blob: 54bd3ad5ac6d0cdf527b38571fe091814f00dab0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
#!/bin/bash
# From: https://github.com/angristan/wireguard-install
SERVER_WG_NIC="wg0" #Default interface
SERVER_PUB_NIC=$(ip -4 route ls | grep default | grep -Po '(?<=dev )(\S+)' | head -1)
SERVER_PORT=$(grep -Po '(?<=ListenPort = )(\S+)' "/etc/wireguard/"$SERVER_WG_NIC".conf")
if [ "$1" == "up" ]; then
iptables -I INPUT -p udp --dport $SERVER_PORT -j ACCEPT
iptables -I FORWARD -i $SERVER_PUB_NIC -o $SERVER_WG_NIC -j ACCEPT
iptables -I FORWARD -i $SERVER_WG_NIC -j ACCEPT
iptables -t nat -A POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE
ip6tables -I FORWARD -i $SERVER_WG_NIC -j ACCEPT
ip6tables -t nat -A POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE
#Client isolation on
#iptables -I FORWARD -i $SERVER_WG_NIC -o $SERVER_WG_NIC -j REJECT --reject-with icmp-admin-prohibited
#ip6tables -I FORWARD -i $SERVER_WG_NIC -o $SERVER_WG_NIC -j REJECT --reject-with icmp6-adm-prohibited
fi
if [ "$1" == "down" ]; then
iptables -D INPUT -p udp --dport $SERVER_PORT -j ACCEPT
iptables -D FORWARD -i $SERVER_PUB_NIC -o $SERVER_WG_NIC -j ACCEPT
iptables -D FORWARD -i $SERVER_WG_NIC -j ACCEPT
iptables -t nat -D POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE
ip6tables -D FORWARD -i $SERVER_WG_NIC -j ACCEPT
ip6tables -t nat -D POSTROUTING -o $SERVER_PUB_NIC -j MASQUERADE
#Client isolation rules delete
#iptables -D FORWARD -i $SERVER_WG_NIC -o $SERVER_WG_NIC -j REJECT --reject-with icmp-admin-prohibited
#ip6tables -I FORWARD -i $SERVER_WG_NIC -o $SERVER_WG_NIC -j REJECT --reject-with icmp6-adm-prohibited
fi
|