Skip to content

v5.0.0 Port Filtering

Compare
Choose a tag to compare
@NHAS NHAS released this 05 Mar 08:00
· 393 commits to main since this release

Wag now gives administrators the option to define port filtering restrictions, so that specific users and groups are restricted not-just-by IP but also protocol and service.

Features:

  • Extended wag acl syntax to filter ports and services (see below)
  • Add MFA reset to management UI

Bug Fixes:

  • Fix management UI not respecting TLS certificates
  • Fix typo in rules UI

ACL rule syntax (taken from readme)

The Policies section allows you to define what routes, ports and protocols should be both captured by the VPN and allowed through wag respectively.
Currently 3 types of port and protocol rules are supported:

Any

When no other rules are defined or the any keyword is used wag will allow all services and port combinations.

Example:

"1.1.1.1": Allows all ports and protocols to 1.1.1.1/32
"1.1.1.1 54/any": Allows both tcp and udp to 1.1.1.1/32

Single Service

Example:

192.168.1.1 22/tcp 53/udp: Fairly self explanatory, allows you to hit 22/tcp and 53/udp on a host
1.1.1.1 icmp: As icmp doesnt have ports really you dont need it either

Ranges

You can also define a range of ports with a protocol. wag requires that the lower port is first.

Example:

192.168.1.1 22-1024/tcp 53-23/any: Format is low port-high port/service