defaultroute revision 33682
1#!/bin/sh - 2# 3# $Id: rc.network,v 1.18 1998/02/16 19:21:32 guido Exp $ 4# From: @(#)netstart 5.9 (Berkeley) 3/30/91 5 6# Note that almost all the user-configurable behavior is no longer in 7# this file, but rather in /etc/rc.conf. Please check that file 8# first before contemplating any changes here. If you do need to change 9# this file for some reason, we would like to know about it. 10 11# First pass startup stuff. 12 13network_pass1() { 14 echo -n 'Doing initial network setup:' 15 # Set the host name if it is not already set 16 if [ -z "`hostname -s`" ] ; then 17 hostname $hostname 18 echo -n ' hostname' 19 fi 20 21 # Set the domainname if we're using NIS 22 if [ -n "$nisdomainname" -a "x$nisdomainname" != "xNO" ] ; then 23 domainname $nisdomainname 24 echo -n ' domain' 25 fi 26 echo '.' 27 28 # Set up all the network interfaces, calling startup scripts if needed 29 for ifn in ${network_interfaces}; do 30 if [ -e /etc/start_if.${ifn} ]; then 31 . /etc/start_if.${ifn} 32 fi 33 # Do the primary ifconfig if specified 34 eval ifconfig_args=\$ifconfig_${ifn} 35 if [ -n "${ifconfig_args}" ] ; then 36 ifconfig ${ifn} ${ifconfig_args} 37 fi 38 # Check to see if aliases need to be added 39 alias=0 40 while : 41 do 42 eval ifconfig_args=\$ifconfig_${ifn}_alias${alias} 43 if [ -n "${ifconfig_args}" ]; then 44 ifconfig ${ifn} ${ifconfig_args} alias 45 alias=`expr ${alias} + 1` 46 else 47 break; 48 fi 49 done 50 # Do ipx address if specified 51 eval ifconfig_args=\$ifconfig_${ifn}_ipx 52 if [ -n "${ifconfig_args}" ]; then 53 ifconfig ${ifn} ${ifconfig_args} 54 fi 55 ifconfig ${ifn} 56 done 57 58 # Initialize IP filtering using ipfw 59 echo "" 60 /sbin/ipfw -q flush > /dev/null 2>&1 61 if [ $? = 0 ] ; then 62 firewall_in_kernel=1 63 else 64 firewall_in_kernel=0 65 fi 66 67 if [ $firewall_in_kernel = 0 -a "x$firewall_enable" = "xYES" ] ; then 68 modload /lkm/ipfw_mod.o 69 if [ $? = 0 ]; then 70 firewall_in_kernel=1 # module loaded successfully 71 echo "Kernel firewall module loaded." 72 else 73 echo "Warning: firewall kernel module failed to load." 74 fi 75 fi 76 77 # Load the filters if required 78 if [ $firewall_in_kernel = 1 ]; then 79 if [ -n "$firewall_enable" -a -f /etc/rc.firewall -a \ 80 "x$firewall_enable" = "xYES" ] ; then 81 . /etc/rc.firewall 82 echo "Firewall rules loaded." 83 else 84 IPFW_DEFAULT=`ipfw l 65535` 85 if [ "$IPFW_DEFAULT" = "65535 deny ip from any to any" ]; then 86 echo -n "Warning: kernel has firewall functionality, " 87 echo "but firewall rules are not enabled." 88 echo " All ip services are disabled." 89 fi 90 fi 91 fi 92 93 # Configure routing 94 95 if [ "x$defaultrouter" != "xNO" ] ; then 96 static_routes="default ${static_routes}" 97 route_default="default ${defaultrouter}" 98 fi 99 100 # Set up any static routes. This should be done before router discovery. 101 if [ "x${static_routes}" != "x" ]; then 102 for i in ${static_routes}; do 103 eval route_args=\$route_${i} 104 route add ${route_args} 105 done 106 fi 107 108 echo -n 'Additional routing options:' 109 if [ -n "$tcp_extensions" -a "x$tcp_extensions" != "xYES" ] ; then 110 echo -n ' tcp extensions=NO' 111 sysctl -w net.inet.tcp.rfc1323=0 >/dev/null 2>&1 112 sysctl -w net.inet.tcp.rfc1644=0 >/dev/null 2>&1 113 fi 114 115 if [ "X$gateway_enable" = X"YES" ]; then 116 echo -n ' IP gateway=YES' 117 sysctl -w net.inet.ip.forwarding=1 >/dev/null 2>&1 118 fi 119 120 if [ "X$forward_sourceroute" = X"YES" ]; then 121 echo -n ' do source routing=YES' 122 sysctl -w net.inet.ip.sourceroute=1 >/dev/null 2>&1 123 fi 124 125 if [ "X$accept_sourceroute" = X"YES" ]; then 126 echo -n ' accept source routing=YES' 127 sysctl -w net.inet.ip.accept_sourceroute=1 >/dev/null 2>&1 128 fi 129 130 if [ "X$router_enable" = X"YES" ]; then 131 echo -n " ${router}"; ${router} ${router_flags} 132 fi 133 134 if [ "X$ipxgateway_enable" = X"YES" ]; then 135 echo -n ' IPX gateway=YES' 136 sysctl -w net.ipx.ipx.ipxforwarding=1 >/dev/null 2>&1 137 fi 138 139 if [ "X$ipxrouted_enable" = X"YES" ]; then 140 echo -n ' IPXrouted: ' 141 IPXrouted ${ipxrouted_flags} > /dev/null 2>&1 142 fi 143 144 if [ "X$arpproxy_all" = X"YES" ]; then 145 echo -n ' enabling ARP_PROXY_ALL: ' 146 sysctl -w net.link.ether.inet.proxyall=1 2>&1 147 fi 148 echo '.' 149 network_pass1_done=YES # Let future generations know we made it. 150} 151 152network_pass2() { 153 echo -n 'Doing additional network setup:' 154 if [ "X${named_enable}" = X"YES" ]; then 155 echo -n ' named'; ${named_program-"named"} ${named_flags} 156 fi 157 158 if [ "X${ntpdate_enable}" = X"YES" ]; then 159 echo -n ' ntpdate'; ntpdate ${ntpdate_flags} >/dev/null 2>&1 160 fi 161 162 if [ "X${xntpd_enable}" = X"YES" ]; then 163 echo -n ' xntpd'; xntpd ${xntpd_flags} 164 fi 165 166 if [ "X${timed_enable}" = X"YES" ]; then 167 echo -n ' timed'; timed ${timed_flags} 168 fi 169 170 if [ "X${portmap_enable}" = X"YES" ]; then 171 echo -n ' portmap'; portmap ${portmap_flags} 172 fi 173 174 # Start ypserv if we're an NIS server. 175 # Run rpc.ypxfrd and rpc.yppasswdd only on the NIS master server. 176 if [ "X${nis_server_enable}" = X"YES" ]; then 177 echo -n ' ypserv'; ypserv ${nis_server_flags} 178 179 if [ "X${nis_ypxfrd_enable}" = X"YES" ]; then 180 echo -n ' rpc.ypxfrd'; rpc.ypxfrd ${nis_ypxfrd_flags} 181 fi 182 183 if [ "X${nis_yppasswdd_enable}" = X"YES" ]; then 184 echo -n ' rpc.yppasswdd'; rpc.yppasswdd ${nis_yppasswdd_flags} 185 fi 186 fi 187 188 # Start ypbind if we're an NIS client 189 if [ "X${nis_client_enable}" = X"YES" ]; then 190 echo -n ' ypbind'; ypbind ${nis_client_flags} 191 if [ "X${nis_ypset_enable}" = X"YES" ]; then 192 echo -n ' ypset'; ypset ${nis_ypset_flags} 193 fi 194 fi 195 196 echo '.' 197 network_pass2_done=YES 198} 199 200network_pass3() { 201 echo -n 'Starting final network daemons:' 202 203 if [ "X${nfs_server_enable}" = X"YES" -a -r /etc/exports ]; then 204 echo -n ' mountd' 205 if [ "X${weak_mountd_authentication}" = X"YES" ]; then 206 mountd_flags="-n" 207 fi 208 mountd ${mountd_flags} 209 if [ "X${nfs_reserved_port_only}" = X"YES" ]; then 210 echo -n ' nfsprivport=YES' 211 sysctl -w vfs.nfs.nfs_privport=1 >/dev/null 2>&1 212 fi 213 echo -n ' nfsd'; nfsd ${nfs_server_flags} 214 if [ "X$rpc_lockd_enable" = X"YES" ]; then 215 echo -n ' rpc.lockd'; rpc.lockd 216 fi 217 if [ "X$rpc_statd_enable" = X"YES" ]; then 218 echo -n ' rpc.statd'; rpc.statd 219 fi 220 fi 221 222 if [ "X${nfs_client_enable}" = X"YES" ]; then 223 echo -n ' nfsiod'; nfsiod ${nfs_client_flags} 224 fi 225 226 if [ "X${amd_enable}" = X"YES" ]; then 227 echo -n ' amd' 228 amd -p ${amd_flags} > /var/run/amd.pid 2> /dev/null 229 fi 230 231 if [ "X${rwhod_enable}" = X"YES" ]; then 232 echo -n ' rwhod'; rwhod 233 fi 234 235 # Kerberos runs ONLY on the Kerberos server machine 236 if [ "X${kerberos_server_enable}" = X"YES" ]; then 237 if [ "X${kerberos_stash}" = "XYES" ]; then 238 stash_flag=-n 239 else 240 stash_flag= 241 fi 242 echo -n ' kerberos'; \ 243 kerberos ${stash_flags} >> /var/log/kerberos.log & 244 if [ "X${kadmind_server_enable}" = "XYES" ]; then 245 echo -n ' kadmind'; \ 246 (sleep 20; kadmind ${stash_flags} >/dev/null 2>&1 &) & 247 fi 248 unset stash_flag 249 fi 250 251 # IP multicast routing daemon 252 if [ "X${mrouted_enable}" = X"YES" ]; then 253 echo -n ' mrouted'; mrouted ${mrouted_flags} 254 fi 255 echo '.' 256 network_pass3_done=YES 257} 258