eth0.4
iface eth0.4 inet static
    address 192.168.4.1
    netmask 255.255.255.0
    broadcast 192.168.4.255
    post-up /etc/network/route_LAN

iface eth0.4 inet6 static
    address fde4:8dba:82e1:fff4::1
    netmask 64
    autoconf 0
    accept_ra 0
    privext 0

配置 PPP

接下来,我们需要配置我们的路由器,使其能够使用调制解调器拨号 PPP 连接。

请参阅 PPP,您需要确保设置您的 WAN 接口,在本例中我们使用了 eth1。

检查系统日志

重启 ppp。

poff yourISP

pon yourISP

在 /var/log/messages 中,您应该看到类似以下内容

pppd[]: Plugin rp-pppoe.so loaded.
pppd[]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.7
pppd[]: pppd 2.4.7 started by root, uid 0
pppd[]: PPP session is 49969
pppd[]: Connected to 00:53:00:ff:ff:f0 via interface eth1
pppd[]: Using interface ppp0
pppd[]: Connect: ppp0 <--> eth1
pppd[]: CHAP authentication succeeded
pppd[]: CHAP authentication succeeded
pppd[]: peer from calling number 00:53:00:FF:FF:F0 authorized
pppd[]: local  LL address fe80::0db8:ffff:ffff:fff1
pppd[]: remote LL address fe80::0db8:ffff:ffff:fff0
pppd[]: local  IP address 192.0.2.1
pppd[]: remote IP address 192.0.2.0
pppd[]: primary   DNS address 192.0.2.10
pppd[]: secondary DNS address 192.0.2.20

您现在应该能够 ping 通类似以下内容

ping6 ipv6.google.com

从您的路由器。

前缀委派

下一步将是配置与您的 ISP 的 DHCPv6 前缀委派。安装 dhcpcd。虽然许多指南都使用 wide-dhcpv6-client 但应该注意的是,它已不再维护,并且未包含在 Alpine Linux 中。

也不要使用 ISC 的 dhclient,因为 它不支持 PPP 链路上的前缀委派,除非打补丁。

apk add dhcpcd

您可以查看 dhcpcd.conf 的手册。安装 dhcpcd-doc 将允许您阅读 man 文件。例如

apk add dhcpcd-doc

/etc/dhcpcd.conf

apk add dhcpcd

如果主存储库中的 dhcpcd 版本低于 7.0.7(在编写本文时,AlpineLinux 3.8 及更低版本),您将需要使用 edge 中的最新版本,因为它修复了我们 VLAN 上唯一链路本地地址的错误 dhcpcd 变更日志[死链接]补丁[死链接] 已在 v7.0.7 中应用

apk add dhcpcd@edge

如果您还没有添加,您可能需要添加 edge 存储库以进行 pinning Alpine Linux 软件包管理#Repository_pinning

# Enable extra debugging
#debug
#logfile /var/log/dhcpcd.log

# Allow users of this group to interact with dhcpcd via the control
# socket.
#controlgroup wheel

# Inform the DHCP server of our hostname for DDNS.
hostname gateway

# Use the hardware address of the interface for the Client ID.
#clientid
# or
# Use the same DUID + IAID as set in DHCPv6 for DHCPv4 ClientID as
# per RFC4361. Some non-RFC compliant DHCP servers do not reply with
# this set. In this case, comment out duid and enable clientid above.
duid

# Persist interface configuration when dhcpcd exits.
persistent

# Rapid commit support.
# Safe to enable by default because it requires the equivalent option
# set on the server to actually work.
option rapid_commit

# A list of options to request from the DHCP server.
option domain_name_servers, domain_name, domain_search, host_name
option classless_static_routes

# Most distributions have NTP support.
option ntp_servers

# Respect the network MTU.
# Some interface drivers reset when changing the MTU so disabled by
# default.
#option interface_mtu

# A ServerID is required by RFC2131.
require dhcp_server_identifier

# Generate Stable Private IPv6 Addresses instead of hardware based
# ones
slaac private

# A hook script is provided to lookup the hostname if not set by the
# DHCP server, but it should not be run by default.
nohook lookup-hostname

# IPv6 Only
ipv6only

# Disable solicitations on all interfaces
noipv6rs

# Wait for IP before forking to background
waitip 6

# Don't touch DNS
nohook resolv.conf

# Use the interface connected to WAN
interface ppp0
    ipv6rs # enable routing solicitation get the default IPv6 route
    iaid 1
    ia_pd 1/::/56 eth0.2/2/64

将 dhcpcd 添加到默认运行级别

rc-update add dhcpcd default

配置 IPv4 和 IPv6 流量的防火墙

iptables

以下是我目前正在使用的一些 iptables 规则,您的规则可能看起来与之类似。

#########################################################################
# Uses 192.168.1.0 VLAN1 Management Untagged - no route
#      192.168.2.0 VLAN2                     - route to ISP
#      192.168.3.0 VLAN3                     - route to VPN
#      192.168.4.0 VLAN4                     - no route
# 
# Packets to/from 192.168.1.0/24 not in any VLAN ie tagged
# Packets to/from 192.168.2.0/24 are marked with 0x1 and routed to ISP
# Packets to/from 192.168.3.0/24 are marked with 0x2 and routed to VPN
# Packets to/from 192.168.4.0/24 are routed to LAN and not forwarded onto
#                                    the internet
#
# These destinations will always be marked with 0x1 from VLAN3:
#
# <ip_of_exception>       some exception
#########################################################################

# 
# Raw Table
#
*raw
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]

# Create a log drop chain
:LOG_DROP_BOGON - [0:0]
:LOG_DROP_MSFT - [0:0]

# Create output chains
:OUT_PPP0 - [0:0]
:OUT_TUN0 - [0:0]

# Allows traffic from VPN's DNS server
-A PREROUTING -s 172.16.32.1/32 -i tun0 -j ACCEPT

# Block specified bogons coming in from ISP and VPN
# (unlikely to happen as they filter them on their router)
-A PREROUTING -i ppp0 -m set --match-set bogon-bn-nonagg src -j LOG_DROP_BOGON
-A PREROUTING -i tun0 -m set --match-set bogon-bn-nonagg src -j LOG_DROP_BOGON

# Block MSFT known tracking IPs from https://github.com/Nummer/Destroy-Windows-10-Spying
-A PREROUTING -i ppp0 -m set --match-set dropped-msft-ip-ipv4  src -j LOG_DROP_MSFT
-A PREROUTING -i tun0 -m set --match-set dropped-msft-ip-ipv4  src -j LOG_DROP_MSFT

# Allows my excepted ranges
-A PREROUTING -m set --match-set allowed-nets-ipv4 src,src -j ACCEPT

# Allows traffic originating from router to remote address on VPN
-A OUT_TUN0 -d 172.16.32.1 -j ACCEPT

# Pass output interface to corresponding chain
-A OUTPUT -o ppp0 -j OUT_PPP0
-A OUTPUT -o tun0 -j OUT_TUN0

# Log drop chain
-A LOG_DROP_BOGON -j LOG --log-prefix "Dropped Bogon (ipv4) : " --log-level 6
-A LOG_DROP_BOGON -j DROP
-A LOG_DROP_MSFT -j LOG --log-prefix "Dropped MSFT (ipv4) : " --log-level 6
-A LOG_DROP_MSFT -j DROP

# Block packets originating from the router destined to bogon ranges
-A OUT_PPP0 -m set --match-set bogon-bn-nonagg dst -j LOG_DROP_BOGON

# Blocks packets originating from the router destined to bogon ranges
-A OUT_TUN0 -m set --match-set bogon-bn-nonagg dst -j LOG_DROP_BOGON

# Block packets originating from the router destined to msft ranges
-A OUT_PPP0 -m set --match-set dropped-msft-ip-ipv4 dst -j LOG_DROP_MSFT

# Blocks packets originating from the router destined to msft ranges
-A OUT_TUN0 -m set --match-set dropped-msft-ip-ipv4 dst -j LOG_DROP_MSFT

COMMIT

#
# NAT Table
# This is where translation of packets happens and "forwarding" of ports
# to specific hosts.
#
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]

# Port forwarding for Bittorrent through VPN
-A PREROUTING -i tun0 -p tcp -m tcp --dport 20001 -j DNAT --to-destination 192.168.3.30
-A PREROUTING -i tun0 -p udp -m udp --dport 20001 -j DNAT --to-destination 192.168.3.30

# Allows routing to our modem subnet so we can access the web interface
-A POSTROUTING -s 192.168.2.0/24 -d 192.168.0.1/32 -o eth1 -p tcp -m tcp --dport 80 -j MASQUERADE
-A POSTROUTING -s 192.168.3.0/24 -d 192.168.0.1/32 -o eth1 -p tcp -m tcp --dport 80 -j MASQUERADE

# Allows routing to Printer
-A POSTROUTING -s 192.168.2.0/24 -d 192.168.4.9/32 -o eth0 -j MASQUERADE
-A POSTROUTING -s 192.168.3.0/24 -d 192.168.4.9/32 -o eth0 -j MASQUERADE

# Allows hosts of the network to use the VPN tunnel
-A POSTROUTING -o tun0 -j MASQUERADE

# Allows hosts of the network to use the PPP tunnel
-A POSTROUTING -o ppp0 -j MASQUERADE
COMMIT

#
# Filter Table
# This is where we decide to ACCEPT, DROP or REJECT things
#
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]

# Create rule chain per input interface for forwarding packets
:FWD_ETH1 - [0:0]
:FWD_PPP0 - [0:0]
:FWD_TUN0 - [0:0]
:FWD_V1_MGMT - [0:0]
:FWD_V2_ISP - [0:0]
:FWD_V3_VPN - [0:0]
:FWD_V4_LANONLY - [0:0]

# Create rule chain per input interface for input packets (for host itself)
:IN_ETH1 - [0:0]
:IN_PPP0 - [0:0]
:IN_TUN0 - [0:0]
:IN_V1_MGMT - [0:0]
:IN_V2_ISP - [0:0]
:IN_V3_VPN - [0:0]
:IN_V4_LANONLY - [0:0]

# Create a drop/reject chains
:LOG_DROP - [0:0]
:LOG_DROP_BOGON - [0:0]
:LOG_DROP_MSFT - [0:0]
:LOG_REJECT_LANONLY - [0:0]

# Create an output chains
:OUT_PPP0 - [0:0]
:OUT_TUN0 - [0:0]

# Pass input packet to corresponding rule chain
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -j IN_V1_MGMT
-A INPUT -i eth0.2 -j IN_V2_ISP
-A INPUT -i eth0.3 -j IN_V3_VPN
-A INPUT -i eth0.4 -j IN_V4_LANONLY
-A INPUT -i eth1 -j IN_ETH1
-A INPUT -i ppp0 -j IN_PPP0
-A INPUT -i tun0 -j IN_TUN0

# Track forwarded packets
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Pass forwarded packet to corresponding rule chain
-A FORWARD -i eth0 -j FWD_V1_MGMT
-A FORWARD -i eth0.2 -j FWD_V2_ISP
-A FORWARD -i eth0.3 -j FWD_V3_VPN
-A FORWARD -i eth0.4 -j FWD_V4_LANONLY
-A FORWARD -i eth1 -j FWD_ETH1
-A FORWARD -i ppp0 -j FWD_PPP0
-A FORWARD -i tun0 -j FWD_TUN0
-A OUTPUT -o ppp0 -j OUT_PPP0
-A OUTPUT -o tun0 -j OUT_TUN0

# Forward HTTP packets from network to modem
-A FWD_ETH1 -s 192.168.0.1/32 -d 192.168.2.0/24 -p tcp -m tcp --sport 80 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A FWD_ETH1 -s 192.168.0.1/32 -d 192.168.3.0/24 -p tcp -m tcp --sport 80 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Forward Bittorrent Port
-A FWD_TUN0 -d 192.168.3.30/32 -p tcp -m tcp --dport 20001 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A FWD_TUN0 -d 192.168.3.30/32 -p udp -m udp --dport 20001 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Forward established packets to hosts in VLAN2/3 from Printer
-A FWD_V1_MGMT -s 192.168.4.9/32 -d 192.168.2.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A FWD_V1_MGMT -s 192.168.4.9/32 -d 192.168.3.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Refuse to forward bogons from VLAN1 (Untagged Management)
-A FWD_V1_MGMT -m set --match-set bogon-bn-nonagg dst -j LOG_DROP_BOGON

# Refuse to forward msft from VLAN1 (Untagged Management)
-A FWD_V1_MGMT -m set --match-set dropped-msft-ip-ipv4 dst -j LOG_DROP_MSFT

# Forward traffic from VLAN2 to Modem
-A FWD_V2_ISP -d 192.168.0.1/32 -j ACCEPT

# Forward traffic from VLAN2 to Printer
-A FWD_V2_ISP -d 192.168.4.9/32 -j ACCEPT

# Drop bogons from VLAN2
-A FWD_V2_ISP -m set --match-set bogon-bn-nonagg dst -j LOG_DROP_BOGON

# Drop msft from VLAN2
-A FWD_V2_ISP -m set --match-set dropped-msft-ip-ipv4 dst -j LOG_DROP_MSFT

# Allow rest from VLAN2
-A FWD_V2_ISP -s 192.168.2.0/24 -j ACCEPT

# Forward traffic from VLAN3 to Modem
-A FWD_V3_VPN -d 192.168.0.1/32 -j ACCEPT

# Forward traffic from VLAN3 to Printer
-A FWD_V3_VPN -d 192.168.4.9/32 -j ACCEPT

# Allow rest from VLAN3
-A FWD_V3_VPN -s 192.168.3.0/24 -j ACCEPT

# Drop bogons from VLAN3
-A FWD_V3_VPN -m set --match-set bogon-bn-nonagg dst -j LOG_DROP_BOGON

# Drop msft from VLAN3
-A FWD_V3_VPN -m set --match-set dropped-msft-ip-ipv4 dst -j LOG_DROP_MSFT

# Forward some exception to ppp0 from VLAN3
-A FWD_V3_VPN -s 192.168.3.0/24 -d <ip_of_exception>/32 -o ppp0 -j ACCEPT

# Allow in NTP from Router (this machine)
-A IN_ETH1 -s 192.168.0.1/32 -d 192.168.0.0/30 -p udp -m udp --dport 123 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow in HTTP from Router (this machine)
-A IN_ETH1 -s 192.168.0.1/32 -d 192.168.0.0/30 -p tcp -m tcp --sport 80 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Accept incoming tracked PPP0 connection
-A IN_PPP0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Log dropped packets coming in on PPP0
# -A IN_PPP0 -j LOG --log-prefix "DROP:INPUT (ipv4) " --log-level 6
-A IN_PPP0 -j LOG_DROP

# Accept incoming tracked TUN0 connection
-A IN_TUN0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Log dropped packets coming in on TUN0
# -A IN_TUN0 -j LOG --log-prefix "DROP:INPUT (ipv4) " --log-level 6
-A IN_TUN0 -j LOG_DROP

# Allow in established packets from Printer to hosts in VLAN2/3
-A IN_V1_MGMT -s 192.168.4.9/32 -d 192.168.2.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.4.9/32 -d 192.168.3.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# FreeRadius Clients (access point A & B)
-A IN_V1_MGMT -s 192.168.1.10/32 -p tcp -m tcp --dport 1812 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.10/32 -p udp -m udp --dport 1812 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.11/32 -p tcp -m tcp --dport 1812 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.11/32 -p udp -m udp --dport 1812 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Ubiquiti UAP Device Discovery Broadcast
-A IN_V1_MGMT -s 192.168.1.10/32 -p udp -m udp --dport 10001 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.11/32 -p udp -m udp --dport 10001 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.10/32 -p udp -m udp --dport 3478 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
-A IN_V1_MGMT -s 192.168.1.11/32 -p udp -m udp --dport 3478 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow rest in from VLAN1
-A IN_V1_MGMT -s 192.168.1.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow ssh in from VLAN2
-A IN_V2_ISP -s 192.168.2.0/24 -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow DNS in from VLAN2
-A IN_V2_ISP -s 192.168.2.0/24 -p udp -m udp --dport 53 -m conntrack --ctstate NEW -j ACCEPT

# ALLOW NTP in from VLAN2
-A IN_V2_ISP -s 192.168.2.0/24 -p udp -m udp --dport 123 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow rest from VLAN2
-A IN_V2_ISP -s 192.168.2.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow ssh in from VLAN3
-A IN_V3_VPN -s 192.168.3.0/24 -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow DNS in from VLAN3
-A IN_V3_VPN -s 192.168.3.0/24 -p udp -m udp --dport 53 -m conntrack --ctstate NEW -j ACCEPT

# Allow NTP in from VLAN3
-A IN_V3_VPN -s 192.168.3.0/24 -p udp -m udp --dport 123 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow rest from VLAN3
-A IN_V3_VPN -s 192.168.3.0/24 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow some exception direct from ppp0 to VLAN3
-A IN_V3_VPN -s 192.168.3.0/24 -d <ip_of_exception>/32 -o ppp0 -j ACCEPT

# Log dropped bogons that never got forwarded
-A LOG_DROP_BOGON -j LOG --log-prefix "Dropped Bogon forward (ipv4) " --log-level 6
-A LOG_DROP_BOGON -j DROP

# Log dropped msft tracking that never got forwarded
-A LOG_DROP_MSFT -j LOG --log-prefix "Dropped MSFT forward(ipv4) " --log-level 6
-A LOG_DROP_MSFT -j DROP

# Log rejected packets
-A LOG_REJECT_LANONLY -j LOG --log-prefix "Rejected packet from LAN only" --log-level 6
-A LOG_REJECT_LANONLY -j REJECT --reject-with icmp-port-unreachable
COMMIT

#
# Mangle Table
# This is the place where our markings happen, whether they be 0x1 or 0x2
#
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]

# Restore CONNMARK to the MARK (If one doesn't exist then no mark is set)
-A PREROUTING -j CONNMARK --restore-mark --nfmask 0xffffffff --ctmask 0xffffffff

# If packet MARK is 2, then it means there is already a connection mark and the
# original packet came in on VPN
-A PREROUTING -s 192.168.3.0/24 -m mark --mark 0x2

# Check some exception are 0x1
-A PREROUTING -s 192.168.3.0/24 -d <ip_of_exception>/32 -m mark --mark 0x1

# Mark packets coming from 192.168.3.0/24 are 0x2
-A PREROUTING -s 192.168.3.0/24 -j MARK --set-xmark 0x2/0xffffffff

# If packet MARK is 1, then it means there is already a connection mark and the
# original packet came in on ISP
-A PREROUTING -s 192.168.2.0/24 -m mark --mark 0x1

# Mark packets 192.168.2.0/24 are 0x1
-A PREROUTING -s 192.168.2.0/24 -j MARK --set-xmark 0x1/0xffffffff

# Mark some exception as 0x1
-A PREROUTING -s 192.168.3.0/24 -d <ip_of_exception>/32 -j MARK --set-xmark 0x1/0xffffffff

# Strip mark if packet is destined for modem
-A PREROUTING -d 192.168.0.1/32 -j MARK --set-xmark 0x0/0xffffffff

# Strip mark if packet is destined for printer
-A PREROUTING -d 192.168.4.9/32 -j MARK --set-xmark 0x0/0xffffffff

# Save MARK to CONNMARK (remember iproute can't see CONNMARKs)
-A PREROUTING -j CONNMARK --save-mark --nfmask 0xffffffff --ctmask 0xffffffff
COMMIT

ip6tables

您需要在其中一条规则中修改您的前缀。

#########################################################################
# Uses 2001:0db8:1234:ffff::1/64 VLAN2 - route to ISP
#      fde4:8dba:82e1:fff3::1/64  VLAN3 - route to VPN
#########################################################################

#
# Raw Table
#
*raw
:PREROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]

# Create a log drop chain
:LOG_DROP_BOGON - [0:0]

# Create output chains
:OUT_PPP0 - [0:0]
:OUT_TUN0 - [0:0]

# Allows my excepted ranges
-A PREROUTING -m set --match-set allowed-nets-ipv6 src,src -j ACCEPT

# Pass output interface to corresponding chain
-A OUTPUT -o ppp0 -j OUT_PPP0
-A OUTPUT -o tun0 -j OUT_TUN0
COMMIT

#
# NAT Table
# This is where translation of packets happens and "forwarding" of ports
# to specific hosts.
#
*nat
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]

# Allows hosts of the network to use the VPN tunnel for IPv6
-A POSTROUTING -o tun0 -j MASQUERADE

COMMIT

#
# Mangle Table
#
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]

# Drop unusually large ping packets
-A PREROUTING -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m length --length 170:65535 -j DROP
COMMIT

#
# Filter Table
# This is where we decide to ACCEPT, DROP or REJECT things
#
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]

# Create rule chain per input interface for forwarding packets
:FWD_ETH1 - [0:0]
:FWD_PPP0 - [0:0]
:FWD_TUN0 - [0:0]
:FWD_V1_MGMT - [0:0]
:FWD_V2_ISP - [0:0]
:FWD_V3_VPN - [0:0]
:FWD_V4_LANONLY - [0:0]

# Create rule chain per input interface for input packets (for host itself)
:IN_ETH1 - [0:0]
:IN_PPP0 - [0:0]
:IN_TUN0 - [0:0]
:IN_V1_MGMT - [0:0]
:IN_V2_ISP - [0:0]
:IN_V3_VPN - [0:0]
:IN_V4_LANONLY - [0:0]

# Create a drop/reject chains
:LOG_DROP - [0:0]
:LOG_DROP_BOGON - [0:0]
:LOG_REJECT_LANONLY - [0:0]

# Create an output chains
:OUT_PPP0 - [0:0]
:OUT_TUN0 - [0:0]

# Pass input packet to corresponding rule chain
-A INPUT -i lo -j ACCEPT
-A INPUT -i eth0 -j IN_V1_MGMT
-A INPUT -i eth0.2 -j IN_V2_ISP
-A INPUT -i eth0.3 -j IN_V3_VPN
-A INPUT -i eth0.4 -j IN_V4_LANONLY
-A INPUT -i eth1 -j IN_ETH1
-A INPUT -i ppp0 -j IN_PPP0
-A INPUT -i tun0 -j IN_TUN0

# Track forwarded packets
-A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Pass forwarded packet to corresponding rule chain
-A FORWARD -i eth0 -j FWD_V1_MGMT
-A FORWARD -i eth0.2 -j FWD_V2_ISP
-A FORWARD -i eth0.3 -j FWD_V3_VPN
-A FORWARD -i eth0.4 -j FWD_V4_LANONLY
-A FORWARD -i eth1 -j FWD_ETH1
-A FORWARD -i ppp0 -j FWD_PPP0
-A FORWARD -i tun0 -j FWD_TUN0

# Rate limit ICMPv6 PING
-A FORWARD -p ipv6-icmp -m icmp6 --icmpv6-type 128 -m limit --limit 30/min -j ACCEPT

# Pass output interface to corresponding chain
-A OUTPUT -o ppp0 -j OUT_PPP0
-A OUTPUT -o tun0 -j OUT_TUN0

# Forward VLAN2 to ISP
-A FWD_V2_ISP -s 2001:0db8:1234:ffff::/64 -j ACCEPT

# Forward VLAN3 to VPN
-A FWD_V3_VPN -o tun0 -j ACCEPT

# Accept incoming tracked PPP0 connection
-A IN_PPP0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Log dropped packets coming in on PPP0
-A IN_PPP0 -j LOG_DROP

# Allow and rate limit ICMP
-A IN_PPP0 -p ipv6-icmp -m icmp6 --icmpv6-type 2 -j ACCEPT
-A IN_PPP0 -p ipv6-icmp -m limit --limit 30/sec -j ACCEPT

# Allow DHCPv6 PD on Link Local from ISP
-A IN_PPP0 -s fe80::/10 -p udp -m udp --sport 547 --dport 546 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Log dropped packets coming in on PPP0
-A IN_PPP0 -j LOG_DROP

# Accept incoming tracked TUN0 connection
-A IN_TUN0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT

# Log dropped packets on VPN
-A IN_TUN0 -j LOG_DROP

# Allow tracked connections in from ppp0 to VLAN2
-A IN_V2_ISP -s 2001:0db8:1234:ffff::/64 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow ICMP in from VLAN2
-A IN_V2_ISP -p ipv6-icmp -j ACCEPT

# Allow tracked connections in from tun0 to VLAN3
-A IN_V3_VPN -s fde4:8dba:82e1:fff3::/64 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT

# Allow ICMP in from VLAN3
-A IN_V3_VPN -p ipv6-icmp -j ACCEPT
COMMIT

将 ip6tables 添加到默认运行级别

rc-update add ip6tables default


nftables

可选地,人们可能会决定使用 nftables 而不是旧的传统 iptables。 nftables 有一些改进,例如更简洁的规则语法、ipv4 和 ipv6 都在一个表中,并且能够使用 变量集合字典映射。这也意味着您不再需要担心使用 ipset

#!/usr/sbin/nft -f

flush ruleset

###################################################################################
#
#| Address                            | Route To        | Interface | VLAN | Mark |
#|------------------------------------|-----------------|-----------|------|------|
#| 192.168.0.0/24                     | Modem           | eth1      | 1    |      |
#| 192.168.1.0/24                     | Nowhere         | eth0      | 1    |      |
#| 192.168.2.0/24                     | ISP             | eth0.2    | 2    | 0x1  |
#| 2001:0db8:1234:ffff::/64           | ISP             | eth0.2    | 2    | 0x1  |
#| 192.168.3.0/24                     | VPN             | eth0.3    | 3    | 0x2  |
#| fde4:8dba:82e1:fff3::/64           | VPN             | eth0.3    | 3    | 0x2  |
#| 192.168.4.0/24                     | Nowhere         | eth0.4    | 4    |      |
#| <ip_of_exception>                  | Exception (ISP) | eth0.2    | 4    | 0x1  |
#
###################################################################################

define net_v0_ip4 = 192.168.0.0/24
define net_v1_ip4 = 192.168.1.0/24
define net_v2_ip4 = 192.168.2.0/24
define net_v3_ip4 = 192.168.3.0/24
define network_v4_ip4 = 192.168.4.0/24
define mailserver = <ip_of_exception>
define modem = 192.168.0.2
define router = 192.168.1.1
define printer = 192.168.4.9
define workstation = 192.168.3.30
define wifi_aps = { 192.168.1.10, 192.168.1.11 }
define net_ula_v1_ip6 = fde4:8dba:82e1:fff1::/64
define net_gua_v2_ip6 = 2001:0db8:1234:ffff::/64
define net_ula_v3_ip6 = fde4:8dba:82e1:fff3::/64
define net_ula_v4_ip6 = fde4:8dba:82e1:fff4::/64
define vpn_gateway = 172.16.32.1

#
# Mangle Table (IPv4)
# Markings happen: whether they be 0x1 or 0x2
#
table ip mangle {
	chain PREROUTING {
		type filter hook prerouting priority mangle; policy accept;

		# Restore CONNMARK to the MARK (If one doesn't exist then no mark is set)
		mark set ct mark

		# If packet MARK is 2, then it means there is already a
		# connection mark and theoriginal packet came in on VPN
		ip saddr $net_v3_ip4 mark 0x00000002

		# Check mail server are 0x1
		ip saddr $net_v3_ip4 ip daddr $mailserver mark 0x00000001

		# Mark packets coming from VLAN3 as 0x2
		ip saddr $net_v3_ip4 mark set 0x00000002

		# If packet MARK is 1, then it means there is already a
		# connection mark and the original packet came in on ISP
		ip saddr $net_v2_ip4 mark 0x00000001

		# Mark packets coming from VLAN2 as 0x1
		ip saddr $net_v2_ip4 mark set 0x00000001

		# Mark mail server as 0x1
		ip saddr $net_v3_ip4 ip daddr $mailserver mark set 0x00000001

		# Strip mark if packet is destined for modem
		ip daddr $modem mark set 0x00000000

		# Strip mark if packet is destined for printer
		ip daddr $printer mark set 0x00000000

		# Save MARK to CONNMARK (remember iproute can't see CONNMARKs)
		ct mark set mark
	}
}

#
# Filter Table (IPv4)
# Filtering things coming IN and OUT of the router
#
table ip filter {
	# Create rule chain per input interface for input packets (for host itself)
	chain INPUT {
		type filter hook input priority filter; policy drop;
		iifname "lo" accept
		iifname "eth0" jump IN_V1_MGMT
		iifname "eth0.2" jump IN_V2_ISP
		iifname "eth0.3" jump IN_V3_VPN
		iifname "eth1" jump IN_ETH1
		iifname "tun0" jump IN_TUN0
	}

	# Create rule chain per input interface for forwarding packets
	chain FORWARD {
		type filter hook forward priority filter; policy drop;
		ct state established,related accept
		iifname "eth0" jump FWD_V1_MGMT
		iifname "eth0.2" jump FWD_V2_ISP
		iifname "eth0.3" jump FWD_V3_VPN
		iifname "eth1" jump FWD_ETH1
		iifname "tun0" jump FWD_TUN0
	}

	chain FWD_ETH1 {
		ip saddr $modem ip daddr $net_v2_ip4 tcp sport http ct state established,new accept
		ip saddr $modem ip daddr $net_v3_ip4 tcp sport http ct state established,new accept
	}

	chain FWD_TUN0 {
		# Forward bittorrent
		ip daddr $workstation tcp dport 20001 ct state established,new accept
		ip daddr $workstation udp dport 20001 ct state established,new accept
	}

	chain FWD_V1_MGMT {
		# Forward established packets to hosts in VLAN2/3 from printer
		ip saddr $printer ip daddr $net_v2_ip4 ct state established,new accept
		ip saddr $printer ip daddr $net_v3_ip4 ct state established,new accept

		# Forward established packets to hosts in VLAN2/3 from modem
		ip saddr $modem ip daddr $net_v3_ip4 tcp sport http ct state established,new accept
	}

	chain FWD_V2_ISP {
		# Forward traffic from VLAN2 to Modem
		ip daddr $modem tcp dport http accept

		# Forward traffic from VLAN2 to printer
		ip daddr $printer accept

		# Allow rest from VLAN2
		ip saddr $net_v2_ip4 accept
	}

	chain FWD_V3_VPN {
		# Forward traffic from VLAN3 to Modem
		ip daddr $modem tcp dport http accept

		# Forward traffic from VLAN3 to printer
		ip daddr $printer accept

		# Allow rest from VLAN3
		ip saddr $net_v3_ip4 accept

		# Allow mailserver direct from VLAN3 out
		oifname "eth1" ip saddr $net_v3_ip4 ip daddr $mailserver accept
	}

	chain IN_ETH1 {
		# Accept incoming tracked connection from eth1
		ip saddr $router ip daddr $modem tcp sport http ct state established,new accept

		# Allow incoming NTP in from VLAN1
		ip saddr $net_v0_ip4 udp dport ntp ct state established,new accept

		# Log dropped packets coming in on eth1
		ct state established,related accept
		jump LOG_DROP
	}

	chain IN_TUN0 {
		# Log dropped packets coming in on tun0
		ct state established,related accept
		jump LOG_DROP
	}

	chain IN_V1_MGMT {
		# Allow in established packets from printer to VLAN2 and VLAN3
		ip saddr $printer ip daddr $net_v2_ip4 ct state established,new accept
		ip saddr $printer ip daddr $net_v3_ip4 ct state established,new accept

		# Allow NTP in from VLAN1
		ip saddr $net_v1_ip4 udp dport ntp ct state established,new accept

		# FreeRadius Clients
		ip saddr $wifi_aps tcp dport radius ct state established,new accept
		ip saddr $wifi_aps udp dport radius ct state established,new accept

		# Ubiquiti UAP Device Discovery Broadcast
		ip saddr $wifi_aps udp dport 10001 ct state established,new accept
		ip saddr $wifi_aps udp dport 3478 ct state established,new accept

		# Allow rest in from VLAN1
		ip saddr $net_v1_ip4 ct state established,new accept
	}

	chain IN_V2_ISP {
		# Allow ssh in from VLAN2
		ip saddr $net_v2_ip4 tcp dport ssh ct state established,new accept

		# Allow DNS in from VLAN2
		ip saddr $net_v2_ip4 udp dport domain ct state new accept

		# Allow NTP in from VLAN2
		ip saddr $net_v2_ip4 udp dport ntp ct state established,new accept

		# Allow rest from VLAN2
		ip saddr $net_v2_ip4 ct state established,new accept
	}

	chain IN_V3_VPN {
		# Allow ssh in from VLAN3
		ip saddr $net_v3_ip4 tcp dport ssh ct state established,new accept

		# Allow DNS in from VLAN3
		ip saddr $net_v3_ip4 udp dport domain ct state new accept

		# Allow NTP in from VLAN3
		ip saddr $net_v3_ip4 udp dport ntp ct state established,new accept

		# Allow rest from VLAN3
		ip saddr $net_v3_ip4 ct state established,new accept

		# Allow mailserver direct from eth1 from VLAN3
		oifname "eth1" ip saddr $net_v3_ip4 ip daddr $mailserver accept
	}

	chain LOG_DROP {
		log prefix "Dropped v4: " drop
	}
}

#
# NAT Table (IPv4)
# Translation of packets happens to our single external address
# Forwarding of ports through our public interfaces
#
table ip nat {
	chain PREROUTING {
		type nat hook prerouting priority dstnat; policy accept;
		# Port forwarding for Bittorrent on workstation through VPN
		iifname "tun0" tcp dport 20001 dnat to $workstation
		iifname "tun0" udp dport 20001 dnat to $workstation
	}

	chain POSTROUTING {
		type nat hook postrouting priority srcnat; policy accept;

		# Allows routing to our modem subnet so we can access the web interface
		oifname "eth0" ip saddr $net_v2_ip4 ip daddr $modem tcp dport http masquerade
		oifname "eth0" ip saddr $net_v3_ip4 ip daddr $modem tcp dport http masquerade

		# Allows routing to printer
		oifname "eth0" ip saddr $net_v2_ip4 ip daddr $printer masquerade
		oifname "eth0" ip saddr $net_v3_ip4 ip daddr $printer masquerade

		# Masquerade behind NAT
		oifname "tun0" masquerade
		oifname "eth1" masquerade
	}
}

#
# Filter Table (IPv6)
# Filtering things coming IN and OUT of the router
#
table ip6 filter {
	chain INPUT {
		# Create rule chain per input interface for input packets (for host itself)
		type filter hook input priority filter; policy drop;
		iifname "lo" accept
		iifname "eth0.2" jump IN_V2_ISP
		iifname "eth0.3" jump IN_V3_VPN
		iifname "eth1" jump IN_ETH1
		iifname "tun0" jump IN_TUN0
	}

	chain FORWARD {
		# Track forwarded packets
		type filter hook forward priority filter; policy drop;
		ct state established,related accept

		# Create rule chain per input interface for forwarding packets
		iifname "eth0.2" jump FWD_V2_ISP
		iifname "eth0.3" jump FWD_V3_VPN
		# iifname "tun0" jump FWD_TUN0

		# Rate limit ICMPv6 PING
		icmpv6 type echo-request limit rate 30/minute accept
	}

	chain OUTPUT {
		type filter hook output priority filter; policy accept;
	}

	# chain FWD_TUN0 {
	# We could forward ports IPv6 ports through the VPN here
	# }

	chain FWD_V2_ISP {
		# Forward VLAN2 to ISP
		ip6 saddr $net_gua_v2_ip6 accept
	}

	chain FWD_V3_VPN {
		# Forward VLAN3 to VPN
		ip6 saddr $net_ula_v3_ip6 accept
	}

	chain IN_ETH1 {
		# Accept incoming tracked ETH1 connection
		ct state established,related accept

		# Allow and rate limit ICMP
		icmpv6 type packet-too-big accept
		meta l4proto ipv6-icmp limit rate 30/second accept

		# Allow DHCPv6 PD on Link Local from ISP
		ip6 saddr fe80::/10 udp sport dhcpv6-server udp dport dhcpv6-client ct state established,new accept

		# Allow Router advetisements/solict form ISP
		ip6 saddr fe80::/10 icmpv6 type nd-router-advert accept
		ip6 saddr fe80::/10 icmpv6 type nd-neighbor-solicit accept
		ip6 saddr fe80::/10 icmpv6 type nd-neighbor-advert accept

		# Log dropped packets coming in on ETH1
		jump LOG_DROP
	}

	chain IN_TUN0 {
		# Accept incoming tracked TUN0 connection
		ct state established,related accept

		# Allow and rate limit ICMP
		icmpv6 type packet-too-big accept
		meta l4proto ipv6-icmp limit rate 30/second accept

		# Log dropped packets on VPN
		jump LOG_DROP
	}

	chain IN_V2_ISP {
		# Allow tracked connections in from ETH1 to VLAN2
		ip6 saddr $net_gua_v2_ip6 ct state established,new accept

		# Allow ICMP in from VLAN2
		meta l4proto ipv6-icmp accept
	}

	chain IN_V3_VPN {
		# Allow tracked connections in from tun0 to VLAN3
		ip6 saddr $net_ula_v3_ip6 ct state established,new accept

		# Allow ICMP in from VLAN3
		meta l4proto ipv6-icmp accept
	}

	chain LOG_DROP {
		log prefix "Dropped v6: " drop
	}
}

#
# Mangle Table (IPv6)
#
table ip6 mangle {
	chain PREROUTING {
		type filter hook prerouting priority mangle; policy accept;

		# Drop unusually large ping packets
		icmpv6 type echo-request meta length 170-65535 drop
	}
}

#
# NAT Table (IPv6)
# Translation of packets happens to our single external address
# only used for the VPN as our ISP give us a /56 range to split up
#
table ip6 nat {
	chain POSTROUTING {
		type nat hook postrouting priority srcnat; policy accept;
		oifname "tun0" masquerade
	}
}

#
# Raw Table - IPv4/IPv6
#
table inet raw {
 	set bogon-bn-nonagg-set {
		type ipv4_addr
		flags interval
		elements = { 0.0.0.0/8, 10.0.0.0/8,
			     100.64.0.0/10, 127.0.0.0/8,
			     169.254.0.0/16, 172.16.0.0/12,
			     192.0.0.0/24, 192.0.2.0/24,
			     192.168.0.0/16, 198.18.0.0/15,
			     198.51.100.0/24, 203.0.113.0/24,
			     224.0.0.0/4, 240.0.0.0-255.255.255.255 }
	}

	set lo-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 127.0.0.0/8 }
	}

	set eth0-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { $net_v1_ip4 }
	}

	set eth0.2-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 192.168.2.0/24, 192.168.3.0/24,
			     192.168.4.0/24 }
	}

	set eth0.3-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 192.168.2.0/24, 192.168.3.0/24,
			     192.168.4.0/24 }
	}

	set eth0.4-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 192.168.2.0/24, 192.168.3.0/24,
			     192.168.4.0/24 }
	}

	set eth1-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 192.168.0.0/30, 255.255.255.255 }
	}

	set tun0-allowed-net-ip4-set {
		type ipv4_addr
		flags interval
		elements = { 172.16.32.0/20, 172.16.48.0/20 }
	}

	set lo-allowed-net-ip6-set {
		type ipv6_addr
		flags interval
		elements = { ::1/128 }
	}

	set eth0-allowed-net-ip6-set {
		type ipv6_addr
		flags interval
		elements = { fde4:8dba:82e1:fff1::/64,
			     fe80::/10 }
	}

	set eth0.2-allowed-net-ip6-set {
		type ipv6_addr
		flags interval
		elements = { 2001:0db8:1234:ffff::/64,
			     fe80::/10 }
	}

	set eth0.3-allowed-net-ip6-set {
		type ipv6_addr
		flags interval
		elements = { fde4:8dba:82e1:fff3::/64,
			     fe80::/10 }
	}

	set eth0.4-allowed-net-ip6-set {
		type ipv6_addr
		flags interval
		elements = { fde4:8dba:82e1:fff4::/64,
			     fe80::/10 }
	}

	chain PREROUTING {
		type filter hook prerouting priority raw; policy accept;

		# Allows traffic from NNTP/DNS vpn gateway
		iifname "tun0" ip saddr $vpn_gateway accept;

		# Allows traffic originating from router to vpn gateway
		ip daddr $vpn_gateway accept

		# Allows traffic originating from router to modem
		ip daddr $modem accept

		# Block specified bogons coming in from ISP and VPN
		# (unlikely to happen as they filter them on their router)
		#iifname "eth1" ip saddr @bogon-bn-nonagg-set jump LOG_DROP_BOGON_PR;
		#iifname "tun0" ip saddr @bogon-bn-nonagg-set jump LOG_DROP_BOGON_PR;
	}

	chain OUTPUT {
		type filter hook output priority raw; policy accept;

		# Allows my excepted ranges
		iifname vmap { lo : jump lo-allowed-net, eth0 : jump eth0-allowed-net,
		    eth0.2 : jump eth0.2-allowed-net, eth0.3 : jump eth0.3-allowed-net,
		    eth0.4 : jump eth0.4-allowed-net, eth1 : jump eth1-allowed-net,
		    tun0 : jump tun0-allowed-net };

		oifname vmap { lo : jump lo-allowed-net, eth0 : jump eth0-allowed-net,
		    eth0.2 : jump eth0.2-allowed-net, eth0.3 : jump eth0.3-allowed-net,
		    eth0.4 : jump eth0.4-allowed-net, eth1 : jump eth1-allowed-net,
		    tun0 : jump tun0-allowed-net };


		# Drop any remaining bogons that try to leave the router
		oifname "eth1" ip daddr @bogon-bn-nonagg-set jump LOG_DROP_BOGON_IN;
		oifname "tun0" ip daddr @bogon-bn-nonagg-set jump LOG_DROP_BOGON_IN;
	}

	chain lo-allowed-net {
		ip saddr @lo-allowed-net-ip4-set accept
		ip6 saddr @lo-allowed-net-ip6-set accept
	}

	chain eth0-allowed-net {
		ip saddr @eth0-allowed-net-ip4-set accept
		ip6 saddr @eth0-allowed-net-ip6-set accept
		#log prefix "Allowed packet allow net 0: " level info
	}

	chain eth0.2-allowed-net {
		ip saddr @eth0.2-allowed-net-ip4-set accept
		ip6 saddr @eth0.2-allowed-net-ip6-set accept
		#log prefix "Allowed packet allow net 2: " level info
	}

	chain eth0.3-allowed-net {
		ip saddr @eth0.3-allowed-net-ip4-set accept
		ip6 saddr @eth0.3-allowed-net-ip6-set accept
		#log prefix "Allowed packet allow net 3: " level info
	}

	chain eth0.4-allowed-net {
		ip saddr @eth0.4-allowed-net-ip4-set accept
		ip6 saddr @eth0.4-allowed-net-ip6-set accept
		#log prefix "Allowed packet allow net 4: " level info
	}

	chain eth1-allowed-net {
		ip saddr @eth1-allowed-net-ip4-set accept
		#log prefix "Allowed packet allow eth1: " level info
	}

    chain tun0-allowed-net {
		ip saddr @tun0-allowed-net-ip4-set accept
		#log prefix "Allowed packet allow tun0: " level info
	}

	chain LOG_DROP_BOGON_IN {
		log prefix "Dropped Bogon outgoing " drop
	}
	chain LOG_DROP_BOGON_OUT {
		log prefix "Dropped Bogon incoming " drop
	}
	chain LOG_DROP_BOGON_PR {
		log prefix "Dropped Bogon prerouting " drop
	}
}

将 nftables 添加到默认运行级别

rc-update add nftables default

路由器通告

现在我们需要配置 radvd,以便为我们的 VLAN 提供路由器通告,用于寻址和路由。

apk add radvd

安装 radvd 后,您可以对其进行配置

/etc/radvd.conf

interface eth0.2 {

  # We are sending advertisements (route)
  AdvSendAdvert on;

  # When set, host use the administered (stateful) protocol
  # for address autoconfiguration. The use of this flag is
  # described in RFC 4862
  AdvManagedFlag on;

  # When set, host use the administered (stateful) protocol
  # for address autoconfiguration. For other (non-address)
  # information.
  # The use of this flag is described in RFC 4862
  AdvOtherConfigFlag on;

  # Suggested Maximum Transmission setting for using the
  # Hurricane Electric Tunnel Broker.
  # AdvLinkMTU 1480;

  # We have native Dual Stack IPv6 so we can use the regular MTU
  # https://blogs.cisco.com/enterprise/ipv6-mtu-gotchas-and-other-icmp-issues
  AdvLinkMTU 1500;
  
  prefix ::/64 {
    AdvOnLink on;
    AdvAutonomous on; ## SLAAC based on EUI
    AdvRouterAddr on;
  };
};

interface eth0.3 {

  AdvSendAdvert on;
  AdvManagedFlag on;
  AdvOtherConfigFlag on;
  AdvLinkMTU 1500;

  # Helps the route not get lost when on WiFi with packet loss
  MaxRtrAdvInterval 30;
  AdvDefaultLifetime 9000;

  prefix fde4:8dba:82e1:fff3::/64 {
    AdvOnLink on;
    AdvAutonomous on; ## SLAAC based on EUI
  };
};

将 radvd 添加到默认运行级别

rc-update add radvd default

DHCP

您可能决定想要更多地控制您的网络地址分配。我喜欢让某些主机在连接到特定 VLAN(注意 v2 和 v3)时获得特定的地址。您可以使用以下方法执行此操作

authoritative;
ddns-update-style interim;

subnet 192.168.1.0 netmask 255.255.255.0 {
    range 192.168.1.21 192.168.1.240;
    option subnet-mask 255.255.255.0;
    option broadcast-address 192.168.1.255;
    option routers 192.168.1.1;
    option ntp-servers 192.168.1.1;
    option domain-name-servers 192.168.1.1;
    allow unknown-clients;

        host wifi_ap {
            hardware ethernet <mac_addess>;
            fixed-address 192.168.1.11;
            option subnet-mask 255.255.255.0;
            option routers 192.168.1.1;
            option host-name "<hostname>";
        }
}

subnet 192.168.2.0 netmask 255.255.255.0 {
    range 192.168.2.40 192.168.2.240;
    option subnet-mask 255.255.255.0;
    option broadcast-address 192.168.2.255;
    option routers 192.168.2.1;
    option ntp-servers 192.168.2.1;
    option domain-name-servers 192.168.2.1;
    allow unknown-clients;

        host host-v2 {
            hardware ethernet <mac_address>;
            fixed-address 192.168.2.30;
            option subnet-mask 255.255.255.0;
            option broadcast-address 192.168.2.255;
            option routers 192.168.2.1;
            option host-name "<hostname>";
        }
}

subnet 192.168.3.0 netmask 255.255.255.0 {
    range 192.168.3.20 192.168.3.240;
    option subnet-mask 255.255.255.0;
    option broadcast-address 192.168.3.255;
    option routers 192.168.3.1;
    option ntp-servers 192.168.3.1;
    option domain-name-servers 192.168.3.1;
    ignore unknown-clients;

        host host-v3 {
            hardware ethernet <mac_address>;
            fixed-address 192.168.3.30;
            option subnet-mask 255.255.255.0;
            option broadcast-address 192.168.3.255;
            option routers 192.168.3.1;
            option host-name "<hostname>";
        }
}

subnet 192.168.4.0 netmask 255.255.255.0 {
    range 192.168.4.40 192.168.4.240;
    option subnet-mask 255.255.255.0;
    option broadcast-address 192.168.4.255;
    option routers 192.168.4.1;
    option ntp-servers 192.168.4.1;
    option domain-name-servers 192.168.4.1;

    host printer {
            hardware ethernet <PRINTER_MAC_ADDRESS>;
            fixed-address 192.168.4.9;
            option subnet-mask 255.255.255.0;
            option broadcast-address 192.168.4.255;
            option routers 192.168.4.1;
            option host-name "My_Printer";
        }   ignore unknown-clients;
}

对于 IPv6,我不使用 DHCPv6,因为 Android 不支持它。我只是让 SLAAC 分配地址。

VPN 隧道 VLAN3

安装必要的软件包

apk add openvpn iproute2 iputils

/etc/modules

您需要添加 tun 模块

tun

/etc/iproute2/rt_tables

将两个路由表添加到 rt_tables 的底部。它应该看起来像这样

#
# reserved values
#
255	local
254	main
253	default
0	unspec
#
# local
#
#1	inr.ruhep
1 ISP
2 VPN
3 LAN

/etc/network/fwmark_rules

在此文件中,我们要放置 fwmark 规则并设置正确的优先级。

#!/bin/sh

# Normal packets to go direct out WAN
/sbin/ip rule add fwmark 1 table ISP prio 100
/sbin/ip -6 rule add fwmark 1 table ISP prio 100

# Put packets destined into VPN when VPN is up
/sbin/ip rule add fwmark 2 table VPN prio 200
/sbin/ip -6 rule add fwmark 2 table VPN prio 200

# Prevent packets from being routed out when VPN is down.
# This prevents packets from falling back to the main table
# that has a priority of 32766
/sbin/ip rule add prohibit fwmark 2 prio 300
/sbin/ip -6 rule add prohibit fwmark 2 prio 300

/etc/network/route_LAN

#!/bin/sh
#
# This script adds the LAN routes.
#

# Add routes from ISP to LAN
/sbin/ip route add 192.168.2.0/24 dev eth0.2 table LAN

# Add route from VPN to LAN
/sbin/ip route add 192.168.3.0/24 dev eth0.3 table LAN

# Add route from LAN to it's own table
/sbin/ip route add 192.168.4.0/24 dev eth0.4 table LAN

/etc/ppp/ip-up

接下来,我们要创建在 PPP 上线时应运行的路由。在 ip-up 和 ip-down 中,我们可以使用特殊的 hooks 来引用 IP 地址,ppp man 文件 - Scripts 如果您安装了 ppp-doc,您也可以在您的 man 文件中阅读有关它们的信息。

#!/bin/sh
#
# This script is run by pppd when there's a successful ppp connection.
#

# Flush out any old rules that might be there
/sbin/ip route flush table ISP

# Add route to table from subnets on LAN
/sbin/ip route add 192.168.2.0/24 dev eth0.2 table ISP
/sbin/ip route add 192.168.3.0/24 dev eth0.3 table ISP

# Add route from IP given by ISP to the table
/sbin/ip rule add from ${IPREMOTE} table ISP prio 100

# Add a default route
/sbin/ip route add table ISP default via ${IPREMOTE} dev ${IFNAME}

# Add route to LAN subnet
/sbin/ip route add 192.168.4.0/24 dev eth0.4 table ISP

/etc/ppp/ip-down

#!/bin/sh
#
# This script is run by pppd after the connection has ended.
#

# Delete the rules when we take the interface down
/sbin/ip rule del from ${IPREMOTE} table ISP prio 100

/etc/openvpn/route-up-fwmark.sh

OpenVPN 需要类似的路由脚本,并且它也有自己的特殊 hooks,允许您指定特定的值。完整列表在此处 OpenVPN man 文件 - Environmental Variables

#!/bin/sh
#
# This script is run by OpenVPN when there's a successful VPN connection.
#

# Flush out any old rules that might be there
/sbin/ip route flush table VPN

# Add route to table from 192.168.3.0/24 subnet on LAN
/sbin/ip route add 192.168.3.0/24 dev eth0.3 table VPN
/sbin/ip -6 route add fde4:8dba:82e1:fff3::/64 dev eth0.3 table VPN

# Add route from VPN interface IP to the VPN table
/sbin/ip rule add from ${ifconfig_local} table VPN prio 200
/sbin/ip -6 rule add from fde4:8dba:82e1:fff3::/64 table VPN prio 200

# Add a default route
/sbin/ip route add default via ${ifconfig_local} dev ${dev} table VPN
/sbin/ip -6 route add default dev tun0 table VPN 

# Add route to LAN only subnet
/sbin/ip route add 192.168.4.0/24 dev eth0.4 table VPN

# Add route to IP on VPN for traffic originating from the router
/sbin/ip route add 172.16.32.1 dev tun0

/etc/openvpn/route-down-fwmark.sh

#!/bin/sh
#
# This script is run by OpenVPN after the connection has ended
#

# Delete the rules when we take the interface down
/sbin/ip rule del from ${ifconfig_local} table VPN prio 200
/sbin/ip -6 rule del from fde4:8dba:82e1:fff3::/64 table VPN prio 200

# Delete route to IP on VPN for traffic originating from the router
/sbin/ip route del 172.16.32.1 dev tun0

OpenVPN 路由

通常,当您使用 OpenVPN 连接时,远程 VPN 服务器会将路由下推到您的系统。我们不希望这样做,因为我们仍然希望能够在不使用 VPN 的情况下访问互联网。我们还在本指南前面创建了我们想要使用的自己的路由。

您需要将其添加到您的 OpenVPN 配置文件底部

# Prevents default gateway from being set on the default routing table
route-noexec

# Allows route-up script to be executed
script-security 2

# Calls custom shell script after connection to add necessary routes
route-up /etc/openvpn/route-up-fwmark.sh
route-pre-down /etc/openvpn/route-pre-down-fwmark.sh

我的 VPN 在 /etc/openvpn 中像这样排列

该服务器的 OpenVPN 配置文件

countrycode.serverNumber.openvpn.conf

该服务器的 OpenVPN 证书

countrycode.serverNumber.openvpn/countrycode.serverNumber.openvpn.crt
countrycode.serverNumber.openvpn/countrycode.serverNumber.openvpn.key
countrycode.serverNumber.openvpn/myKey.crt
countrycode.serverNumber.openvpn/myKey.key

所以我使用这个有用的脚本来自动化在服务器之间切换的过程

#!/bin/sh

vpn_server_filename=$1

rm /etc/openvpn/openvpn.conf
ln -s $vpn_server_filename /etc/openvpn/openvpn.conf
chown -R openvpn:openvpn /etc/openvpn
chmod -R a=-rwx,u=+rX /etc/openvpn
chmod u=x /etc/openvpn/*.sh*

if grep -Fxq "#CustomStuffHere" openvpn.conf
then
    echo "Not adding custom routes, this server has been used previously"
else
    echo "Adding custom route rules"
cat <<EOF >> /etc/openvpn/openvpn.conf

#CustomStuffHere
# Prevents default gateway from being set on the default routing table
route-noexec

# Allows route-up script to be executed
script-security 2

# Calls custom shell script after connection to add necessary routes
route-up /etc/openvpn/route-up-fwmark.sh
route-pre-down /etc/openvpn/route-pre-down-fwmark.sh

# Logging of OpenVPN to file
#log /etc/openvpn/openvpn.log
EOF

fi
echo "Remember to set BitTorrent port forward in your VPN control panel"

这样,我只需运行以下命令即可在服务器之间切换

changevpn.sh countrycode.serverNumber.openvpn

然后重启 openvpn。我还被提醒在 VPN 控制面板上设置端口转发,以便我的 BitTorrent 客户端可以连接

service openvpn restart

最后,将 openvpn 添加到默认运行级别

rc-update add openvpn default