github NHAS/wag v5.0.0
v5.0.0 Port Filtering

latest releases: v8.0.1, v8.0.0, v8.0.0-beta17...
20 months ago

Wag now gives administrators the option to define port filtering restrictions, so that specific users and groups are restricted not-just-by IP but also protocol and service.

Features:

  • Extended wag acl syntax to filter ports and services (see below)
  • Add MFA reset to management UI

Bug Fixes:

  • Fix management UI not respecting TLS certificates
  • Fix typo in rules UI

ACL rule syntax (taken from readme)

The Policies section allows you to define what routes, ports and protocols should be both captured by the VPN and allowed through wag respectively.
Currently 3 types of port and protocol rules are supported:

Any

When no other rules are defined or the any keyword is used wag will allow all services and port combinations.

Example:

"1.1.1.1": Allows all ports and protocols to 1.1.1.1/32
"1.1.1.1 54/any": Allows both tcp and udp to 1.1.1.1/32

Single Service

Example:

192.168.1.1 22/tcp 53/udp: Fairly self explanatory, allows you to hit 22/tcp and 53/udp on a host
1.1.1.1 icmp: As icmp doesnt have ports really you dont need it either

Ranges

You can also define a range of ports with a protocol. wag requires that the lower port is first.

Example:

192.168.1.1 22-1024/tcp 53-23/any: Format is low port-high port/service

Don't miss a new wag release

NewReleases is sending notifications on new releases.