netfilter-full-cone-nat/README.md

104 lines
3.1 KiB
Markdown
Raw Normal View History

2018-01-20 05:54:57 +00:00
2018-01-21 06:54:03 +00:00
Implementation of RFC3489-compatible full cone SNAT.
2018-01-20 05:54:57 +00:00
2018-01-20 19:20:12 +00:00
Assuming eth0 is external interface:
2018-01-20 12:37:58 +00:00
```
iptables -t nat -A POSTROUTING -o eth0 -j FULLCONENAT #same as MASQUERADE
2018-01-20 19:20:12 +00:00
iptables -t nat -A PREROUTING -i eth0 -j FULLCONENAT #automatically restore NAT for inbound packets
2018-01-20 12:37:58 +00:00
```
2018-01-20 19:20:12 +00:00
Currently only UDP traffic is supported for full-cone NAT. For other protos FULLCONENAT is equivalent to MASQUERADE.
2018-01-20 12:37:58 +00:00
Build
======
Prerequisites:
* kernel source
2018-05-07 19:28:02 +00:00
* iptables source ( git://git.netfilter.org/iptables.git )
2018-01-20 12:37:58 +00:00
Confirm the kernel configuration option `CONFIG_NF_CONNTRACK_EVENTS` is enabled. If this option is disabled on your system, enable it and rebuild your netfilter modules.
2018-06-06 02:29:20 +00:00
Kernel Module
-------------
```
$ make
# insmod xt_FULLCONENAT.ko
```
2018-06-06 02:29:20 +00:00
Iptables Extension
------------------
1. Copy libipt_FULLCONENAT.c to `iptables-source/extensions`.
2. Under the iptables source directory, `./configure`(use `--prefix` to replace your current `iptables` by looking at `which iptables`), `make` and `make install`
OpenWRT
-------
Package for openwrt is available at https://github.com/LGA1150/openwrt-fullconenat
Usage
=====
Assuming eth0 is external interface:
Basic Usage:
```
iptables -t nat -A POSTROUTING -o eth0 -j FULLCONENAT
iptables -t nat -A PREROUTING -i eth0 -j FULLCONENAT
```
Random port range:
```
iptables -t nat -A POSTROUTING -o eth0 ! -p udp -j MASQUERADE
iptables -t nat -A POSTROUTING -o eth0 -p udp -j FULLCONENAT --to-ports 40000-60000 --random-fully
iptables -t nat -A PREROUTING -i eth0 -p udp -m multiport --dports 40000:60000 -j FULLCONENAT
```
Hairpin NAT (Assuming eth1 is LAN interface and IP range for LAN is 192.168.100.0/24):
```
iptables -t nat -A POSTROUTING -o eth0 -j FULLCONENAT
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.100.0/24 -j MASQUERADE
iptables -t nat -A PREROUTING -i eth0 -j FULLCONENAT
iptables -t nat -A PREROUTING -i eth1 -j FULLCONENAT
```
kernel Patch (Optional.)
========================
2018-01-20 12:37:58 +00:00
1. Copy xt_FULLCONENAT.c to `kernel-source/net/netfilter/xt_FULLCONENAT.c`
2. Append following line to `kernel-source/net/netfilter/Makefile`:
```
obj-$(CONFIG_NETFILTER_XT_TARGET_FULLCONENAT) += xt_FULLCONENAT.o
```
2018-02-09 06:09:06 +00:00
3. Insert following section into `kernel-source/net/ipv4/netfilter/Kconfig` right after `config IP_NF_TARGET_NETMAP` section:
2018-01-20 12:37:58 +00:00
```
config IP_NF_TARGET_FULLCONENAT
tristate "FULLCONENAT target support"
depends on NETFILTER_ADVANCED
select NETFILTER_XT_TARGET_FULLCONENAT
---help---
This is a backwards-compat option for the user's convenience
(e.g. when running oldconfig). It selects
CONFIG_NETFILTER_XT_TARGET_FULLCONENAT.
```
2018-02-09 06:09:06 +00:00
4. Insert following section into `kernel-source/net/netfilter/Kconfig` right after `config NETFILTER_XT_TARGET_NETMAP` section:
2018-01-20 12:37:58 +00:00
```
config NETFILTER_XT_TARGET_FULLCONENAT
tristate '"FULLCONENAT" target support'
depends on NF_NAT
---help---
Full Cone NAT
To compile it as a module, choose M here. If unsure, say N.
```
2018-06-06 02:29:20 +00:00
5. Run `make menuconfig` and select:
Networking support -> Network options -> Network packet filtering framework (Netfilter) -> IP: Netfilter Configuration -> \<M\> FULLCONENAT target support