added SNAT to use the correct outgoing IP address from Oracle depending on the WireGuard host
This commit is contained in:
		
							parent
							
								
									c00468eaea
								
							
						
					
					
						commit
						f0542a25c1
					
				
					 1 changed files with 12 additions and 0 deletions
				
			
		| 
						 | 
				
			
			@ -76,6 +76,18 @@ for rule in "${RULES[@]}"; do
 | 
			
		|||
    esac
 | 
			
		||||
done
 | 
			
		||||
 | 
			
		||||
case "$action" in
 | 
			
		||||
    "up")
 | 
			
		||||
        firewall-cmd --permanent --direct --add-rule ipv4 nat POSTROUTING 0 -o "$INTERFACE_SOURCE" -s "$FORWARD_TO_IP" -j SNAT --to-source "$ORIGINAL_DESTINATION_IP"
 | 
			
		||||
        ;;
 | 
			
		||||
    "down")
 | 
			
		||||
        firewall-cmd --permanent --direct --remove-rule ipv4 nat POSTROUTING 0 -o "$INTERFACE_SOURCE" -s "$FORWARD_TO_IP" -j SNAT --to-source "$ORIGINAL_DESTINATION_IP"
 | 
			
		||||
        ;;
 | 
			
		||||
    *)
 | 
			
		||||
        echo "Invalid action. Use 'up' or 'down'."
 | 
			
		||||
        exit 1
 | 
			
		||||
        ;;
 | 
			
		||||
 | 
			
		||||
firewall-cmd --reload > /dev/null
 | 
			
		||||
 | 
			
		||||
echo -e "\nDone! Don't forget to add/remove the rules in the security list."
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in a new issue