aboutsummaryrefslogtreecommitdiffstats
path: root/sys/netinet/ip_fw.h
blob: fa6f400d8240fa4359d6784fd8d42e749bb2ee26 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
/*
 * Copyright (c) 1993 Daniel Boulet
 * Copyright (c) 1994 Ugen J.S.Antsilevich
 *
 * Redistribution and use in source forms, with and without modification,
 * are permitted provided that this entire comment appears intact.
 *
 * Redistribution in binary form may occur without any restrictions.
 * Obviously, it would be nice if you gave credit where credit is due
 * but requiring it would be too onerous.
 *
 * This software is provided ``AS IS'' without any warranties of any kind.
 */

/*
 * Format of an IP firewall descriptor
 *
 * src, dst, src_mask, dst_mask are always stored in network byte order.
 * flags and num_*_ports are stored in host byte order (of course).
 * Port numbers are stored in HOST byte order.
 */
#ifndef _IP_FW_H
#define _IP_FW_H

struct ip_fw {
    struct ip_fw *next;			/* Next firewall on chain */
    struct in_addr src, dst;		/* Source and destination IP addr */
    struct in_addr src_mask, dst_mask;	/* Mask for src and dest IP addr */
    u_short flags;

    u_short n_src_p, n_dst_p;   /* # of src ports and # of dst ports */
    					/* in ports array (dst ports follow */
    					/* src ports; max of 10 ports in all; */
    					/* count of 0 means match all ports) */
#define IP_FW_MAX_PORTS	10	/* A reasonable maximum */
    u_short ports[IP_FW_MAX_PORTS]; /* Array of port numbers to match */
};

/*
 * Values for "flags" field .
 */

#define IP_FW_F_ALL	0	/* This is a universal packet firewall*/
#define IP_FW_F_TCP	1	/* This is a TCP packet firewall      */
#define IP_FW_F_UDP	2	/* This is a UDP packet firewall      */
#define IP_FW_F_ICMP	3	/* This is a ICMP packet firewall     */
#define IP_FW_F_KIND	3	/* Mask to isolate firewall kind      */
#define IP_FW_F_ACCEPT	4	/* This is an accept firewall (as     *
				 *         opposed to a deny firewall)*
				 *                                    */
#define IP_FW_F_SRNG	8	/* The first two src ports are a min  *
				 * and max range (stored in host byte *
				 * order).                            *
				 *                                    */
#define IP_FW_F_DRNG	16	/* The first two dst ports are a min  *
				 * and max range (stored in host byte *
				 * order).                            *
				 * (ports[0] <= port <= ports[1])     *
				 *                                    */
#define IP_FW_F_PRN	32	/* In verbose mode print this firewall*/
#define IP_FW_F_MASK	0x2F	/* All possible flag bits mask        */

/*    
 * New IP firewall options for [gs]etsockopt at the RAW IP level.
 */     
#define IP_FW_BASE_CTL	53

#define IP_FW_ADD_BLK (IP_FW_BASE_CTL)
#define IP_FW_ADD_FWD (IP_FW_BASE_CTL+1)   
#define IP_FW_CHK_BLK (IP_FW_BASE_CTL+2)
#define IP_FW_CHK_FWD (IP_FW_BASE_CTL+3)
#define IP_FW_DEL_BLK (IP_FW_BASE_CTL+4)
#define IP_FW_DEL_FWD (IP_FW_BASE_CTL+5)
#define IP_FW_FLUSH   (IP_FW_BASE_CTL+6)
#define IP_FW_POLICY  (IP_FW_BASE_CTL+7) 


/*
 * Main firewall chains definitions and global var's definitions.
 */
extern struct ip_fw *ip_fw_blk_chain;
extern struct ip_fw *ip_fw_fwd_chain;
extern int ip_fw_policy;

#endif