setup_split_tunneling.sh
· 4.2 KiB · Bash
Raw
# RT Table Configuration
echo "228 warp_table" >> /etc/iproute2/rt_tables
uci add network rt_table
uci set network.@rt_table[-1].name='warp_table'
uci set network.@rt_table[-1].id='228'
# IPv4 Rule and Route Configuration
uci add network rule
uci set network.@rule[-1].mark='0xe4'
uci set network.@rule[-1].lookup='warp_table'
uci add network route
uci set network.@route[-1].interface='WARP'
uci set network.@route[-1].target='0.0.0.0/0'
uci set network.@route[-1].table='warp_table'
# IPv6 Rule and Route Configuration
uci add network rule6
uci set network.@rule6[-1].lookup='warp_table'
uci set network.@rule6[-1].mark='0xe4'
uci add network route6
uci set network.@route6[-1].interface='WARP'
uci set network.@route6[-1].target='::/0'
uci set network.@route6[-1].table='warp_table'
# Firewall Rules Configuration
uci add firewall rule
uci set firewall.@rule[-1].name='Mark-Amazon-Traffic'
uci set firewall.@rule[-1].ipset='Amazon_CIDRs'
uci set firewall.@rule[-1].target='MARK'
uci set firewall.@rule[-1].set_mark='0xe4'
uci set firewall.@rule[-1].src='lan'
uci set firewall.@rule[-1].dest='*'
uci set firewall.@rule[-1].priority='1'
uci set firewall.@rule[-1].chain='prerouting'
uci set firewall.@rule[-1].family='ipv4'
# Amazon IP Sets
# Download & parse like this: curl https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[].ip_prefix' | tee amazon-ip-ranges.txt
uci add firewall ipset
uci set firewall.@ipset[-1].name='Amazon_CIDRs'
uci set firewall.@ipset[-1].family='ipv4'
uci set firewall.@ipset[-1].match='dest_net'
uci set firewall.@ipset[-1].loadfile='/etc/luci-uploads/amazon-ip-ranges.txt'
# Hetzner IPv4 IP Sets
uci add firewall ipset
uci set firewall.@ipset[-1].name='Hetzner_CIDRs_v4'
uci set firewall.@ipset[-1].family='ipv4'
uci set firewall.@ipset[-1].match='dest_net'
uci set firewall.@ipset[-1].entry='116.202.0.0/16' '116.203.0.0/16' '128.140.0.0/17' '135.181.0.0/16' '136.243.0.0/16' '138.199.128.0/17' '138.201.0.0/16' '139.28.242.0/23' '142.132.128.0/17' '144.76.0.0/16' '148.251.0.0/16' '157.180.0.0/17' '157.90.0.0/16' '159.69.0.0/16' '162.55.0.0/16' '167.233.0.0/16' '167.235.0.0/16' '168.119.0.0/16' '171.25.225.0/24' '176.9.0.0/16' '178.212.75.0/24' '178.63.0.0/16' '185.107.52.0/22' '185.126.28.0/22' '185.157.176.0/23' '185.157.178.0/23' '185.157.83.0/24' '185.171.224.0/22' '185.189.228.0/24' '185.189.229.0/24' '185.189.230.0/24' '185.189.231.0/24' '185.213.45.0/24' '185.216.237.0/24' '185.226.99.0/24' '185.228.8.0/23' '185.50.120.0/23' '188.245.0.0/16' '188.34.128.0/17' '188.40.0.0/16' '193.110.6.0/23' '193.163.198.0/24' '194.42.180.0/22' '194.42.184.0/22' '194.62.106.0/24' '195.201.0.0/16' '195.248.224.0/24' '195.60.226.0/24' '197.242.84.0/22' '201.131.3.0/24' '204.29.146.0/24' '213.133.96.0/19' '213.239.192.0/18' '216.55.108.0/22' '23.88.0.0/17' '37.27.0.0/16' '45.145.227.0/24' '46.4.0.0/16' '46.62.128.0/17' '49.12.0.0/16' '49.13.0.0/16' '5.75.128.0/17' '5.9.0.0/16' '65.108.0.0/16' '65.109.0.0/16' '65.21.0.0/16' '78.138.62.0/24' '78.46.0.0/15' '85.10.192.0/18' '88.198.0.0/16' '88.99.0.0/16' '91.107.128.0/17' '91.190.240.0/21' '91.99.0.0/16' '94.130.0.0/16' '95.216.0.0/16' '95.217.0.0/16'
# Hetzner IPv6 IP Sets
uci add firewall ipset
uci set firewall.@ipset[-1].name='Hetzner_CIDRs_v6'
uci set firewall.@ipset[-1].family='ipv6'
uci set firewall.@ipset[-1].match='dest_net'
uci set firewall.@ipset[-1].entry='2a01:4f8::/32' '2a01:4f9::/32' '2a06:be80::/29' '2a0e:7700::/32' '2a11:e980::/29' '2a12:1fc0::/42'
# Hetzner IPv4 Marking Rule
uci add firewall rule
uci set firewall.@rule[-1].name='Mark-Hetzner-IPv4'
uci set firewall.@rule[-1].family='ipv4'
uci set firewall.@rule[-1].src='lan'
uci set firewall.@rule[-1].ipset='Hetzner_CIDRs_v4'
uci set firewall.@rule[-1].target='MARK'
uci set firewall.@rule[-1].set_mark='0xe4'
uci set firewall.@rule[-1].chain='prerouting'
uci set firewall.@rule[-1].dest='*'
# Hetzner IPv6 Marking Rule
uci add firewall rule
uci set firewall.@rule[-1].name='Mark-Hetzner-IPv6'
uci set firewall.@rule[-1].family='ipv6'
uci set firewall.@rule[-1].src='lan'
uci set firewall.@rule[-1].ipset='Hetzner_CIDRs_v6'
uci set firewall.@rule[-1].target='MARK'
uci set firewall.@rule[-1].set_mark='0xe4'
uci set firewall.@rule[-1].chain='prerouting'
uci set firewall.@rule[-1].dest='*'
# Apply changes
uci commit network
uci commit firewall
1 | # RT Table Configuration |
2 | echo "228 warp_table" >> /etc/iproute2/rt_tables |
3 | uci add network rt_table |
4 | uci set network.@rt_table[-1].name='warp_table' |
5 | uci set network.@rt_table[-1].id='228' |
6 | |
7 | # IPv4 Rule and Route Configuration |
8 | uci add network rule |
9 | uci set network.@rule[-1].mark='0xe4' |
10 | uci set network.@rule[-1].lookup='warp_table' |
11 | |
12 | uci add network route |
13 | uci set network.@route[-1].interface='WARP' |
14 | uci set network.@route[-1].target='0.0.0.0/0' |
15 | uci set network.@route[-1].table='warp_table' |
16 | |
17 | # IPv6 Rule and Route Configuration |
18 | uci add network rule6 |
19 | uci set network.@rule6[-1].lookup='warp_table' |
20 | uci set network.@rule6[-1].mark='0xe4' |
21 | |
22 | uci add network route6 |
23 | uci set network.@route6[-1].interface='WARP' |
24 | uci set network.@route6[-1].target='::/0' |
25 | uci set network.@route6[-1].table='warp_table' |
26 | |
27 | # Firewall Rules Configuration |
28 | uci add firewall rule |
29 | uci set firewall.@rule[-1].name='Mark-Amazon-Traffic' |
30 | uci set firewall.@rule[-1].ipset='Amazon_CIDRs' |
31 | uci set firewall.@rule[-1].target='MARK' |
32 | uci set firewall.@rule[-1].set_mark='0xe4' |
33 | uci set firewall.@rule[-1].src='lan' |
34 | uci set firewall.@rule[-1].dest='*' |
35 | uci set firewall.@rule[-1].priority='1' |
36 | uci set firewall.@rule[-1].chain='prerouting' |
37 | uci set firewall.@rule[-1].family='ipv4' |
38 | |
39 | # Amazon IP Sets |
40 | # Download & parse like this: curl https://ip-ranges.amazonaws.com/ip-ranges.json | jq -r '.prefixes[].ip_prefix' | tee amazon-ip-ranges.txt |
41 | uci add firewall ipset |
42 | uci set firewall.@ipset[-1].name='Amazon_CIDRs' |
43 | uci set firewall.@ipset[-1].family='ipv4' |
44 | uci set firewall.@ipset[-1].match='dest_net' |
45 | uci set firewall.@ipset[-1].loadfile='/etc/luci-uploads/amazon-ip-ranges.txt' |
46 | |
47 | # Hetzner IPv4 IP Sets |
48 | uci add firewall ipset |
49 | uci set firewall.@ipset[-1].name='Hetzner_CIDRs_v4' |
50 | uci set firewall.@ipset[-1].family='ipv4' |
51 | uci set firewall.@ipset[-1].match='dest_net' |
52 | uci set firewall.@ipset[-1].entry='116.202.0.0/16' '116.203.0.0/16' '128.140.0.0/17' '135.181.0.0/16' '136.243.0.0/16' '138.199.128.0/17' '138.201.0.0/16' '139.28.242.0/23' '142.132.128.0/17' '144.76.0.0/16' '148.251.0.0/16' '157.180.0.0/17' '157.90.0.0/16' '159.69.0.0/16' '162.55.0.0/16' '167.233.0.0/16' '167.235.0.0/16' '168.119.0.0/16' '171.25.225.0/24' '176.9.0.0/16' '178.212.75.0/24' '178.63.0.0/16' '185.107.52.0/22' '185.126.28.0/22' '185.157.176.0/23' '185.157.178.0/23' '185.157.83.0/24' '185.171.224.0/22' '185.189.228.0/24' '185.189.229.0/24' '185.189.230.0/24' '185.189.231.0/24' '185.213.45.0/24' '185.216.237.0/24' '185.226.99.0/24' '185.228.8.0/23' '185.50.120.0/23' '188.245.0.0/16' '188.34.128.0/17' '188.40.0.0/16' '193.110.6.0/23' '193.163.198.0/24' '194.42.180.0/22' '194.42.184.0/22' '194.62.106.0/24' '195.201.0.0/16' '195.248.224.0/24' '195.60.226.0/24' '197.242.84.0/22' '201.131.3.0/24' '204.29.146.0/24' '213.133.96.0/19' '213.239.192.0/18' '216.55.108.0/22' '23.88.0.0/17' '37.27.0.0/16' '45.145.227.0/24' '46.4.0.0/16' '46.62.128.0/17' '49.12.0.0/16' '49.13.0.0/16' '5.75.128.0/17' '5.9.0.0/16' '65.108.0.0/16' '65.109.0.0/16' '65.21.0.0/16' '78.138.62.0/24' '78.46.0.0/15' '85.10.192.0/18' '88.198.0.0/16' '88.99.0.0/16' '91.107.128.0/17' '91.190.240.0/21' '91.99.0.0/16' '94.130.0.0/16' '95.216.0.0/16' '95.217.0.0/16' |
53 | |
54 | # Hetzner IPv6 IP Sets |
55 | uci add firewall ipset |
56 | uci set firewall.@ipset[-1].name='Hetzner_CIDRs_v6' |
57 | uci set firewall.@ipset[-1].family='ipv6' |
58 | uci set firewall.@ipset[-1].match='dest_net' |
59 | uci set firewall.@ipset[-1].entry='2a01:4f8::/32' '2a01:4f9::/32' '2a06:be80::/29' '2a0e:7700::/32' '2a11:e980::/29' '2a12:1fc0::/42' |
60 | |
61 | # Hetzner IPv4 Marking Rule |
62 | uci add firewall rule |
63 | uci set firewall.@rule[-1].name='Mark-Hetzner-IPv4' |
64 | uci set firewall.@rule[-1].family='ipv4' |
65 | uci set firewall.@rule[-1].src='lan' |
66 | uci set firewall.@rule[-1].ipset='Hetzner_CIDRs_v4' |
67 | uci set firewall.@rule[-1].target='MARK' |
68 | uci set firewall.@rule[-1].set_mark='0xe4' |
69 | uci set firewall.@rule[-1].chain='prerouting' |
70 | uci set firewall.@rule[-1].dest='*' |
71 | |
72 | # Hetzner IPv6 Marking Rule |
73 | uci add firewall rule |
74 | uci set firewall.@rule[-1].name='Mark-Hetzner-IPv6' |
75 | uci set firewall.@rule[-1].family='ipv6' |
76 | uci set firewall.@rule[-1].src='lan' |
77 | uci set firewall.@rule[-1].ipset='Hetzner_CIDRs_v6' |
78 | uci set firewall.@rule[-1].target='MARK' |
79 | uci set firewall.@rule[-1].set_mark='0xe4' |
80 | uci set firewall.@rule[-1].chain='prerouting' |
81 | uci set firewall.@rule[-1].dest='*' |
82 | |
83 | # Apply changes |
84 | uci commit network |
85 | uci commit firewall |
x_result_example.txt
· 3.4 KiB · Text
Raw
network.@rt_table[0]=rt_table
network.@rt_table[0].name='warp_table'
network.@rt_table[0].id='228'
network.@rule[0]=rule
network.@rule[0].mark='0xe4'
network.@rule[0].lookup='warp_table'
network.@route[0]=route
network.@route[0].interface='WARP'
network.@route[0].target='0.0.0.0/0'
network.@route[0].table='warp_table'
network.@rule6[0]=rule6
network.@rule6[0].lookup='warp_table'
network.@rule6[0].mark='0xe4'
network.@route6[0]=route6
network.@route6[0].interface='WARP'
network.@route6[0].target='::/0'
network.@route6[0].table='warp_table'
firewall.@rule[11]=rule
firewall.@rule[11].name='Mark-Amazon-Traffic'
firewall.@rule[11].ipset='Amazon_CIDRs'
firewall.@rule[11].target='MARK'
firewall.@rule[11].set_mark='0xe4'
firewall.@rule[11].src='lan'
firewall.@rule[11].dest='*'
firewall.@rule[11].priority='1'
firewall.@rule[11].chain='prerouting'
firewall.@rule[11].family='ipv4'
firewall.@ipset[2]=ipset
firewall.@ipset[2].name='Amazon_CIDRs'
firewall.@ipset[2].family='ipv4'
firewall.@ipset[2].match='dest_net'
firewall.@ipset[2].loadfile='/etc/luci-uploads/amazon-ip-ranges.txt' # Скачал & спарсил с https://ip-ranges.amazonaws.com/ip-ranges.json
firewall.@ipset[3]=ipset
firewall.@ipset[3].name='Hetzner_CIDRs_v4'
firewall.@ipset[3].family='ipv4'
firewall.@ipset[3].match='dest_net'
firewall.@ipset[3].entry='116.202.0.0/16' '116.203.0.0/16' '128.140.0.0/17' '135.181.0.0/16' '136.243.0.0/16' '138.199.128.0/17' '138.201.0.0/16' '139.28.242.0/23' '142.132.128.0/17' '144.76.0.0/16' '148.251.0.0/16' '157.180.0.0/17' '157.90.0.0/16' '159.69.0.0/16' '162.55.0.0/16' '167.233.0.0/16' '167.235.0.0/16' '168.119.0.0/16' '171.25.225.0/24' '176.9.0.0/16' '178.212.75.0/24' '178.63.0.0/16' '185.107.52.0/22' '185.126.28.0/22' '185.157.176.0/23' '185.157.178.0/23' '185.157.83.0/24' '185.171.224.0/22' '185.189.228.0/24' '185.189.229.0/24' '185.189.230.0/24' '185.189.231.0/24' '185.213.45.0/24' '185.216.237.0/24' '185.226.99.0/24' '185.228.8.0/23' '185.50.120.0/23' '188.245.0.0/16' '188.34.128.0/17' '188.40.0.0/16' '193.110.6.0/23' '193.163.198.0/24' '194.42.180.0/22' '194.42.184.0/22' '194.62.106.0/24' '195.201.0.0/16' '195.248.224.0/24' '195.60.226.0/24' '197.242.84.0/22' '201.131.3.0/24' '204.29.146.0/24' '213.133.96.0/19' '213.239.192.0/18' '216.55.108.0/22' '23.88.0.0/17' '37.27.0.0/16' '45.145.227.0/24' '46.4.0.0/16' '46.62.128.0/17' '49.12.0.0/16' '49.13.0.0/16' '5.75.128.0/17' '5.9.0.0/16' '65.108.0.0/16' '65.109.0.0/16' '65.21.0.0/16' '78.138.62.0/24' '78.46.0.0/15' '85.10.192.0/18' '88.198.0.0/16' '88.99.0.0/16' '91.107.128.0/17' '91.190.240.0/21' '91.99.0.0/16' '94.130.0.0/16' '95.216.0.0/16' '95.217.0.0/16'
firewall.@ipset[4]=ipset
firewall.@ipset[4].name='Hetzner_CIDRs_v6'
firewall.@ipset[4].family='ipv6'
firewall.@ipset[4].match='dest_net'
firewall.@ipset[4].entry='2a01:4f8::/32' '2a01:4f9::/32' '2a06:be80::/29' '2a0e:7700::/32' '2a11:e980::/29' '2a12:1fc0::/42'
firewall.@rule[12]=rule
firewall.@rule[12].name='Mark-Hetzner-IPv4'
firewall.@rule[12].family='ipv4'
firewall.@rule[12].src='lan'
firewall.@rule[12].ipset='Hetzner_CIDRs_v4'
firewall.@rule[12].target='MARK'
firewall.@rule[12].set_mark='0xe4'
firewall.@rule[12].chain='prerouting'
firewall.@rule[12].dest='*'
firewall.@rule[13]=rule
firewall.@rule[13].name='Mark-Hetzner-IPv6'
firewall.@rule[13].family='ipv6'
firewall.@rule[13].src='lan'
firewall.@rule[13].ipset='Hetzner_CIDRs_v6'
firewall.@rule[13].target='MARK'
firewall.@rule[13].set_mark='0xe4'
firewall.@rule[13].chain='prerouting'
firewall.@rule[13].dest='*'
1 | network.@rt_table[0]=rt_table |
2 | network.@rt_table[0].name='warp_table' |
3 | network.@rt_table[0].id='228' |
4 | network.@rule[0]=rule |
5 | network.@rule[0].mark='0xe4' |
6 | network.@rule[0].lookup='warp_table' |
7 | network.@route[0]=route |
8 | network.@route[0].interface='WARP' |
9 | network.@route[0].target='0.0.0.0/0' |
10 | network.@route[0].table='warp_table' |
11 | network.@rule6[0]=rule6 |
12 | network.@rule6[0].lookup='warp_table' |
13 | network.@rule6[0].mark='0xe4' |
14 | network.@route6[0]=route6 |
15 | network.@route6[0].interface='WARP' |
16 | network.@route6[0].target='::/0' |
17 | network.@route6[0].table='warp_table' |
18 | firewall.@rule[11]=rule |
19 | firewall.@rule[11].name='Mark-Amazon-Traffic' |
20 | firewall.@rule[11].ipset='Amazon_CIDRs' |
21 | firewall.@rule[11].target='MARK' |
22 | firewall.@rule[11].set_mark='0xe4' |
23 | firewall.@rule[11].src='lan' |
24 | firewall.@rule[11].dest='*' |
25 | firewall.@rule[11].priority='1' |
26 | firewall.@rule[11].chain='prerouting' |
27 | firewall.@rule[11].family='ipv4' |
28 | firewall.@ipset[2]=ipset |
29 | firewall.@ipset[2].name='Amazon_CIDRs' |
30 | firewall.@ipset[2].family='ipv4' |
31 | firewall.@ipset[2].match='dest_net' |
32 | firewall.@ipset[2].loadfile='/etc/luci-uploads/amazon-ip-ranges.txt' # Скачал & спарсил с https://ip-ranges.amazonaws.com/ip-ranges.json |
33 | firewall.@ipset[3]=ipset |
34 | firewall.@ipset[3].name='Hetzner_CIDRs_v4' |
35 | firewall.@ipset[3].family='ipv4' |
36 | firewall.@ipset[3].match='dest_net' |
37 | firewall.@ipset[3].entry='116.202.0.0/16' '116.203.0.0/16' '128.140.0.0/17' '135.181.0.0/16' '136.243.0.0/16' '138.199.128.0/17' '138.201.0.0/16' '139.28.242.0/23' '142.132.128.0/17' '144.76.0.0/16' '148.251.0.0/16' '157.180.0.0/17' '157.90.0.0/16' '159.69.0.0/16' '162.55.0.0/16' '167.233.0.0/16' '167.235.0.0/16' '168.119.0.0/16' '171.25.225.0/24' '176.9.0.0/16' '178.212.75.0/24' '178.63.0.0/16' '185.107.52.0/22' '185.126.28.0/22' '185.157.176.0/23' '185.157.178.0/23' '185.157.83.0/24' '185.171.224.0/22' '185.189.228.0/24' '185.189.229.0/24' '185.189.230.0/24' '185.189.231.0/24' '185.213.45.0/24' '185.216.237.0/24' '185.226.99.0/24' '185.228.8.0/23' '185.50.120.0/23' '188.245.0.0/16' '188.34.128.0/17' '188.40.0.0/16' '193.110.6.0/23' '193.163.198.0/24' '194.42.180.0/22' '194.42.184.0/22' '194.62.106.0/24' '195.201.0.0/16' '195.248.224.0/24' '195.60.226.0/24' '197.242.84.0/22' '201.131.3.0/24' '204.29.146.0/24' '213.133.96.0/19' '213.239.192.0/18' '216.55.108.0/22' '23.88.0.0/17' '37.27.0.0/16' '45.145.227.0/24' '46.4.0.0/16' '46.62.128.0/17' '49.12.0.0/16' '49.13.0.0/16' '5.75.128.0/17' '5.9.0.0/16' '65.108.0.0/16' '65.109.0.0/16' '65.21.0.0/16' '78.138.62.0/24' '78.46.0.0/15' '85.10.192.0/18' '88.198.0.0/16' '88.99.0.0/16' '91.107.128.0/17' '91.190.240.0/21' '91.99.0.0/16' '94.130.0.0/16' '95.216.0.0/16' '95.217.0.0/16' |
38 | firewall.@ipset[4]=ipset |
39 | firewall.@ipset[4].name='Hetzner_CIDRs_v6' |
40 | firewall.@ipset[4].family='ipv6' |
41 | firewall.@ipset[4].match='dest_net' |
42 | firewall.@ipset[4].entry='2a01:4f8::/32' '2a01:4f9::/32' '2a06:be80::/29' '2a0e:7700::/32' '2a11:e980::/29' '2a12:1fc0::/42' |
43 | firewall.@rule[12]=rule |
44 | firewall.@rule[12].name='Mark-Hetzner-IPv4' |
45 | firewall.@rule[12].family='ipv4' |
46 | firewall.@rule[12].src='lan' |
47 | firewall.@rule[12].ipset='Hetzner_CIDRs_v4' |
48 | firewall.@rule[12].target='MARK' |
49 | firewall.@rule[12].set_mark='0xe4' |
50 | firewall.@rule[12].chain='prerouting' |
51 | firewall.@rule[12].dest='*' |
52 | firewall.@rule[13]=rule |
53 | firewall.@rule[13].name='Mark-Hetzner-IPv6' |
54 | firewall.@rule[13].family='ipv6' |
55 | firewall.@rule[13].src='lan' |
56 | firewall.@rule[13].ipset='Hetzner_CIDRs_v6' |
57 | firewall.@rule[13].target='MARK' |
58 | firewall.@rule[13].set_mark='0xe4' |
59 | firewall.@rule[13].chain='prerouting' |
60 | firewall.@rule[13].dest='*' |