@@ -65,8 +65,20 @@ The possible fields of a firewall rule are:
65
65
unsafe_routes, the rule allows. If unset, the rule will allow access to the specified ports on both the node itself as
66
66
well as any IP addresses it routes to.
67
67
68
- Logical evaluation is roughly : port AND proto AND (ca_sha OR ca_name) AND (host OR group OR groups OR cidr OR
69
- local_cidr).
68
+ :::note
69
+
70
+ Logical evaluation of these rules changed in Nebula v1.9.0. Previously, a match on `local_cidr` meant that a rule did
71
+ not need to also pass `host`, `group`, `groups`, or `cidr` checks. This is almost never what uers want - `local_cidr`
72
+ generally refers to a specific segment of an [unsafe_routes](/docs/config/tun/#tununsafe_routes) configuration that is
73
+ being accessed, while the latter options relate to the connecting host's identity.
74
+
75
+ :: :
76
+
77
+ Since Nebula v1.9.0, rules are evaluated as :
78
+ ` port AND proto AND (ca_sha OR ca_name) AND (host OR group OR groups OR cidr) AND local_cidr` .
79
+
80
+ Prior to Nebula v1.9.0, rules were evaluated as :
81
+ ` port AND proto AND (ca_sha OR ca_name) AND (host OR group OR groups OR cidr OR local_cidr)` .
70
82
71
83
` ` ` yml
72
84
# Nebula security group configuration
@@ -75,6 +87,8 @@ firewall:
75
87
outbound_action: drop
76
88
inbound_action: drop
77
89
90
+ default_local_cidr_any: false # false will become the default in Nebula v1.10.0+
91
+
78
92
conntrack:
79
93
tcp_timeout: 12m
80
94
udp_timeout: 3m
@@ -118,6 +132,21 @@ outbound:
118
132
At a minimum, it is recommended to enable ICMP so that `ping` can be used to verify connectivity. Additionally, if
119
133
enabling the built-in Nebula SSH server, you may wish to grant access over the Nebula network via firewall rules.
120
134
135
+ # # firewall.default_local_cidr_any
136
+
137
+ <Pill className="mb-24">Default : True</Pill>
138
+
139
+ This setting was introduced in Nebula v1.9.0 for backwards compatibility purposes. The default will be changed to
140
+ ` false` in Nebula v1.10.0 and the config option will be deprecated.
141
+
142
+ When set to `true`, any firewall rules which do not explicitly set `local_cidr` will be interpreted as if they were set
143
+ to `any`. In other words, firewall rules which do not explicitly configure `local_cidr` will apply both to ports on the
144
+ local machine as well as ports on any hosts accessible via [unsafe_routes](/docs/config/tun/#tununsafe_routes).
145
+
146
+ When set to `false`, firewall rules which do not explicitly set `local_cidr` will only apply to the local host. To
147
+ permit access to machines accessible via unsafe_routes, define a firewall rule which explicitly references those routes
148
+ in the `local_cidr` field.
149
+
121
150
# # firewall.conntrack
122
151
123
152
Settings for the Connection Tracker.
0 commit comments