ACL and Firewall Automation
Turn IPv4 and IPv6 CIDRs into iptables, nftables, ipset, nginx, or UFW rules so network policy can move from spreadsheet to deployable config faster.
One CIDR list can be transformed into several firewall or ACL syntaxes.
Mixed address families are normalized and emitted in the correct command form.
Useful for firewall rollouts, IP allowlists, maintenance windows, and emergency blocks.
Presets
Generates iptables and ip6tables commands. Useful for host firewalls and automation scripts.
Review the output before applying it in production.
iptables -A INPUT -s 203.0.113.0/24 -p tcp --dport 443 -j ACCEPT
ip6tables -A INPUT -s 2001:db8::/32 -p tcp --dport 443 -j ACCEPTThey reduce copy-paste mistakes when the same policy must be expressed across Linux firewalls, reverse proxies, and sets.
They are especially useful when a clean CIDR list already exists and the slow part is translating it into the right syntax.
For long lists, ipset or nftables sets are usually easier to maintain and faster to evaluate than hundreds of individual rules.
Firewall syntax differs by platform, but the core translation is usually the same: normalize each input network, determine whether it should match source or destination addresses, then emit target-specific syntax.
Examples:
iptables -A INPUT -s 203.0.113.0/24 -j ACCEPTadd rule inet filter input ip saddr 203.0.113.0/24 acceptallow 203.0.113.0/24;create corp-allow-v4 hash:net family inetLarge address lists are usually better represented as sets rather than hundreds of individual match rules.
For large or frequently changing lists, ipset is usually cleaner and more efficient because the firewall can reference a reusable set.
The generator normalizes hosts into explicit CIDR notation so the output is unambiguous across different targets.
Ports only apply when the protocol is TCP or UDP. If protocol is set to “all”, the generator intentionally drops the port match.
Yes. The generator keeps both families and emits the correct rule format for each target.