I'd prefer to integrate the Port Control Protocol (PCP) instead.
- Feed Queries
- All Stories
- Search
- Feed Search
- Transactions
- Transaction Logs
May 17 2024
You can still have it in a container easily; as I mentioned, it has never worked since 2021
You do not lose anything.
May 16 2024
PR https://github.com/vyos/vyos-1x/pull/3466
vyos@r4:~$ show nat cgnat allocation Internal IP External IP Port range ------------- --------------- ------------ 100.64.0.0 192.168.122.222 1024-3023 100.64.0.1 192.168.122.222 3024-5023 100.64.0.2 192.168.122.222 5024-7023 100.64.0.3 192.168.122.222 7024-9023 100.64.0.4 192.168.122.222 9024-11023 100.64.0.5 192.168.122.222 11024-13023 100.64.0.6 192.168.122.222 13024-15023 100.64.0.7 192.168.122.222 15024-17023 100.64.0.8 192.168.122.222 17024-19023 100.64.0.9 192.168.122.222 19024-21023 100.64.0.10 192.168.122.222 21024-23023 100.64.0.11 192.168.122.222 23024-25023 100.64.0.12 192.168.122.222 25024-27023 100.64.0.13 192.168.122.222 27024-29023 100.64.0.14 192.168.122.222 29024-31023 100.64.0.15 192.168.122.222 31024-33023 vyos@r4:~$
PR https://github.com/vyos/vyos-1x/pull/3464
set nat cgnat pool external ext1 external-port-range '1024-65535' set nat cgnat pool external ext1 per-user-limit port '2000' set nat cgnat pool external ext1 range 192.168.122.222/32 set nat cgnat pool internal int1 range '100.64.0.0/28' set nat cgnat rule 10 source pool 'fake-pool' set nat cgnat rule 10 translation pool 'ext1'
@molocho see the tasks T5301 T5154 and https://chrony-project.org/doc/4.3/chrony.conf.html#bindaddress
May 15 2024
May 14 2024
In T5835#187933, @simplysoft wrote:I'm not sure if that summary from you @Viacheslav is fully reflecting the current state.
I'm also not sure if the original implementation never worked, might very well have been broken while refactoring some vyos internals how the firewall is structured, but I guess you should have a better understanding of (the history of) your product. Otherwise I would be very surprised if a broken feature got into your product without every working / being tested.
In summary, it works with custom scripts and patches, but it still does not work from CLI (not fully integrated)
The scripts that should be involved are in the repo https://github.com/miniupnp/miniupnp/tree/miniupnpd_2_3_3/miniupnpd/netfilter_nft/scripts
Until we do not have them and they do not communicate with the firewall, the feature does not work.
A patch is attached in several posts above https://vyos.dev/T5835#174066
May 13 2024
The original feature/bug is solved
The stop script executed is executing.
The locks are a separate task/bug.
May 10 2024
Feel free to reopen it and update the task description, but I'm not expecting it to be implemented.
I think the original request was Add ability to resequence rule numbers for firewall, and we added this tool.
Auto-Apply configuration based on this tool is the wrong way. We haven't had such hacks before and probably won't implement them in the nearest feature.
All configuration changes have to be only per user commit; there should not be any auto-commits/auto applies configs. We have API for these tricks.
CLI is completely different from the cisco/arista logic.
May 9 2024
I'm re-opening until we make a final decision
The service webproxy is deprecated and will be removed in 1.5
Removed in https://github.com/vyos/vyos-1x/pull/3435
For 1.4 also fixed
vyos@r1-right:~$ show version all | match "GNU C L" ii libc-bin 2.36-9+deb12u7 amd64 GNU C Library: Binaries ii libc-l10n 2.36-9+deb12u7 all GNU C Library: localization files ii libc6:amd64 2.36-9+deb12u7 amd64 GNU C Library: Shared libraries ii locales 2.36-9+deb12u7 all GNU C Library: National Language (locale) data [support] vyos@r1-right:~$ vyos@r1-right:~$ show ver Version: VyOS 1.4-stable-202405090309 Release train: sagitta
Fixed
vyos@r1-right:~$ show version all | match "GNU C L" ii libc-bin 2.28-10+deb10u3 amd64 GNU C Library: Binaries ii libc-l10n 2.28-10+deb10u3 all GNU C Library: localization files ii libc6:amd64 2.28-10+deb10u3 amd64 GNU C Library: Shared libraries ii locales 2.28-10+deb10u3 all GNU C Library: National Language (locale) data [support] vyos@r1-right:~$ vyos@r1-right:~$ show version
May 8 2024
Should be fixed in https://github.com/vyos/vyos-build/pull/600
Mostly impossible for policy local-route
I'm not expecting that it will be implemented at all.
May 7 2024
The current workaround is manual DNAT rules:
set nat destination rule 100 destination port '80' set nat destination rule 100 protocol 'tcp' set nat destination rule 100 translation redirect port '3128'
Add any rules before 100 for excluding DNAT and use "bypass"
Min config for old implementation with redirect (1.2):
set service webproxy listen-address 192.168.122.12 set service webproxy url-filtering squidguard block-category 'aggressive' set service webproxy url-filtering squidguard local-block 'mytest.local' set service webproxy whitelist destination-address '192.0.2.1' set service webproxy whitelist destination-address '192.0.2.2' set service webproxy whitelist source-address '192.0.2.222' set service webproxy whitelist source-address '192.0.2.223'
