Crates.io | traffic_forward |
lib.rs | traffic_forward |
version | 0.1.8 |
source | src |
created_at | 2024-04-25 09:36:28.293613 |
updated_at | 2024-06-19 09:50:25.348053 |
description | This is a tool that allows you to easily create traffic forwarding rules through this command, which is implemented through the iptables tool. |
homepage | https://github.com/bigbug-gg/traffic_forward |
repository | https://github.com/bigbug-gg/traffic_forward |
max_upload_size | |
id | 1219967 |
size | 73,198 |
This is a tool that allows you to easily create traffic forwarding rules through this command, which is implemented through the iptables tool.
It create TCP/UDP rules for three chains:
# Chians: PREROUTING、POSTROUTING、FORWARD
sudo traffic_forward add 193.23.11.3:3333 9988
Equivalent to:
# 192.168.17.131 is the server host's IP address, automatically fetched.
iptables -t nat -I PREROUTING -p tcp --dport 9988 -j DNAT --to-destination 193.23.11.3:3333
iptables -t nat -I POSTROUTING -d 193.23.11.3 -p tcp --dport 3333 -j SNAT --to-source 192.168.17.131
iptables -t filter -I FORWARD -d 193.23.11.3 -p tcp --dport 3333
iptables -t filter -I FORWARD -s 193.23.11.3 -p tcp --dport 3333
iptables -t nat -I PREROUTING -p udp --dport 9988 -j DNAT --to-destination 193.23.11.3:3333
iptables -t nat -I POSTROUTING -d 193.23.11.3 -p udp --dport 3333 -j SNAT --to-source 192.168.17.131
iptables -t filter -I FORWARD -d 193.23.11.3 -p udp --dport 3333
iptables -t filter -I FORWARD -s 193.23.11.3 -p udp --dport 3333
Rust
environment.Just for your reference, the ideas are the same
# A value of 0 indicates that the forwarding function is not activated, while a value of 1 means it is activated.
cat /proc/sys/net/ipv4/ip_forward
# Temporarily enable forwarding function
echo 1 > /proc/sys/net/ipv4/ip_forward
This tool only replaces writing iptables
rules and solves multiple configurations with one command. As iptables
is used, root
account operations are required.
cargo install traffic_forward
Upon successful installation, you will see the following path:
...
Compiling clap v4.5.4
Compiling ron v0.8.1
Compiling traffic_forward v0.1.0
Finished release [optimized] target(s) in 2m 17s
Installing /home/youre_account/.cargo/bin/traffic_forward
Installed package `traffic_forward v0.1.0` (executable `traffic_forward`)
【Non-root Account】 Add a soft link to /usr/bin
:
# This is only for your reference, please operate according to your actual path
sudo ln -s /home/youre_account/.cargo/bin/traffic_forward /usr/bin/traffic_forward
View version:
traffic_forward --version
traffic_forward X.X.X
Or:
sudo traffic_forward --version
traffic_forward X.X.X
# Use local port 5555 to forward to 192.102.11.44:8000
sudo traffic_forward add 192.102.11.44:8000 5555
sudo traffic_forward list
0.0.0.0:5555 -> 192.102.11.44:8000
sudo traffic_forward query 192.102.11.44
sudo traffic_forward delete 192.102.11.44
Delete completed
# traffic_forward web <token> [port]
sudo traffic_forward 1234 8080
# traffic_forward web <token> [port]
traffic_forward web 1234 8080
Add
{
"target_ip": "192.168.50.50",
"target_port": "4488",
"local_port": "4433",
}
{
"code": 1,
"msg": "Success",
"data": null
}
Delete
{
"target_ip": "192.168.50.50"
}
{
"code": 1,
"msg": "Success",
"data": null
}
List
{
"code": 1,
"msg": "Success",
"data": {
"list": [
{
"ip": "192.168.50.50",
"target_port": "4488",
"local_port": "4433"
}
]
}
}
$ sudo traffic_forward -V
traffic_forward 0.1.2
$ sudo traffic_forward add 192.168.11.11:3389 2233
Add completed
$ sudo traffic_forward list
0.0.0.0:5000 -> 192.145.2.22:323
0.0.0.0:2233 -> 192.168.11.11:3389
$ sudo traffic_forward query 192.168.11.11
Up: 0 KB
Down: 0 KB
$ sudo traffic_forward delete 192.168.11.11
Delete completed
$ sudo traffic_forward query 192.168.11.11
Query error: No matching IP found
$ sudo traffic_forward list
0.0.0.0:5000 -> 192.145.2.22:323
# When use API
sudo ./traffic_forward web 1234 8080
# Request test
curl -H"token: 1234" localhost:8080/iptables/list
{"code":1,"msg":"Success","data":{"list":[{"ip":"xxx.xx.xx.xx","target_port":"12581","local_port":"49204"}]}}
MIT OR Apache-2.0