Skip to content

Commit 9ab8519

Browse files
defguard-communitygitbook-bot
authored andcommitted
GITBOOK-132: No subject
1 parent 87f37e1 commit 9ab8519

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed

features/access-control-list/README.md

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -201,3 +201,51 @@ Once you have created appropriate groups and assigned the users, let's update th
201201
* In **Denied Groups** input we should now select the _Externals_ group
202202

203203
<figure><img src="../../.gitbook/assets/image (175).png" alt=""><figcaption></figcaption></figure>
204+
205+
## Troubleshooting
206+
207+
### Connection issues with Docker installed
208+
209+
If you have Docker installed on the same machine as your Gateway (or if you deployed Defguard using the one-line installation script) the firewall may not work properly due to Docker firewall rules interfering with your ACL rules.&#x20;
210+
211+
To verify this, execute `nft list ruleset` (may require sudo) on the machine on which your Gateway is installed:
212+
213+
```
214+
table ip filter {
215+
[...]
216+
chain FORWARD {
217+
type filter hook forward priority filter; policy drop;
218+
counter packets 744194 bytes 1580784676 jump DOCKER-USER
219+
counter packets 744194 bytes 1580784676 jump DOCKER-FORWARD
220+
}
221+
[...]
222+
}
223+
```
224+
225+
If you have a FORWARD chain (managed by Docker) that has a default policy of drop and filter priority, this chain will interfere with Defguard rules (accept policy shouldn't be a problem).
226+
227+
To fix this, set the [Defguard firewall priority](https://docs.defguard.net/features/access-control-list/firewall-internals#forward-chain-priority) to -1. This will make Defguard rules run before Docker rules.
228+
229+
Running `nft list ruleset` on the machine should then result in the following:
230+
231+
```
232+
table ip filter {
233+
[...]
234+
chain FORWARD {
235+
type filter hook forward priority filter; policy drop;
236+
counter packets 744194 bytes 1580784676 jump DOCKER-USER
237+
counter packets 744194 bytes 1580784676 jump DOCKER-FORWARD
238+
}
239+
[...]
240+
}
241+
table inet DEFGUARD-wg0 {
242+
chain FORWARD {
243+
type filter hook forward priority filter - 1; policy accept;
244+
iifname != "wg0" counter packets 13807 bytes 11743290 accept comment "Ignore traffic not related to the VPN"
245+
ct state established,related counter packets 2692 bytes 601240 accept comment "Allow established and related traffic
246+
}
247+
[...]
248+
}
249+
```
250+
251+
The Default forward chain that is managed by Docker has the priority of `filter` and Defguard chain of `filter - 1`, making it run before Docker's.

0 commit comments

Comments
 (0)