-
Notifications
You must be signed in to change notification settings - Fork 210
/
Copy pathsample_multitarget.pol
75 lines (66 loc) · 1.82 KB
/
sample_multitarget.pol
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
#
# This is an example policy for capirca
#
header {
comment:: "this is a sample edge input filter that generates"
comment:: "multiple output formats."
# NOTES: iptables produces filter 'lines' that must be used as args to the
# '$ iptables' cmd, while Speedway produces stateful iptables filters
# compatible with iptables-restore (most people will prefer speedway)
target:: juniper edge-inbound inet
target:: juniperevo edge-inbound inet6 ingress
target:: msmpc edge-inbound mixed ingress
target:: cisco edge-inbound mixed
target:: speedway INPUT
target:: ciscoasa asa_in
target:: demo edge-inbound
target:: arista edge-inbound
target:: arista_tp edge-inbound
target:: brocade edge-inbound
target:: cisconx edge-inbound
target:: ciscoxr edge-inbound
}
#include 'includes/untrusted-networks-blocking.inc'
term permit-mail-services {
destination-address:: MAIL_SERVERS
protocol:: tcp
destination-port:: MAIL_SERVICES
action:: accept
}
term permit-web-services {
destination-address:: WEB_SERVERS
protocol:: tcp
destination-port:: WEB_SERVICES
action:: accept
}
term permit-tcp-established {
destination-address:: MAIL_SERVERS WEB_SERVERS PUBLIC_NAT
protocol:: tcp
option:: tcp-established
action:: accept
}
term permit-udp-established {
destination-address:: MAIL_SERVERS WEB_SERVERS PUBLIC_NAT
protocol:: udp
source-port:: HIGH_PORTS
action:: accept
}
term default-deny {
action:: deny
}
header {
comment:: "this is a sample output filter"
target:: juniper edge-outbound
target:: msmpc edge-outbound mixed egress
target:: arista_tp edge-outbound
target:: cisco edge-outbound mixed
target:: speedway OUTPUT
target:: ciscoasa asa_out
}
term deny-to-bad-destinations {
destination-address:: RFC1918 BOGON RESERVED
action:: deny
}
term default-accept {
action:: accept
}