mirror of
https://github.com/C24Be/AS_Network_List.git
synced 2026-04-05 00:58:52 +03:00
readme files
This commit is contained in:
@@ -1,23 +1,23 @@
|
||||
# Autogenerated nftables blacklist
|
||||
# Generated: 2026-03-26T08:47:07.140784Z
|
||||
# Source: /home/runner/work/AS_Network_List/AS_Network_List/blacklists/blacklist-vk-v6.txt
|
||||
# Generated: 2026-03-26T09:30:12.604194Z
|
||||
# Source: /Users/oleg/DocsOS/C24Be/AS_Network_List/blacklists/blacklist-vk-v6.txt
|
||||
# IPv4: 0, IPv6: 1
|
||||
#
|
||||
# Usage:
|
||||
# sudo nft -f <this-file>
|
||||
# # VK egress blocking for VPN clients via NAT/FORWARD
|
||||
# sudo nft add chain inet filter forward '{ type filter hook forward priority 0; policy accept; }'
|
||||
# sudo nft add rule inet filter forward iifname "<VPN_IFACE>" ip daddr @blacklist_v4 counter reject
|
||||
# sudo nft add rule inet filter forward iifname "<VPN_IFACE>" ip6 daddr @blacklist_v6 counter reject
|
||||
# sudo nft add rule inet filter forward iifname "<VPN_IFACE>" ip daddr @blacklist_vk_v4 counter reject
|
||||
# sudo nft add rule inet filter forward iifname "<VPN_IFACE>" ip6 daddr @blacklist_vk_v6 counter reject
|
||||
|
||||
table inet filter {
|
||||
|
||||
set blacklist_v4 {
|
||||
set blacklist_vk_v4 {
|
||||
type ipv4_addr
|
||||
flags interval
|
||||
}
|
||||
|
||||
set blacklist_v6 {
|
||||
set blacklist_vk_v6 {
|
||||
type ipv6_addr
|
||||
flags interval
|
||||
elements = {
|
||||
@@ -31,6 +31,6 @@ table inet filter {
|
||||
|
||||
ct state { established, related } accept
|
||||
|
||||
ip6 saddr @blacklist_v6 counter drop
|
||||
ip6 saddr @blacklist_vk_v6 counter drop
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user