|
|
|
|
@ -197,13 +197,15 @@ start() {
|
|
|
|
|
firewall-cmd --direct --add-chain ipv4 filter rtpengine
|
|
|
|
|
firewall-cmd --direct --add-rule ipv4 filter INPUT_prefilter 0 -j rtpengine
|
|
|
|
|
firewall-cmd --direct --add-rule ipv4 filter rtpengine 0 -p udp -j RTPENGINE --id $TABLE
|
|
|
|
|
firewall-cmd --reload
|
|
|
|
|
firewall-cmd --direct --add-rule ipv6 filter rtpengine 0 -p udp -j RTPENGINE --id $TABLE
|
|
|
|
|
firewall-cmd --reload
|
|
|
|
|
else
|
|
|
|
|
iptables -N rtpengine
|
|
|
|
|
# We insert the rtpengine rule at the top of the input chain
|
|
|
|
|
iptables -t filter -I INPUT_prefilter -j rtpengine
|
|
|
|
|
iptables -I rtpengine -p udp -j RTPENGINE --id $TABLE
|
|
|
|
|
fi
|
|
|
|
|
ip6tables -I rtpengine -p udp -j RTPENGINE --id $TABLE
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
cat <<EOF > "$cachefile"
|
|
|
|
|
CUR_TABLE=$TABLE
|
|
|
|
|
@ -231,11 +233,13 @@ stop() {
|
|
|
|
|
if [[ $? == 0 ]]
|
|
|
|
|
then
|
|
|
|
|
firewall-cmd --direct --remove-rules ipv4 filter rtpengine
|
|
|
|
|
firewall-cmd --direct --remove-rules ipv6 filter rtpengine
|
|
|
|
|
firewall-cmd --direct --remove-rule ipv4 filter INPUT_prefilter 0 -j rtpengine
|
|
|
|
|
firewall-cmd --direct --remove-chain ipv4 filter rtpengine
|
|
|
|
|
firewall-cmd --reload
|
|
|
|
|
else
|
|
|
|
|
iptables -D rtpengine -p udp -j RTPENGINE --id $CUR_TABLE
|
|
|
|
|
ip6tables -D rtpengine -p udp -j RTPENGINE --id $CUR_TABLE
|
|
|
|
|
iptables -t filter -D INPUT -j rtpengine
|
|
|
|
|
iptables -X rtpengine
|
|
|
|
|
fi
|
|
|
|
|
|