Last active 1705433123

Port forward wrapper for firewalld

port_forward Raw
1#!/bin/bash
2
3if [[ "$1" == "stop" ]]; then
4 printf "Reloading firewall.. "
5 firewall-cmd --reload
6 exit $?
7fi
8
9function usage () {
10 printf "\nUsage:
11
12 $0 FROM_PORT TO_ADDR:TO_PORT [PROTO]
13 $0 stop
14
15 FROM_PORT External port on public zone
16 TO_ADDR Destination address
17 TO_PORT Destination port
18 PROTO Protocol (tcp/udp, optional,
19 defaults to tcp)
20 stop Remove port forwarding
21
22Example:
23
24 $0 8080 192.168.122.122:80
25 - will forward connections coming to port 80 to
26 a VM with address 192.168.122.122
27\n"
28 exit 0
29}
30
31function forward () {
32 echo "Creating port forward from port $FROM_PORT/$PROTO to $TO_ADDR:$TO_PORT."
33
34 printf "Enabling masquerade... "
35 firewall-cmd --add-masquerade
36 printf "Adding port forward... "
37 firewall-cmd --add-forward-port=port=${FROM_PORT}:proto=${PROTO}:toport=${TO_PORT}:toaddr=${TO_ADDR}
38# iptables -D LIBVIRT_FWI -o virbr0 -j REJECT --reject-with icmp-port-unreachable
39# iptables -D LIBVIRT_FWO -i virbr0 -j REJECT --reject-with icmp-port-unreachable
40
41 echo "Done."
42 exit 0
43}
44
45
46
47if [ "$#" -lt 2 ] || [ "$#" -gt 3 ]; then
48 usage
49fi
50
51if [ "$UID" -ne 0 ]; then
52 echo "Run as root."
53 exit 1
54fi
55
56FROM_PORT=$1
57TO_ADDR=${2%:*}
58TO_PORT=${2##*:}
59PROTO=${3:-'tcp'}
60
61if [[ ! "$TO_ADDR" =~ ^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$ ]]; then
62 printf "Resolved %s as " "$TO_ADDR"
63 TO_ADDR=`dig +short "$TO_ADDR" | head -1`
64 printf "%s\n" "$TO_ADDR"
65fi
66
67if [[ "$PROTO" != "tcp" ]] && [[ "$PROTO" != "udp" ]]; then
68 usage
69fi
70
71forward