Deleted Added
full compact
rc.firewall (163749) rc.firewall (165648)
1#!/bin/sh -
2# Copyright (c) 1996 Poul-Henning Kamp
3# All rights reserved.
4#
5# Redistribution and use in source and binary forms, with or without
6# modification, are permitted provided that the following conditions
7# are met:
8# 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24# SUCH DAMAGE.
25#
1#!/bin/sh -
2# Copyright (c) 1996 Poul-Henning Kamp
3# All rights reserved.
4#
5# Redistribution and use in source and binary forms, with or without
6# modification, are permitted provided that the following conditions
7# are met:
8# 1. Redistributions of source code must retain the above copyright

--- 9 unchanged lines hidden (view full) ---

18# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24# SUCH DAMAGE.
25#
26# $FreeBSD: head/etc/rc.firewall 163749 2006-10-28 20:08:12Z phk $
26# $FreeBSD: head/etc/rc.firewall 165648 2006-12-29 21:59:17Z piso $
27#
28
29#
30# Setup system for firewall service.
31#
32
33# Suck in the configuration variables.
34if [ -z "${source_rc_confs_defined}" ]; then

--- 89 unchanged lines hidden (view full) ---

124[Oo][Pp][Ee][Nn]|[Cc][Ll][Ii][Ee][Nn][Tt])
125 case ${natd_enable} in
126 [Yy][Ee][Ss])
127 if [ -n "${natd_interface}" ]; then
128 ${fwcmd} add 50 divert natd ip4 from any to any via ${natd_interface}
129 fi
130 ;;
131 esac
27#
28
29#
30# Setup system for firewall service.
31#
32
33# Suck in the configuration variables.
34if [ -z "${source_rc_confs_defined}" ]; then

--- 89 unchanged lines hidden (view full) ---

124[Oo][Pp][Ee][Nn]|[Cc][Ll][Ii][Ee][Nn][Tt])
125 case ${natd_enable} in
126 [Yy][Ee][Ss])
127 if [ -n "${natd_interface}" ]; then
128 ${fwcmd} add 50 divert natd ip4 from any to any via ${natd_interface}
129 fi
130 ;;
131 esac
132 case ${firewall_nat_enable} in
133 [Yy][Ee][Ss])
134 if [ -n "${firewall_nat_interface}" ]; then
135 ${fwcmd} nat 123 config if ${firewall_nat_interface} log
136 ${fwcmd} add 50 nat 123 ip4 from any to any via ${firewall_nat_interface}
137 fi
138 ;;
139 esac
132esac
133
134############
135# If you just configured ipfw in the kernel as a tool to solve network
136# problems or you just want to disallow some particular kinds of traffic
137# then you will want to change the default policy to open. You can also
138# do this as your only action by setting the firewall_type to ``open''.
139#

--- 254 unchanged lines hidden ---
140esac
141
142############
143# If you just configured ipfw in the kernel as a tool to solve network
144# problems or you just want to disallow some particular kinds of traffic
145# then you will want to change the default policy to open. You can also
146# do this as your only action by setting the firewall_type to ``open''.
147#

--- 254 unchanged lines hidden ---