rc.firewall (163749) | rc.firewall (165648) |
---|---|
1#!/bin/sh - 2# Copyright (c) 1996 Poul-Henning Kamp 3# All rights reserved. 4# 5# Redistribution and use in source and binary forms, with or without 6# modification, are permitted provided that the following conditions 7# are met: 8# 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24# SUCH DAMAGE. 25# | 1#!/bin/sh - 2# Copyright (c) 1996 Poul-Henning Kamp 3# All rights reserved. 4# 5# Redistribution and use in source and binary forms, with or without 6# modification, are permitted provided that the following conditions 7# are met: 8# 1. Redistributions of source code must retain the above copyright --- 9 unchanged lines hidden (view full) --- 18# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24# SUCH DAMAGE. 25# |
26# $FreeBSD: head/etc/rc.firewall 163749 2006-10-28 20:08:12Z phk $ | 26# $FreeBSD: head/etc/rc.firewall 165648 2006-12-29 21:59:17Z piso $ |
27# 28 29# 30# Setup system for firewall service. 31# 32 33# Suck in the configuration variables. 34if [ -z "${source_rc_confs_defined}" ]; then --- 89 unchanged lines hidden (view full) --- 124[Oo][Pp][Ee][Nn]|[Cc][Ll][Ii][Ee][Nn][Tt]) 125 case ${natd_enable} in 126 [Yy][Ee][Ss]) 127 if [ -n "${natd_interface}" ]; then 128 ${fwcmd} add 50 divert natd ip4 from any to any via ${natd_interface} 129 fi 130 ;; 131 esac | 27# 28 29# 30# Setup system for firewall service. 31# 32 33# Suck in the configuration variables. 34if [ -z "${source_rc_confs_defined}" ]; then --- 89 unchanged lines hidden (view full) --- 124[Oo][Pp][Ee][Nn]|[Cc][Ll][Ii][Ee][Nn][Tt]) 125 case ${natd_enable} in 126 [Yy][Ee][Ss]) 127 if [ -n "${natd_interface}" ]; then 128 ${fwcmd} add 50 divert natd ip4 from any to any via ${natd_interface} 129 fi 130 ;; 131 esac |
132 case ${firewall_nat_enable} in 133 [Yy][Ee][Ss]) 134 if [ -n "${firewall_nat_interface}" ]; then 135 ${fwcmd} nat 123 config if ${firewall_nat_interface} log 136 ${fwcmd} add 50 nat 123 ip4 from any to any via ${firewall_nat_interface} 137 fi 138 ;; 139 esac |
|
132esac 133 134############ 135# If you just configured ipfw in the kernel as a tool to solve network 136# problems or you just want to disallow some particular kinds of traffic 137# then you will want to change the default policy to open. You can also 138# do this as your only action by setting the firewall_type to ``open''. 139# --- 254 unchanged lines hidden --- | 140esac 141 142############ 143# If you just configured ipfw in the kernel as a tool to solve network 144# problems or you just want to disallow some particular kinds of traffic 145# then you will want to change the default policy to open. You can also 146# do this as your only action by setting the firewall_type to ``open''. 147# --- 254 unchanged lines hidden --- |