mirror of
https://github.com/fwbuilder/fwbuilder
synced 2026-03-18 17:27:20 +01:00
minor refactoring in NATCompiler::ExpandMultipleAddresses::processNext to include SDNAT rules; rerun tests
This commit is contained in:
parent
3ff086ecc1
commit
83646b91fa
@ -343,31 +343,43 @@ bool NATCompiler::ExpandMultipleAddresses::processNext()
|
||||
tmp_queue.push_back(rule);
|
||||
|
||||
RuleElement *rel;
|
||||
if (rule->getRuleType()==NATRule::NONAT ||
|
||||
rule->getRuleType()==NATRule::Return)
|
||||
|
||||
switch (rule->getRuleType())
|
||||
{
|
||||
case NATRule::NONAT:
|
||||
case NATRule::Return:
|
||||
{
|
||||
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
break;
|
||||
}
|
||||
if (rule->getRuleType()==NATRule::SNAT)
|
||||
|
||||
case NATRule::SNAT:
|
||||
case NATRule::SDNAT:
|
||||
{
|
||||
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
rel=rule->getTDst(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
break;
|
||||
}
|
||||
if (rule->getRuleType()==NATRule::DNAT)
|
||||
|
||||
case NATRule::DNAT:
|
||||
{
|
||||
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
rel=rule->getTDst(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
break;
|
||||
}
|
||||
if (rule->getRuleType()==NATRule::Redirect)
|
||||
|
||||
case NATRule::Redirect:
|
||||
{
|
||||
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
|
||||
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
|
||||
break;
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:57 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall.fw ipfw.fw
|
||||
#
|
||||
@ -81,7 +81,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:57 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall1.fw
|
||||
#
|
||||
@ -83,7 +83,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2.fw
|
||||
#
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall33.fw
|
||||
#
|
||||
@ -163,7 +163,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
@ -221,39 +221,40 @@ prolog_commands
|
||||
"$IPFW" add 220 set 1 permit all from any to any keep-state || exit 1
|
||||
#
|
||||
# Rule 8 (global)
|
||||
"$IPFW" add 230 set 1 skipto 340 all from any to 74.125.19.99 || exit 1
|
||||
"$IPFW" add 240 set 1 skipto 340 all from any to 74.125.19.103 || exit 1
|
||||
"$IPFW" add 250 set 1 skipto 340 all from any to 74.125.19.104 || exit 1
|
||||
"$IPFW" add 260 set 1 skipto 340 all from any to 74.125.19.147 || exit 1
|
||||
"$IPFW" add 270 set 1 skipto 340 all from any to 157.166.224.25 || exit 1
|
||||
"$IPFW" add 280 set 1 skipto 340 all from any to 157.166.224.26 || exit 1
|
||||
"$IPFW" add 290 set 1 skipto 340 all from any to 157.166.226.25 || exit 1
|
||||
"$IPFW" add 300 set 1 skipto 340 all from any to 157.166.226.26 || exit 1
|
||||
"$IPFW" add 310 set 1 skipto 340 all from any to 157.166.255.18 || exit 1
|
||||
"$IPFW" add 320 set 1 skipto 340 all from any to 157.166.255.19 || exit 1
|
||||
"$IPFW" add 330 set 1 permit all from any to any keep-state || exit 1
|
||||
"$IPFW" add 230 set 1 skipto 350 all from any to 74.125.224.48 || exit 1
|
||||
"$IPFW" add 240 set 1 skipto 350 all from any to 74.125.224.49 || exit 1
|
||||
"$IPFW" add 250 set 1 skipto 350 all from any to 74.125.224.50 || exit 1
|
||||
"$IPFW" add 260 set 1 skipto 350 all from any to 74.125.224.51 || exit 1
|
||||
"$IPFW" add 270 set 1 skipto 350 all from any to 74.125.224.52 || exit 1
|
||||
"$IPFW" add 280 set 1 skipto 350 all from any to 157.166.224.25 || exit 1
|
||||
"$IPFW" add 290 set 1 skipto 350 all from any to 157.166.224.26 || exit 1
|
||||
"$IPFW" add 300 set 1 skipto 350 all from any to 157.166.226.25 || exit 1
|
||||
"$IPFW" add 310 set 1 skipto 350 all from any to 157.166.226.26 || exit 1
|
||||
"$IPFW" add 320 set 1 skipto 350 all from any to 157.166.255.18 || exit 1
|
||||
"$IPFW" add 330 set 1 skipto 350 all from any to 157.166.255.19 || exit 1
|
||||
"$IPFW" add 340 set 1 permit all from any to any keep-state || exit 1
|
||||
#
|
||||
# Rule 9 (global)
|
||||
"$IPFW" add 340 set 1 skipto 370 all from any to www.google.com || exit 1
|
||||
"$IPFW" add 350 set 1 skipto 370 all from any to www.cnn.com || exit 1
|
||||
"$IPFW" add 360 set 1 permit all from any to any keep-state || exit 1
|
||||
"$IPFW" add 350 set 1 skipto 380 all from any to www.google.com || exit 1
|
||||
"$IPFW" add 360 set 1 skipto 380 all from any to www.cnn.com || exit 1
|
||||
"$IPFW" add 370 set 1 permit all from any to any keep-state || exit 1
|
||||
#
|
||||
# Rule 10 (global)
|
||||
"$IPFW" add 370 set 1 skipto 450 all from any to www.google.com || exit 1
|
||||
"$IPFW" add 380 set 1 skipto 450 all from any to 157.166.224.25 || exit 1
|
||||
"$IPFW" add 390 set 1 skipto 450 all from any to 157.166.224.26 || exit 1
|
||||
"$IPFW" add 400 set 1 skipto 450 all from any to 157.166.226.25 || exit 1
|
||||
"$IPFW" add 410 set 1 skipto 450 all from any to 157.166.226.26 || exit 1
|
||||
"$IPFW" add 420 set 1 skipto 450 all from any to 157.166.255.18 || exit 1
|
||||
"$IPFW" add 430 set 1 skipto 450 all from any to 157.166.255.19 || exit 1
|
||||
"$IPFW" add 440 set 1 permit all from any to any keep-state || exit 1
|
||||
"$IPFW" add 380 set 1 skipto 460 all from any to www.google.com || exit 1
|
||||
"$IPFW" add 390 set 1 skipto 460 all from any to 157.166.224.25 || exit 1
|
||||
"$IPFW" add 400 set 1 skipto 460 all from any to 157.166.224.26 || exit 1
|
||||
"$IPFW" add 410 set 1 skipto 460 all from any to 157.166.226.25 || exit 1
|
||||
"$IPFW" add 420 set 1 skipto 460 all from any to 157.166.226.26 || exit 1
|
||||
"$IPFW" add 430 set 1 skipto 460 all from any to 157.166.255.18 || exit 1
|
||||
"$IPFW" add 440 set 1 skipto 460 all from any to 157.166.255.19 || exit 1
|
||||
"$IPFW" add 450 set 1 permit all from any to any keep-state || exit 1
|
||||
#
|
||||
# Rule 11 (global)
|
||||
"$IPFW" add 450 set 1 drop log all from any to any || exit 1
|
||||
"$IPFW" add 460 set 1 drop log all from any to any || exit 1
|
||||
#
|
||||
# Rule fallback rule
|
||||
# fallback rule
|
||||
"$IPFW" add 460 set 1 drop all from any to any || exit 1
|
||||
"$IPFW" add 470 set 1 drop all from any to any || exit 1
|
||||
|
||||
epilog_commands
|
||||
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall34.fw
|
||||
#
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall4.fw
|
||||
#
|
||||
@ -80,7 +80,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall7.fw
|
||||
#
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall8.fw
|
||||
#
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall9.fw
|
||||
#
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
|
||||
#
|
||||
# files: * host.fw
|
||||
#
|
||||
@ -79,7 +79,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipfw v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:17:59 2011 PST by vadim
|
||||
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
|
||||
#
|
||||
# files: * mac.fw
|
||||
#
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:17:59 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -2123,7 +2123,7 @@
|
||||
<ClusterGroupOptions/>
|
||||
</StateSyncClusterGroup>
|
||||
</Cluster>
|
||||
<Cluster id="id3433X13311" host_OS="linux24" inactive="False" lastCompiled="1265516307" lastInstalled="0" lastModified="1272731835" platform="iptables" name="heartbeat_cluster_1" comment="This is an example of linux/heartbeat cluster with two policy rule sets. Branching rule in the top policy passes control to rule set to_fw, which is different in member firewalls. See ticket #372 for explanation. " ro="False">
|
||||
<Cluster id="id3433X13311" host_OS="linux24" inactive="False" lastCompiled="1265516307" lastInstalled="0" lastModified="1294434730" platform="iptables" name="heartbeat_cluster_1" comment="This is an example of linux/heartbeat cluster with two policy rule sets. Branching rule in the top policy passes control to rule set to_fw, which is different in member firewalls. See ticket #372 for explanation. " ro="False">
|
||||
<NAT id="id3587X13311" name="NAT" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
|
||||
<NATRule id="id5131X78768" disabled="False" position="0" action="Translate" comment="">
|
||||
<OSrc neg="False">
|
||||
@ -2167,6 +2167,48 @@
|
||||
</TSrv>
|
||||
<NATRuleOptions/>
|
||||
</NATRule>
|
||||
<NATRule id="id108371X21712" disabled="False" group="" position="2" action="Translate" comment="">
|
||||
<OSrc neg="False">
|
||||
<ObjectRef ref="sysid0"/>
|
||||
</OSrc>
|
||||
<ODst neg="False">
|
||||
<ObjectRef ref="id3441X13311"/>
|
||||
</ODst>
|
||||
<OSrv neg="False">
|
||||
<ServiceRef ref="tcp-SSH"/>
|
||||
</OSrv>
|
||||
<TSrc neg="False">
|
||||
<ObjectRef ref="sysid0"/>
|
||||
</TSrc>
|
||||
<TDst neg="False">
|
||||
<ObjectRef ref="id99608X66859"/>
|
||||
</TDst>
|
||||
<TSrv neg="False">
|
||||
<ServiceRef ref="sysid1"/>
|
||||
</TSrv>
|
||||
<NATRuleOptions/>
|
||||
</NATRule>
|
||||
<NATRule id="id323007X21712" disabled="False" group="" position="3" action="Translate" comment="">
|
||||
<OSrc neg="False">
|
||||
<ObjectRef ref="sysid0"/>
|
||||
</OSrc>
|
||||
<ODst neg="False">
|
||||
<ObjectRef ref="id3448X13311"/>
|
||||
</ODst>
|
||||
<OSrv neg="False">
|
||||
<ServiceRef ref="tcp-SSH"/>
|
||||
</OSrv>
|
||||
<TSrc neg="False">
|
||||
<ObjectRef ref="sysid0"/>
|
||||
</TSrc>
|
||||
<TDst neg="False">
|
||||
<ObjectRef ref="id99608X66859"/>
|
||||
</TDst>
|
||||
<TSrv neg="False">
|
||||
<ServiceRef ref="sysid1"/>
|
||||
</TSrv>
|
||||
<NATRuleOptions/>
|
||||
</NATRule>
|
||||
<RuleSetOptions/>
|
||||
</NAT>
|
||||
<Policy id="id3465X13311" name="Policy" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
|
||||
@ -2993,7 +3035,7 @@
|
||||
</RoutingRule>
|
||||
<RuleSetOptions/>
|
||||
</Routing>
|
||||
<Interface id="id3441X13311" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
|
||||
<Interface id="id3441X13311" dedicated_failover="False" dyn="False" label="hb_cluster_1:eth0" mgmt="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
|
||||
<IPv4 id="id3448X13311" name="heartbeat_cluster_1:eth0:ip" comment="" ro="False" address="172.24.0.1" netmask="255.255.0.0"/>
|
||||
<InterfaceOptions>
|
||||
<Option name="enable_stp">False</Option>
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
|
||||
#
|
||||
# files: * cluster1_secuwall-1.fw
|
||||
#
|
||||
@ -588,7 +588,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
|
||||
log "Database was cluster-tests.fwb"
|
||||
check_tools
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:38 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:18 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-base-rulesets.fw
|
||||
#
|
||||
@ -445,7 +445,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:38 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:18 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:43 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:24 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-1.fw
|
||||
#
|
||||
@ -687,7 +687,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:43 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:24 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:49 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:30 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-2.fw
|
||||
#
|
||||
@ -930,7 +930,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:49 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:30 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:55 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:36 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-3.fw
|
||||
#
|
||||
@ -592,7 +592,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:55 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:36 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:07 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:47 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-4-1.fw
|
||||
#
|
||||
@ -539,7 +539,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:07 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:47 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:00 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:41 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-4.fw
|
||||
#
|
||||
@ -577,7 +577,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:00 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:09 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:50 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-5.fw
|
||||
#
|
||||
@ -412,7 +412,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:09 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:50 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:12 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:52 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-6.fw
|
||||
#
|
||||
@ -399,7 +399,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:12 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:52 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:15 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:55 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-7.fw
|
||||
#
|
||||
@ -443,7 +443,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:15 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:55 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:18 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-8.fw
|
||||
#
|
||||
@ -484,7 +484,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:18 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:58 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:20 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:01 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-ipt-reset-prolog-after-flush.fw
|
||||
#
|
||||
@ -450,7 +450,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:20 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:01 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:04 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-ipt-reset-prolog-after-interfaces.fw
|
||||
#
|
||||
@ -450,7 +450,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:04 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:26 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:06 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-ipt-reset-prolog-top.fw
|
||||
#
|
||||
@ -450,7 +450,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:26 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:06 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:29 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:09 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-prolog-after-flush.fw
|
||||
#
|
||||
@ -420,7 +420,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:29 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:09 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:31 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:12 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-prolog-after-interfaces.fw
|
||||
#
|
||||
@ -420,7 +420,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:31 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:12 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:14 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-prolog-top.fw
|
||||
#
|
||||
@ -420,7 +420,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:14 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:36 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:16 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-server-1-s.fw
|
||||
#
|
||||
@ -393,7 +393,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:36 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:16 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:06 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:46 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall.fw
|
||||
#
|
||||
@ -1341,7 +1341,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:06 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:46 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:09 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:50 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall1.fw
|
||||
#
|
||||
@ -1252,7 +1252,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:09 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:50 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:11 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:52 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10.fw
|
||||
#
|
||||
@ -473,7 +473,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:11 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:52 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:14 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:54 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall11.fw
|
||||
#
|
||||
@ -589,7 +589,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:14 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:54 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:16 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:56 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall12.fw
|
||||
#
|
||||
@ -511,7 +511,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:16 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:56 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:18 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall13.fw
|
||||
#
|
||||
@ -385,7 +385,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:18 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:58 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:20 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:00 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall14.fw
|
||||
#
|
||||
@ -404,7 +404,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:20 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:00 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:22 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:03 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall15.fw
|
||||
#
|
||||
@ -388,7 +388,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:22 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:03 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:24 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:05 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall16.fw
|
||||
#
|
||||
@ -492,7 +492,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:24 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:05 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:26 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:07 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall17.fw
|
||||
#
|
||||
@ -471,7 +471,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:26 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:07 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:29 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:09 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall18.fw
|
||||
#
|
||||
@ -504,7 +504,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:29 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:09 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:31 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:11 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall19.fw
|
||||
#
|
||||
@ -509,7 +509,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:31 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:11 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:44 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:24 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-1.fw
|
||||
#
|
||||
@ -1420,7 +1420,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:44 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:24 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:51 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:32 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-2.fw
|
||||
#
|
||||
@ -1249,7 +1249,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:51 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:32 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:56 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:37 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-3.fw
|
||||
#
|
||||
@ -1120,7 +1120,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:56 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:37 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:03 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:43 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-4.fw
|
||||
#
|
||||
@ -424,7 +424,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:03 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:43 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:08 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:48 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-5.fw
|
||||
#
|
||||
@ -453,7 +453,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:08 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:48 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:15 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2.fw
|
||||
#
|
||||
@ -1470,7 +1470,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:15 2011 by vadim"
|
||||
check_tools
|
||||
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:39 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:19 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall20-ipv6.fw
|
||||
#
|
||||
@ -456,7 +456,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:39 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:19 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:36 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:17 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall20.fw
|
||||
#
|
||||
@ -674,7 +674,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:36 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:17 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:46 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:27 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall21-1.fw
|
||||
#
|
||||
@ -470,7 +470,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:46 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:27 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:41 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:21 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall21.fw
|
||||
#
|
||||
@ -469,7 +469,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:41 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:21 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:48 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:29 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall22.fw
|
||||
#
|
||||
@ -390,7 +390,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:48 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:29 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:39 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall23-1.fw
|
||||
#
|
||||
@ -564,7 +564,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:39 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:51:53 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:34 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall23.fw
|
||||
#
|
||||
@ -476,7 +476,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:51:53 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:34 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:01 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:41 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall24.fw
|
||||
#
|
||||
@ -493,7 +493,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:01 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:06 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:46 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall25.fw
|
||||
#
|
||||
@ -687,7 +687,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:06 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:46 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:10 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:51 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall26.fw
|
||||
#
|
||||
@ -562,7 +562,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:10 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:51 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:12 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:53 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall27.fw
|
||||
#
|
||||
@ -546,7 +546,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:12 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:53 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:15 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:55 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall28.fw
|
||||
#
|
||||
@ -407,7 +407,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:15 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:55 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:17 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:57 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall29.fw
|
||||
#
|
||||
@ -440,7 +440,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:17 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:57 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:19 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:20:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall3.fw
|
||||
#
|
||||
@ -578,7 +578,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:19 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:20:59 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:21 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:02 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall30.fw
|
||||
#
|
||||
@ -375,7 +375,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:21 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:02 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:04 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall31.fw
|
||||
#
|
||||
@ -445,7 +445,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:04 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:25 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:06 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall32.fw
|
||||
#
|
||||
@ -416,7 +416,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:25 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:06 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:33 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:14 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall33-1.fw
|
||||
#
|
||||
@ -393,10 +393,11 @@ script_body() {
|
||||
#
|
||||
$IPTABLES -N Cid438728A918346.0
|
||||
$IPTABLES -A Policy -m state --state NEW -j Cid438728A918346.0
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.99 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.103 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.104 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.147 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.48 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.49 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.50 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.51 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.52 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.25 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.26 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.226.25 -j RETURN
|
||||
@ -521,7 +522,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:33 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:14 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:29 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:10 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall33.fw
|
||||
#
|
||||
@ -442,10 +442,11 @@ script_body() {
|
||||
$IPTABLES -A OUTPUT -m state --state NEW -j Cid438728A918346.0
|
||||
$IPTABLES -A INPUT -m state --state NEW -j Cid438728A918346.0
|
||||
$IPTABLES -A FORWARD -m state --state NEW -j Cid438728A918346.0
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.99 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.103 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.104 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.147 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.48 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.49 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.50 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.51 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.52 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.25 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.26 -j RETURN
|
||||
$IPTABLES -A Cid438728A918346.0 -d 157.166.226.25 -j RETURN
|
||||
@ -570,7 +571,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:29 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:10 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:36 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:16 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall34.fw
|
||||
#
|
||||
@ -636,7 +636,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:36 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:16 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:39 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:19 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall35.fw
|
||||
#
|
||||
@ -540,7 +540,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:39 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:19 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:43 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:23 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall36-1.fw
|
||||
#
|
||||
@ -433,7 +433,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:43 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:23 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:45 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:25 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall36-2.fw
|
||||
#
|
||||
@ -433,7 +433,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:45 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:25 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:41 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:21 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall36.fw
|
||||
#
|
||||
@ -535,7 +535,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:41 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:21 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:52 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:32 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall37-1.fw
|
||||
#
|
||||
@ -769,7 +769,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:52 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:32 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:49 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:30 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall37.fw
|
||||
#
|
||||
@ -1049,7 +1049,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:49 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:30 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:52:54 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:34 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall38.fw
|
||||
#
|
||||
@ -498,7 +498,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:52:54 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:34 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:00 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:41 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall39.fw
|
||||
#
|
||||
@ -876,7 +876,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:00 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:03 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:43 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall4.fw
|
||||
#
|
||||
@ -710,7 +710,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:03 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:43 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:07 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:48 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall40-1.fw
|
||||
#
|
||||
@ -450,7 +450,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:07 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:48 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:10 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:50 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall40-2.fw
|
||||
#
|
||||
@ -437,7 +437,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:10 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:50 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:05 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:46 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall40.fw
|
||||
#
|
||||
@ -439,7 +439,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:05 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:46 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:19 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:00 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall41-1.fw
|
||||
#
|
||||
@ -575,7 +575,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:19 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:00 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:21 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:02 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall41-2.fw
|
||||
#
|
||||
@ -483,7 +483,7 @@ status_action() {
|
||||
}
|
||||
|
||||
start() {
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:21 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:02 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:17 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:21:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall41.fw
|
||||
#
|
||||
@ -456,7 +456,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:17 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:21:58 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:04 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall42.fw
|
||||
#
|
||||
@ -382,7 +382,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:04 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:26 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:06 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall5.fw
|
||||
#
|
||||
@ -622,7 +622,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:26 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:06 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:28 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:09 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall50.fw
|
||||
#
|
||||
@ -407,7 +407,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:28 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:09 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:32 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:13 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall51.fw
|
||||
#
|
||||
@ -491,7 +491,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:32 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:13 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:15 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall6.fw
|
||||
#
|
||||
@ -513,7 +513,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:15 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:36 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:17 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall60.fw
|
||||
#
|
||||
@ -419,7 +419,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:36 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:17 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:39 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:20 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall61-1.2.5.fw
|
||||
#
|
||||
@ -499,7 +499,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:39 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:20 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:22 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall61-1.2.6.fw
|
||||
#
|
||||
@ -505,7 +505,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:22 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:45 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:25 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall61-1.3.x.fw
|
||||
#
|
||||
@ -492,7 +492,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:45 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:25 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:47 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:28 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall61-1.4.fw
|
||||
#
|
||||
@ -493,7 +493,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:47 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:28 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:50 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:30 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall62.fw
|
||||
#
|
||||
@ -543,7 +543,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:50 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:30 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:52 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:32 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall63.fw
|
||||
#
|
||||
@ -389,7 +389,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:52 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:32 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:54 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:35 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall7.fw
|
||||
#
|
||||
@ -473,7 +473,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:54 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:35 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:57 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:37 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall70.fw iptables.sh
|
||||
#
|
||||
@ -412,7 +412,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:57 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:37 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:53:59 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:40 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall71.fw
|
||||
#
|
||||
@ -428,7 +428,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:53:59 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:40 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:01 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:42 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall72-1.3.x.fw
|
||||
#
|
||||
@ -555,7 +555,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:01 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:42 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:04 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:44 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall72-1.4.3.fw
|
||||
#
|
||||
@ -555,7 +555,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:04 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:44 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:06 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:47 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall73.fw
|
||||
#
|
||||
@ -523,7 +523,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:06 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:47 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:08 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:49 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall74.fw
|
||||
#
|
||||
@ -375,7 +375,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:08 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:49 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:10 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:51 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall8.fw
|
||||
#
|
||||
@ -358,7 +358,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:10 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:51 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:12 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:53 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall80.fw
|
||||
#
|
||||
@ -399,7 +399,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:12 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:53 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:15 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:56 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall81.fw
|
||||
#
|
||||
@ -419,7 +419,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:15 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:56 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:18 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:22:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall82.fw
|
||||
#
|
||||
@ -414,7 +414,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:18 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:22:59 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:20 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:01 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall82_A.fw
|
||||
#
|
||||
@ -406,7 +406,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:20 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:01 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:03 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall82_B.fw
|
||||
#
|
||||
@ -363,7 +363,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:03 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:25 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:06 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall9.fw
|
||||
#
|
||||
@ -633,7 +633,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:25 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:06 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:27 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:08 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall90.fw
|
||||
#
|
||||
@ -383,7 +383,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:27 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:08 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:29 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:10 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall91.fw
|
||||
#
|
||||
@ -383,7 +383,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:29 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:10 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:32 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:12 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall92.fw
|
||||
#
|
||||
@ -419,7 +419,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:32 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:12 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:54:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:23:15 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall93.fw
|
||||
#
|
||||
@ -458,7 +458,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:54:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:23:15 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:40 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:21 2011 PST by vadim
|
||||
#
|
||||
# files: * fw-A.fw
|
||||
#
|
||||
@ -722,7 +722,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:40 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:21 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:38 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:19 2011 PST by vadim
|
||||
#
|
||||
# files: * fw1.fw
|
||||
#
|
||||
@ -519,7 +519,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:38 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:19 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:40 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_1_d_linux-1-d.fw firewall.sh
|
||||
#
|
||||
@ -720,7 +720,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:40 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:40 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_1_d_linux-2-d.fw firewall.sh
|
||||
#
|
||||
@ -723,7 +723,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:40 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_1_linux-1.fw
|
||||
#
|
||||
@ -412,6 +412,18 @@ script_body() {
|
||||
echo "Rule 1 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
#
|
||||
echo "Rule 2 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
#
|
||||
echo "Rule 3 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
|
||||
|
||||
|
||||
@ -831,7 +843,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_1_linux-2.fw
|
||||
#
|
||||
@ -317,6 +317,18 @@ script_body() {
|
||||
echo "Rule 1 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
#
|
||||
echo "Rule 2 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
#
|
||||
echo "Rule 3 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
|
||||
|
||||
|
||||
@ -729,7 +741,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_2_linux-1.fw
|
||||
#
|
||||
@ -707,7 +707,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
|
||||
#
|
||||
# files: * heartbeat_cluster_2_linux-2.fw
|
||||
#
|
||||
@ -620,7 +620,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:43 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:23 2011 PST by vadim
|
||||
#
|
||||
# files: * host.fw
|
||||
#
|
||||
@ -422,7 +422,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:43 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:23 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:45 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:25 2011 PST by vadim
|
||||
#
|
||||
# files: * ipcop1.fw
|
||||
#
|
||||
|
||||
905
test/ipt/linux-1.fw.orig
Executable file
905
test/ipt/linux-1.fw.orig
Executable file
@ -0,0 +1,905 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# This is automatically generated file. DO NOT MODIFY !
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Fri Jan 7 13:12:17 2011 PST by vadim
|
||||
#
|
||||
# files: * linux-1.fw
|
||||
#
|
||||
# Compiled for iptables (any version)
|
||||
#
|
||||
#
|
||||
|
||||
# linux-1:to_fw:: warning: ignoring cluster rule set "to_fw" because member firewall "linux-1" has rule set with the same name.
|
||||
|
||||
|
||||
FWBDEBUG=""
|
||||
|
||||
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
|
||||
export PATH
|
||||
|
||||
|
||||
|
||||
LSMOD="/sbin/lsmod"
|
||||
MODPROBE="/sbin/modprobe"
|
||||
IPTABLES="/sbin/iptables"
|
||||
IP6TABLES="/sbin/ip6tables"
|
||||
IPTABLES_RESTORE="/sbin/iptables-restore"
|
||||
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
|
||||
IP="/sbin/ip"
|
||||
IFCONFIG="/sbin/ifconfig"
|
||||
VCONFIG="/sbin/vconfig"
|
||||
BRCTL="/sbin/brctl"
|
||||
IFENSLAVE="/sbin/ifenslave"
|
||||
IPSET="/usr/sbin/ipset"
|
||||
LOGGER="/usr/bin/logger"
|
||||
|
||||
log() {
|
||||
echo "$1"
|
||||
test -x "$LOGGER" && $LOGGER -p info "$1"
|
||||
}
|
||||
|
||||
getInterfaceVarName() {
|
||||
echo $1 | sed 's/\./_/'
|
||||
}
|
||||
|
||||
getaddr_internal() {
|
||||
dev=$1
|
||||
name=$2
|
||||
af=$3
|
||||
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
|
||||
test -z "$L" && {
|
||||
eval "$name=''"
|
||||
return
|
||||
}
|
||||
eval "${name}_list=\"$L\""
|
||||
}
|
||||
|
||||
getaddr() {
|
||||
getaddr_internal $1 $2 "-4"
|
||||
}
|
||||
|
||||
getaddr6() {
|
||||
getaddr_internal $1 $2 "-6"
|
||||
}
|
||||
|
||||
# function getinterfaces is used to process wildcard interfaces
|
||||
getinterfaces() {
|
||||
NAME=$1
|
||||
$IP link show | grep ": $NAME" | while read L; do
|
||||
OIFS=$IFS
|
||||
IFS=" :"
|
||||
set $L
|
||||
IFS=$OIFS
|
||||
echo $2
|
||||
done
|
||||
}
|
||||
|
||||
diff_intf() {
|
||||
func=$1
|
||||
list1=$2
|
||||
list2=$3
|
||||
cmd=$4
|
||||
for intf in $list1
|
||||
do
|
||||
echo $list2 | grep -q $intf || {
|
||||
# $vlan is absent in list 2
|
||||
$func $intf $cmd
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
find_program() {
|
||||
PGM=$1
|
||||
$PGM </dev/null >/dev/null 2>&1; test $? = 127 && {
|
||||
echo "$PGM not found"
|
||||
exit 1
|
||||
}
|
||||
}
|
||||
check_tools() {
|
||||
find_program $IPTABLES
|
||||
find_program $MODPROBE
|
||||
find_program $IP
|
||||
find_program $VCONFIG
|
||||
}
|
||||
reset_iptables_v4() {
|
||||
$IPTABLES -P OUTPUT DROP
|
||||
$IPTABLES -P INPUT DROP
|
||||
$IPTABLES -P FORWARD DROP
|
||||
|
||||
cat /proc/net/ip_tables_names | while read table; do
|
||||
$IPTABLES -t $table -L -n | while read c chain rest; do
|
||||
if test "X$c" = "XChain" ; then
|
||||
$IPTABLES -t $table -F $chain
|
||||
fi
|
||||
done
|
||||
$IPTABLES -t $table -X
|
||||
done
|
||||
}
|
||||
|
||||
reset_iptables_v6() {
|
||||
$IP6TABLES -P OUTPUT DROP
|
||||
$IP6TABLES -P INPUT DROP
|
||||
$IP6TABLES -P FORWARD DROP
|
||||
|
||||
cat /proc/net/ip6_tables_names | while read table; do
|
||||
$IP6TABLES -t $table -L -n | while read c chain rest; do
|
||||
if test "X$c" = "XChain" ; then
|
||||
$IP6TABLES -t $table -F $chain
|
||||
fi
|
||||
done
|
||||
$IP6TABLES -t $table -X
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
P2P_INTERFACE_WARNING=""
|
||||
|
||||
missing_address() {
|
||||
address=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $address
|
||||
addr=$1
|
||||
interface=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
|
||||
|
||||
$IP addr show dev $interface | grep -q POINTOPOINT && {
|
||||
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
|
||||
P2P_INTERFACE_WARNING="yes"
|
||||
return
|
||||
}
|
||||
|
||||
test "$cmd" = "add" && {
|
||||
echo "# Adding ip address: $interface $addr"
|
||||
echo $addr | grep -q ':' && {
|
||||
$FWBDEBUG $IP addr $cmd $addr dev $interface
|
||||
} || {
|
||||
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
|
||||
}
|
||||
}
|
||||
|
||||
test "$cmd" = "del" && {
|
||||
echo "# Removing ip address: $interface $addr"
|
||||
$FWBDEBUG $IP addr $cmd $addr dev $interface
|
||||
}
|
||||
|
||||
$FWBDEBUG $IP link set $interface up
|
||||
}
|
||||
|
||||
list_addresses_by_scope() {
|
||||
interface=$1
|
||||
scope=$2
|
||||
ignore_list=$3
|
||||
$IP addr ls dev $interface | \
|
||||
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
|
||||
while read addr; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
}
|
||||
|
||||
|
||||
update_addresses_of_interface() {
|
||||
ignore_list=$2
|
||||
set $1
|
||||
interface=$1
|
||||
shift
|
||||
|
||||
FWB_ADDRS=$(
|
||||
for addr in $*; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
)
|
||||
|
||||
CURRENT_ADDRS_ALL_SCOPES=""
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=""
|
||||
|
||||
$IP link show dev $interface >/dev/null 2>&1 && {
|
||||
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
|
||||
} || {
|
||||
echo "# Interface $interface does not exist"
|
||||
# Stop the script if we are not in test mode
|
||||
test -z "$FWBDEBUG" && exit 1
|
||||
}
|
||||
|
||||
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
|
||||
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
|
||||
}
|
||||
|
||||
clear_addresses_except_known_interfaces() {
|
||||
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
|
||||
while read intf; do
|
||||
echo "# Removing addresses not configured in fwbuilder from interface $intf"
|
||||
$FWBDEBUG $IP addr flush dev $intf scope global
|
||||
$FWBDEBUG $IP link set $intf down
|
||||
done
|
||||
}
|
||||
missing_vlan() {
|
||||
vlan=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $vlan
|
||||
subint=$1
|
||||
parent=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
vlan_id=$(echo $subint | sed -r 's/(vlan|[^.]*\.)//')
|
||||
test "$cmd" = "add" && {
|
||||
echo $subint | grep -q "vlan" && name_type="VLAN_PLUS_VID" || name_type="DEV_PLUS_VID"
|
||||
test "$vlan_id" \< "1" || name_type="${name_type}_NO_PAD"
|
||||
echo "# Adding VLAN interface $subint (parent: $parent)"
|
||||
$FWBDEBUG $VCONFIG set_name_type $name_type
|
||||
$FWBDEBUG $VCONFIG $cmd $parent $vlan_id
|
||||
$FWBDEBUG $IP link set $subint up
|
||||
}
|
||||
test "$cmd" = "rem" && {
|
||||
echo "# Removing VLAN interface $subint (parent: $parent)"
|
||||
$FWBDEBUG $VCONFIG $cmd $subint
|
||||
}
|
||||
}
|
||||
|
||||
parse_fwb_vlans() {
|
||||
set $1
|
||||
vlan_parent_interface=$1
|
||||
shift
|
||||
|
||||
FWB_VLANS=$(
|
||||
for subint in $*; do
|
||||
echo "${subint}@$vlan_parent_interface"
|
||||
done | sort
|
||||
)
|
||||
echo $FWB_VLANS
|
||||
}
|
||||
|
||||
parse_current_vlans() {
|
||||
vlan_parent_interface=$1
|
||||
CURRENT_VLANS=""
|
||||
PROC_DIR="/proc/net/vlan/"
|
||||
test -d $PROC_DIR || $MODPROBE 8021q || {
|
||||
echo "$PROC_DIR does not exist. Vlan interfaces are not available."
|
||||
exit 1
|
||||
}
|
||||
|
||||
test -f "/proc/net/vlan/config" && {
|
||||
CURRENT_VLANS=$(
|
||||
cat /proc/net/vlan/config | grep -v 'Dev name' | grep $vlan_parent_interface | \
|
||||
while read subint a vlan_id b parent; do
|
||||
echo "${subint}@$parent"
|
||||
done | sort
|
||||
)
|
||||
}
|
||||
echo $CURRENT_VLANS
|
||||
}
|
||||
|
||||
update_vlans_of_interface() {
|
||||
args="$1"
|
||||
set $1
|
||||
vlan_parent_interface=$1
|
||||
|
||||
FWB_VLANS=$(parse_fwb_vlans "$args")
|
||||
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
|
||||
|
||||
$IP link set $vlan_parent_interface up
|
||||
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
|
||||
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
|
||||
}
|
||||
|
||||
add_vlans() {
|
||||
args="$1"
|
||||
set $1
|
||||
vlan_parent_interface=$1
|
||||
|
||||
FWB_VLANS=$(parse_fwb_vlans $args)
|
||||
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
|
||||
|
||||
$IP link set $vlan_parent_interface up
|
||||
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
|
||||
}
|
||||
|
||||
clear_vlans_except_known() {
|
||||
FWB_VLANS=$*
|
||||
CURRENT_VLANS=$(parse_current_vlans '|')
|
||||
|
||||
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
|
||||
}
|
||||
|
||||
check_file() {
|
||||
test -r "$2" || {
|
||||
echo "Can not find file $2 referenced by address table object $1"
|
||||
exit 1
|
||||
}
|
||||
}
|
||||
|
||||
check_run_time_address_table_files() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
load_modules() {
|
||||
:
|
||||
OPTS=$1
|
||||
MODULES_DIR="/lib/modules/`uname -r`/kernel/net/"
|
||||
MODULES=$(find $MODULES_DIR -name '*conntrack*' \! -name '*ipv6*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')
|
||||
echo $OPTS | grep -q nat && {
|
||||
MODULES="$MODULES $(find $MODULES_DIR -name '*nat*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
|
||||
}
|
||||
echo $OPTS | grep -q ipv6 && {
|
||||
MODULES="$MODULES $(find $MODULES_DIR -name nf_conntrack_ipv6|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
|
||||
}
|
||||
for module in $MODULES; do
|
||||
if $LSMOD | grep ${module} >/dev/null; then continue; fi
|
||||
$MODPROBE ${module} || exit 1
|
||||
done
|
||||
}
|
||||
|
||||
verify_interfaces() {
|
||||
:
|
||||
echo "Verifying interfaces: eth0 eth1 lo eth0.100"
|
||||
for i in eth0 eth1 lo eth0.100 ; do
|
||||
$IP link show "$i" > /dev/null 2>&1 || {
|
||||
log "Interface $i does not exist"
|
||||
exit 1
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
prolog_commands() {
|
||||
echo "Running prolog script"
|
||||
|
||||
}
|
||||
|
||||
epilog_commands() {
|
||||
echo "Running epilog script"
|
||||
|
||||
}
|
||||
|
||||
run_epilog_and_exit() {
|
||||
epilog_commands
|
||||
exit $1
|
||||
}
|
||||
|
||||
configure_interfaces() {
|
||||
:
|
||||
# Configure interfaces
|
||||
update_vlans_of_interface "eth0 eth0.100"
|
||||
clear_vlans_except_known eth0.100@eth0
|
||||
update_addresses_of_interface "eth0 172.24.0.2/16" "172.24.0.1/16"
|
||||
update_addresses_of_interface "eth1 192.168.1.2/24" "192.168.1.1/24"
|
||||
update_addresses_of_interface "lo 127.0.0.1/8" ""
|
||||
update_addresses_of_interface "eth0.100 192.168.100.1/24" ""
|
||||
}
|
||||
|
||||
script_body() {
|
||||
# ================ IPv4
|
||||
|
||||
|
||||
# ================ Table 'filter', automatic rules
|
||||
# accept established sessions
|
||||
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
|
||||
# ================ Table 'nat', rule set NAT
|
||||
#
|
||||
# Rule 0 (NAT)
|
||||
#
|
||||
echo "Rule 0 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 1 (NAT)
|
||||
#
|
||||
echo "Rule 1 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
#
|
||||
echo "Rule 2 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.2 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 192.168.100.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
#
|
||||
echo "Rule 3 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
|
||||
|
||||
|
||||
# ================ Table 'filter', rule set to_fw
|
||||
#
|
||||
# Rule to_fw 0 (global)
|
||||
#
|
||||
echo "Rule to_fw 0 (global)"
|
||||
#
|
||||
# hashlimit 10/sec
|
||||
$IPTABLES -N to_fw
|
||||
$IPTABLES -N to_fw_0
|
||||
$IPTABLES -A to_fw -m hashlimit --hashlimit 10/second --hashlimit-name htable_rule_0 -j to_fw_0
|
||||
$IPTABLES -A to_fw_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY "
|
||||
$IPTABLES -A to_fw_0 -j DROP
|
||||
# ================ Table 'filter', rule set Policy
|
||||
#
|
||||
# Rule -4 heartbeat (automatic)
|
||||
#
|
||||
echo "Rule -4 heartbeat (automatic)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j ACCEPT
|
||||
#
|
||||
# Rule -3 heartbeat (automatic)
|
||||
#
|
||||
echo "Rule -3 heartbeat (automatic)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i eth0 -p udp -m udp -s 172.24.0.3 -d 224.0.10.100 --dport 694 -j ACCEPT
|
||||
#
|
||||
# Rule -2 CONNTRACK (automatic)
|
||||
#
|
||||
echo "Rule -2 CONNTRACK (automatic)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
|
||||
#
|
||||
# Rule -1 CONNTRACK (automatic)
|
||||
#
|
||||
echo "Rule -1 CONNTRACK (automatic)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
|
||||
#
|
||||
# Rule 0 (eth0)
|
||||
#
|
||||
echo "Rule 0 (eth0)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -o eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 1 (eth0)
|
||||
#
|
||||
echo "Rule 1 (eth0)"
|
||||
#
|
||||
# anti spoofing rule
|
||||
$IPTABLES -N In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 172.24.0.2 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.2 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.100.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.2 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.2 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.100.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A In_RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY "
|
||||
$IPTABLES -A In_RULE_1 -j DROP
|
||||
#
|
||||
# Rule 2 (lo)
|
||||
#
|
||||
echo "Rule 2 (lo)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i lo -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -o lo -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 3 (global)
|
||||
#
|
||||
echo "Rule 3 (global)"
|
||||
#
|
||||
# SSH Access to firewall is permitted
|
||||
# only from internal network
|
||||
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 4 (global)
|
||||
#
|
||||
echo "Rule 4 (global)"
|
||||
#
|
||||
# SSH Access to firewall is permitted
|
||||
# only from internal network
|
||||
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 5 (global)
|
||||
#
|
||||
echo "Rule 5 (global)"
|
||||
#
|
||||
# Firewall uses one of the machines
|
||||
# on internal network for DNS
|
||||
$IPTABLES -N RULE_5
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
|
||||
$IPTABLES -A OUTPUT -p udp -m udp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
|
||||
$IPTABLES -A RULE_5 -j LOG --log-level info --log-prefix "RULE 5 -- ACCEPT "
|
||||
$IPTABLES -A RULE_5 -j ACCEPT
|
||||
#
|
||||
# Rule 6 (global)
|
||||
#
|
||||
echo "Rule 6 (global)"
|
||||
#
|
||||
# branch rule set is different in members linux-1 and linux-2
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
|
||||
$IPTABLES -A INPUT -j to_fw
|
||||
#
|
||||
# Rule 7 (global)
|
||||
#
|
||||
echo "Rule 7 (global)"
|
||||
#
|
||||
# branch rule set is different in members linux-1 and linux-2
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
|
||||
$IPTABLES -A INPUT -j to_fw
|
||||
#
|
||||
# Rule 8 (global)
|
||||
#
|
||||
echo "Rule 8 (global)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.1 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.2 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.1 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.2 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 192.168.100.1 -j DROP
|
||||
$IPTABLES -A INPUT -j DROP
|
||||
#
|
||||
# Rule 9 (global)
|
||||
#
|
||||
echo "Rule 9 (global)"
|
||||
#
|
||||
$IPTABLES -A INPUT -j DROP
|
||||
#
|
||||
# Rule 10 (global)
|
||||
#
|
||||
echo "Rule 10 (global)"
|
||||
#
|
||||
# fw is part of any
|
||||
$IPTABLES -N Cid997025X96143.0
|
||||
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid997025X96143.0
|
||||
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.2 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 11 (global)
|
||||
#
|
||||
echo "Rule 11 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 12 (global)
|
||||
#
|
||||
echo "Rule 12 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid143289X96143.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143289X96143.0
|
||||
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid143289X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 13 (global)
|
||||
#
|
||||
echo "Rule 13 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid1946680X96143.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1946680X96143.0
|
||||
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid1946680X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 14 (eth0)
|
||||
#
|
||||
echo "Rule 14 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid378955X96143.0
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.0
|
||||
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -N Cid378955X96143.1
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.1
|
||||
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.1 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 15 (eth0)
|
||||
#
|
||||
echo "Rule 15 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid1801407X96143.0
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1801407X96143.0
|
||||
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid1801407X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 16 (global)
|
||||
#
|
||||
echo "Rule 16 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid143343X96143.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143343X96143.0
|
||||
$IPTABLES -A Cid143343X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid143343X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A FORWARD -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 17 (eth0)
|
||||
#
|
||||
echo "Rule 17 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid2241935X96143.0
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.0
|
||||
$IPTABLES -A Cid2241935X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241935X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -N Cid2241935X96143.1
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.1
|
||||
$IPTABLES -A Cid2241935X96143.1 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241935X96143.1 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 18 (eth0)
|
||||
#
|
||||
echo "Rule 18 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid2241981X96143.0
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241981X96143.0
|
||||
$IPTABLES -A Cid2241981X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241981X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 19 (global)
|
||||
#
|
||||
echo "Rule 19 (global)"
|
||||
#
|
||||
# using interface of another cluster in the rule
|
||||
$IPTABLES -N Cid8228X45618.0
|
||||
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid8228X45618.0
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.2 -j ACCEPT
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.100 -j ACCEPT
|
||||
#
|
||||
# Rule 20 (global)
|
||||
#
|
||||
echo "Rule 20 (global)"
|
||||
#
|
||||
$IPTABLES -N Cid147047X84105.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid147047X84105.0
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.2 -j ACCEPT
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.100 -j ACCEPT
|
||||
#
|
||||
# Rule 21 (global)
|
||||
#
|
||||
echo "Rule 21 (global)"
|
||||
#
|
||||
$IPTABLES -N RULE_21
|
||||
$IPTABLES -A OUTPUT -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A INPUT -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A FORWARD -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A RULE_21 -j LOG --log-level info --log-prefix "RULE 21 -- DENY "
|
||||
$IPTABLES -A RULE_21 -j DROP
|
||||
#
|
||||
# Rule 22 (global)
|
||||
#
|
||||
echo "Rule 22 (global)"
|
||||
#
|
||||
$IPTABLES -N RULE_22
|
||||
$IPTABLES -A OUTPUT -j RULE_22
|
||||
$IPTABLES -A INPUT -j RULE_22
|
||||
$IPTABLES -A FORWARD -j RULE_22
|
||||
$IPTABLES -A RULE_22 -j LOG --log-level info --log-prefix "RULE 22 -- DENY "
|
||||
$IPTABLES -A RULE_22 -j DROP
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# ============== ROUTING RULES ==============
|
||||
|
||||
TMPDIRNAME="/tmp/.fwbuilder.tempdir.$$"
|
||||
TMPFILENAME="$TMPDIRNAME/.fwbuilder.out"
|
||||
(umask 077 && mkdir $TMPDIRNAME) || exit 1
|
||||
|
||||
#
|
||||
# This function stops stdout redirection
|
||||
# and sends previously saved output to terminal
|
||||
restore_script_output()
|
||||
{
|
||||
exec 1>&3 2>&1
|
||||
cat $TMPFILENAME
|
||||
rm -rf $TMPDIRNAME
|
||||
}
|
||||
|
||||
# if any routing rule fails we do our best to prevent freezing the firewall
|
||||
route_command_error()
|
||||
{
|
||||
echo "Error: Routing rule $1 couldn't be activated"
|
||||
echo "Recovering previous routing configuration..."
|
||||
# delete current routing rules
|
||||
$IP route show | while read route ; do $IP route del $route ; done
|
||||
# restore old routing rules
|
||||
(IFS="
|
||||
"; for route in $oldRoutes; do (IFS=' '; $IP route add $route); done)
|
||||
echo "...done"
|
||||
restore_script_output
|
||||
epilog_commands
|
||||
exit 1
|
||||
}
|
||||
|
||||
# redirect output to prevent ssh session from stalling
|
||||
exec 3>&1
|
||||
exec 1> $TMPFILENAME
|
||||
exec 2>&1
|
||||
|
||||
# store previous routing configuration (sort: 'via' GW has to be
|
||||
# inserted after device routes)
|
||||
oldRoutes=$($IP route show | sort -k 2)
|
||||
|
||||
echo "Deleting routing rules previously set by user space processes..."
|
||||
$IP route show | grep -v '\( proto kernel \)\|\(default via \)' | \
|
||||
while read route ; do $IP route del $route ; done
|
||||
|
||||
echo "Activating non-ecmp routing rules..."
|
||||
#
|
||||
# Rule 0 (main)
|
||||
#
|
||||
echo "Routing rule 0 (main)"
|
||||
#
|
||||
#
|
||||
#
|
||||
$IP route add 172.24.1.0/24 via 172.24.0.100 dev eth0 \
|
||||
|| route_command_error "0 (main)"
|
||||
|
||||
|
||||
restore_script_output
|
||||
echo "...done."
|
||||
}
|
||||
|
||||
ip_forward() {
|
||||
:
|
||||
echo 1 > /proc/sys/net/ipv4/ip_forward
|
||||
}
|
||||
|
||||
reset_all() {
|
||||
:
|
||||
reset_iptables_v4
|
||||
}
|
||||
|
||||
block_action() {
|
||||
reset_all
|
||||
}
|
||||
|
||||
stop_action() {
|
||||
reset_all
|
||||
$IPTABLES -P OUTPUT ACCEPT
|
||||
$IPTABLES -P INPUT ACCEPT
|
||||
$IPTABLES -P FORWARD ACCEPT
|
||||
}
|
||||
|
||||
check_iptables() {
|
||||
IP_TABLES="$1"
|
||||
[ ! -e $IP_TABLES ] && return 151
|
||||
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
|
||||
[ -z "$NF_TABLES" ] && return 152
|
||||
return 0
|
||||
}
|
||||
status_action() {
|
||||
check_iptables "/proc/net/ip_tables_names"
|
||||
ret_ipv4=$?
|
||||
check_iptables "/proc/net/ip6_tables_names"
|
||||
ret_ipv6=$?
|
||||
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
|
||||
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
|
||||
echo "iptables modules are not loaded"
|
||||
}
|
||||
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
|
||||
echo "Firewall is not configured"
|
||||
}
|
||||
exit 3
|
||||
}
|
||||
|
||||
# See how we were called.
|
||||
# For backwards compatibility missing argument is equivalent to 'start'
|
||||
|
||||
cmd=$1
|
||||
test -z "$cmd" && {
|
||||
cmd="start"
|
||||
}
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Fri Jan 7 13:12:17 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
load_modules "nat "
|
||||
configure_interfaces
|
||||
verify_interfaces
|
||||
|
||||
reset_all
|
||||
|
||||
script_body
|
||||
ip_forward
|
||||
epilog_commands
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
stop)
|
||||
stop_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
status)
|
||||
status_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
block)
|
||||
block_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
reload)
|
||||
$0 stop
|
||||
$0 start
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
interfaces)
|
||||
configure_interfaces
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
test_interfaces)
|
||||
FWBDEBUG="echo"
|
||||
configure_interfaces
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
|
||||
|
||||
*)
|
||||
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
|
||||
;;
|
||||
|
||||
esac
|
||||
|
||||
exit $RETVAL
|
||||
802
test/ipt/linux-2.fw.orig
Executable file
802
test/ipt/linux-2.fw.orig
Executable file
@ -0,0 +1,802 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# This is automatically generated file. DO NOT MODIFY !
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Fri Jan 7 13:12:17 2011 PST by vadim
|
||||
#
|
||||
# files: * linux-2.fw
|
||||
#
|
||||
# Compiled for iptables (any version)
|
||||
#
|
||||
|
||||
# linux-2:to_fw:: warning: ignoring cluster rule set "to_fw" because member firewall "linux-2" has rule set with the same name.
|
||||
|
||||
|
||||
FWBDEBUG=""
|
||||
|
||||
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
|
||||
export PATH
|
||||
|
||||
|
||||
|
||||
LSMOD="/sbin/lsmod"
|
||||
MODPROBE="/sbin/modprobe"
|
||||
IPTABLES="/sbin/iptables"
|
||||
IP6TABLES="/sbin/ip6tables"
|
||||
IPTABLES_RESTORE="/sbin/iptables-restore"
|
||||
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
|
||||
IP="/sbin/ip"
|
||||
IFCONFIG="/sbin/ifconfig"
|
||||
VCONFIG="/sbin/vconfig"
|
||||
BRCTL="/sbin/brctl"
|
||||
IFENSLAVE="/sbin/ifenslave"
|
||||
IPSET="/usr/sbin/ipset"
|
||||
LOGGER="/usr/bin/logger"
|
||||
|
||||
log() {
|
||||
echo "$1"
|
||||
test -x "$LOGGER" && $LOGGER -p info "$1"
|
||||
}
|
||||
|
||||
getInterfaceVarName() {
|
||||
echo $1 | sed 's/\./_/'
|
||||
}
|
||||
|
||||
getaddr_internal() {
|
||||
dev=$1
|
||||
name=$2
|
||||
af=$3
|
||||
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
|
||||
test -z "$L" && {
|
||||
eval "$name=''"
|
||||
return
|
||||
}
|
||||
eval "${name}_list=\"$L\""
|
||||
}
|
||||
|
||||
getaddr() {
|
||||
getaddr_internal $1 $2 "-4"
|
||||
}
|
||||
|
||||
getaddr6() {
|
||||
getaddr_internal $1 $2 "-6"
|
||||
}
|
||||
|
||||
# function getinterfaces is used to process wildcard interfaces
|
||||
getinterfaces() {
|
||||
NAME=$1
|
||||
$IP link show | grep ": $NAME" | while read L; do
|
||||
OIFS=$IFS
|
||||
IFS=" :"
|
||||
set $L
|
||||
IFS=$OIFS
|
||||
echo $2
|
||||
done
|
||||
}
|
||||
|
||||
diff_intf() {
|
||||
func=$1
|
||||
list1=$2
|
||||
list2=$3
|
||||
cmd=$4
|
||||
for intf in $list1
|
||||
do
|
||||
echo $list2 | grep -q $intf || {
|
||||
# $vlan is absent in list 2
|
||||
$func $intf $cmd
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
find_program() {
|
||||
PGM=$1
|
||||
$PGM </dev/null >/dev/null 2>&1; test $? = 127 && {
|
||||
echo "$PGM not found"
|
||||
exit 1
|
||||
}
|
||||
}
|
||||
check_tools() {
|
||||
find_program $IPTABLES
|
||||
find_program $MODPROBE
|
||||
find_program $IP
|
||||
}
|
||||
reset_iptables_v4() {
|
||||
$IPTABLES -P OUTPUT DROP
|
||||
$IPTABLES -P INPUT DROP
|
||||
$IPTABLES -P FORWARD DROP
|
||||
|
||||
cat /proc/net/ip_tables_names | while read table; do
|
||||
$IPTABLES -t $table -L -n | while read c chain rest; do
|
||||
if test "X$c" = "XChain" ; then
|
||||
$IPTABLES -t $table -F $chain
|
||||
fi
|
||||
done
|
||||
$IPTABLES -t $table -X
|
||||
done
|
||||
}
|
||||
|
||||
reset_iptables_v6() {
|
||||
$IP6TABLES -P OUTPUT DROP
|
||||
$IP6TABLES -P INPUT DROP
|
||||
$IP6TABLES -P FORWARD DROP
|
||||
|
||||
cat /proc/net/ip6_tables_names | while read table; do
|
||||
$IP6TABLES -t $table -L -n | while read c chain rest; do
|
||||
if test "X$c" = "XChain" ; then
|
||||
$IP6TABLES -t $table -F $chain
|
||||
fi
|
||||
done
|
||||
$IP6TABLES -t $table -X
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
P2P_INTERFACE_WARNING=""
|
||||
|
||||
missing_address() {
|
||||
address=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $address
|
||||
addr=$1
|
||||
interface=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
|
||||
|
||||
$IP addr show dev $interface | grep -q POINTOPOINT && {
|
||||
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
|
||||
P2P_INTERFACE_WARNING="yes"
|
||||
return
|
||||
}
|
||||
|
||||
test "$cmd" = "add" && {
|
||||
echo "# Adding ip address: $interface $addr"
|
||||
echo $addr | grep -q ':' && {
|
||||
$FWBDEBUG $IP addr $cmd $addr dev $interface
|
||||
} || {
|
||||
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
|
||||
}
|
||||
}
|
||||
|
||||
test "$cmd" = "del" && {
|
||||
echo "# Removing ip address: $interface $addr"
|
||||
$FWBDEBUG $IP addr $cmd $addr dev $interface
|
||||
}
|
||||
|
||||
$FWBDEBUG $IP link set $interface up
|
||||
}
|
||||
|
||||
list_addresses_by_scope() {
|
||||
interface=$1
|
||||
scope=$2
|
||||
ignore_list=$3
|
||||
$IP addr ls dev $interface | \
|
||||
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
|
||||
while read addr; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
}
|
||||
|
||||
|
||||
update_addresses_of_interface() {
|
||||
ignore_list=$2
|
||||
set $1
|
||||
interface=$1
|
||||
shift
|
||||
|
||||
FWB_ADDRS=$(
|
||||
for addr in $*; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
)
|
||||
|
||||
CURRENT_ADDRS_ALL_SCOPES=""
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=""
|
||||
|
||||
$IP link show dev $interface >/dev/null 2>&1 && {
|
||||
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
|
||||
} || {
|
||||
echo "# Interface $interface does not exist"
|
||||
# Stop the script if we are not in test mode
|
||||
test -z "$FWBDEBUG" && exit 1
|
||||
}
|
||||
|
||||
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
|
||||
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
|
||||
}
|
||||
|
||||
clear_addresses_except_known_interfaces() {
|
||||
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
|
||||
while read intf; do
|
||||
echo "# Removing addresses not configured in fwbuilder from interface $intf"
|
||||
$FWBDEBUG $IP addr flush dev $intf scope global
|
||||
$FWBDEBUG $IP link set $intf down
|
||||
done
|
||||
}
|
||||
|
||||
check_file() {
|
||||
test -r "$2" || {
|
||||
echo "Can not find file $2 referenced by address table object $1"
|
||||
exit 1
|
||||
}
|
||||
}
|
||||
|
||||
check_run_time_address_table_files() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
load_modules() {
|
||||
:
|
||||
OPTS=$1
|
||||
MODULES_DIR="/lib/modules/`uname -r`/kernel/net/"
|
||||
MODULES=$(find $MODULES_DIR -name '*conntrack*' \! -name '*ipv6*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')
|
||||
echo $OPTS | grep -q nat && {
|
||||
MODULES="$MODULES $(find $MODULES_DIR -name '*nat*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
|
||||
}
|
||||
echo $OPTS | grep -q ipv6 && {
|
||||
MODULES="$MODULES $(find $MODULES_DIR -name nf_conntrack_ipv6|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
|
||||
}
|
||||
for module in $MODULES; do
|
||||
if $LSMOD | grep ${module} >/dev/null; then continue; fi
|
||||
$MODPROBE ${module} || exit 1
|
||||
done
|
||||
}
|
||||
|
||||
verify_interfaces() {
|
||||
:
|
||||
echo "Verifying interfaces: eth0 eth1 lo"
|
||||
for i in eth0 eth1 lo ; do
|
||||
$IP link show "$i" > /dev/null 2>&1 || {
|
||||
log "Interface $i does not exist"
|
||||
exit 1
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
prolog_commands() {
|
||||
echo "Running prolog script"
|
||||
|
||||
}
|
||||
|
||||
epilog_commands() {
|
||||
echo "Running epilog script"
|
||||
|
||||
}
|
||||
|
||||
run_epilog_and_exit() {
|
||||
epilog_commands
|
||||
exit $1
|
||||
}
|
||||
|
||||
configure_interfaces() {
|
||||
:
|
||||
# Configure interfaces
|
||||
update_addresses_of_interface "eth0 172.24.0.3/16" "172.24.0.1/16"
|
||||
update_addresses_of_interface "eth1 192.168.1.3/24" "192.168.1.1/24"
|
||||
update_addresses_of_interface "lo 127.0.0.1/8" ""
|
||||
}
|
||||
|
||||
script_body() {
|
||||
# ================ IPv4
|
||||
|
||||
|
||||
# ================ Table 'filter', automatic rules
|
||||
# accept established sessions
|
||||
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
|
||||
|
||||
|
||||
# ================ Table 'nat', rule set NAT
|
||||
#
|
||||
# Rule 0 (NAT)
|
||||
#
|
||||
echo "Rule 0 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 1 (NAT)
|
||||
#
|
||||
echo "Rule 1 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
#
|
||||
echo "Rule 2 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.3 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
#
|
||||
echo "Rule 3 (NAT)"
|
||||
#
|
||||
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
|
||||
|
||||
|
||||
|
||||
# ================ Table 'filter', rule set to_fw
|
||||
#
|
||||
# Rule to_fw 0 (global)
|
||||
#
|
||||
echo "Rule to_fw 0 (global)"
|
||||
#
|
||||
# hashlimit 20/sec
|
||||
$IPTABLES -N to_fw
|
||||
$IPTABLES -N to_fw_0
|
||||
$IPTABLES -A to_fw -m hashlimit --hashlimit 20/second --hashlimit-name htable_rule_0 -j to_fw_0
|
||||
$IPTABLES -A to_fw_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY "
|
||||
$IPTABLES -A to_fw_0 -j DROP
|
||||
# ================ Table 'filter', rule set Policy
|
||||
#
|
||||
# Rule -4 heartbeat (automatic)
|
||||
#
|
||||
echo "Rule -4 heartbeat (automatic)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j ACCEPT
|
||||
#
|
||||
# Rule -3 heartbeat (automatic)
|
||||
#
|
||||
echo "Rule -3 heartbeat (automatic)"
|
||||
#
|
||||
$IPTABLES -N C.0
|
||||
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j C.0
|
||||
$IPTABLES -A C.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A C.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule -2 CONNTRACK (automatic)
|
||||
#
|
||||
echo "Rule -2 CONNTRACK (automatic)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
|
||||
#
|
||||
# Rule -1 CONNTRACK (automatic)
|
||||
#
|
||||
echo "Rule -1 CONNTRACK (automatic)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
|
||||
#
|
||||
# Rule 0 (eth0)
|
||||
#
|
||||
echo "Rule 0 (eth0)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -o eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 1 (eth0)
|
||||
#
|
||||
echo "Rule 1 (eth0)"
|
||||
#
|
||||
# anti spoofing rule
|
||||
$IPTABLES -N In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 172.24.0.3 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.3 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A INPUT -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.3 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.3 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
|
||||
$IPTABLES -A In_RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY "
|
||||
$IPTABLES -A In_RULE_1 -j DROP
|
||||
#
|
||||
# Rule 2 (lo)
|
||||
#
|
||||
echo "Rule 2 (lo)"
|
||||
#
|
||||
$IPTABLES -A INPUT -i lo -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -o lo -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 3 (global)
|
||||
#
|
||||
echo "Rule 3 (global)"
|
||||
#
|
||||
# SSH Access to firewall is permitted
|
||||
# only from internal network
|
||||
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 4 (global)
|
||||
#
|
||||
echo "Rule 4 (global)"
|
||||
#
|
||||
# SSH Access to firewall is permitted
|
||||
# only from internal network
|
||||
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 5 (global)
|
||||
#
|
||||
echo "Rule 5 (global)"
|
||||
#
|
||||
# Firewall uses one of the machines
|
||||
# on internal network for DNS
|
||||
$IPTABLES -N RULE_5
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
|
||||
$IPTABLES -A OUTPUT -p udp -m udp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
|
||||
$IPTABLES -A RULE_5 -j LOG --log-level info --log-prefix "RULE 5 -- ACCEPT "
|
||||
$IPTABLES -A RULE_5 -j ACCEPT
|
||||
#
|
||||
# Rule 6 (global)
|
||||
#
|
||||
echo "Rule 6 (global)"
|
||||
#
|
||||
# branch rule set is different in members linux-1 and linux-2
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.3 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.3 -j to_fw
|
||||
$IPTABLES -A INPUT -j to_fw
|
||||
#
|
||||
# Rule 7 (global)
|
||||
#
|
||||
echo "Rule 7 (global)"
|
||||
#
|
||||
# branch rule set is different in members linux-1 and linux-2
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
|
||||
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
|
||||
$IPTABLES -A FORWARD -d 172.24.0.2 -j to_fw
|
||||
$IPTABLES -A FORWARD -d 192.168.1.2 -j to_fw
|
||||
$IPTABLES -A FORWARD -d 192.168.100.1 -j to_fw
|
||||
#
|
||||
# Rule 8 (global)
|
||||
#
|
||||
echo "Rule 8 (global)"
|
||||
#
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.1 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 172.24.0.3 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.1 -j DROP
|
||||
$IPTABLES -A OUTPUT -d 192.168.1.3 -j DROP
|
||||
$IPTABLES -A INPUT -j DROP
|
||||
#
|
||||
# Rule 9 (global)
|
||||
#
|
||||
echo "Rule 9 (global)"
|
||||
#
|
||||
$IPTABLES -A INPUT -j DROP
|
||||
#
|
||||
# Rule 10 (global)
|
||||
#
|
||||
echo "Rule 10 (global)"
|
||||
#
|
||||
# fw is part of any
|
||||
$IPTABLES -N Cid997025X96143.0
|
||||
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid997025X96143.0
|
||||
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.3 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.3 -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 11 (global)
|
||||
#
|
||||
echo "Rule 11 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
|
||||
#
|
||||
# Rule 12 (global)
|
||||
#
|
||||
echo "Rule 12 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid143289X96143.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143289X96143.0
|
||||
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.3 -j ACCEPT
|
||||
#
|
||||
# Rule 13 (global)
|
||||
#
|
||||
echo "Rule 13 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid1946680X96143.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1946680X96143.0
|
||||
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.3 -j ACCEPT
|
||||
#
|
||||
# Rule 14 (eth0)
|
||||
#
|
||||
echo "Rule 14 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid378955X96143.0
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.0
|
||||
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.3 -j ACCEPT
|
||||
$IPTABLES -N Cid378955X96143.1
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.1
|
||||
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.3 -j ACCEPT
|
||||
#
|
||||
# Rule 15 (eth0)
|
||||
#
|
||||
echo "Rule 15 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -N Cid1801407X96143.0
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1801407X96143.0
|
||||
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.1 -j ACCEPT
|
||||
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.3 -j ACCEPT
|
||||
#
|
||||
# Rule 16 (global)
|
||||
#
|
||||
echo "Rule 16 (global)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -N Cid143343X96143.0
|
||||
$IPTABLES -A FORWARD -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143343X96143.0
|
||||
$IPTABLES -A Cid143343X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid143343X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 17 (eth0)
|
||||
#
|
||||
echo "Rule 17 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -N Cid2241935X96143.0
|
||||
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.0
|
||||
$IPTABLES -A Cid2241935X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241935X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -N Cid2241935X96143.1
|
||||
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.1
|
||||
$IPTABLES -A Cid2241935X96143.1 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241935X96143.1 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 18 (eth0)
|
||||
#
|
||||
echo "Rule 18 (eth0)"
|
||||
#
|
||||
# fw is NOT part of any
|
||||
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
|
||||
$IPTABLES -N Cid2241981X96143.0
|
||||
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241981X96143.0
|
||||
$IPTABLES -A Cid2241981X96143.0 -s 172.24.0.2 -j ACCEPT
|
||||
$IPTABLES -A Cid2241981X96143.0 -s 192.168.100.1 -j ACCEPT
|
||||
#
|
||||
# Rule 19 (global)
|
||||
#
|
||||
echo "Rule 19 (global)"
|
||||
#
|
||||
# using interface of another cluster in the rule
|
||||
$IPTABLES -N Cid8228X45618.0
|
||||
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid8228X45618.0
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.2 -j ACCEPT
|
||||
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.100 -j ACCEPT
|
||||
#
|
||||
# Rule 20 (global)
|
||||
#
|
||||
echo "Rule 20 (global)"
|
||||
#
|
||||
$IPTABLES -N Cid147047X84105.0
|
||||
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid147047X84105.0
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.1 -j ACCEPT
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.2 -j ACCEPT
|
||||
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.100 -j ACCEPT
|
||||
#
|
||||
# Rule 21 (global)
|
||||
#
|
||||
echo "Rule 21 (global)"
|
||||
#
|
||||
$IPTABLES -N RULE_21
|
||||
$IPTABLES -A OUTPUT -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A INPUT -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A FORWARD -m state --state NEW -j RULE_21
|
||||
$IPTABLES -A RULE_21 -j LOG --log-level info --log-prefix "RULE 21 -- DENY "
|
||||
$IPTABLES -A RULE_21 -j DROP
|
||||
#
|
||||
# Rule 22 (global)
|
||||
#
|
||||
echo "Rule 22 (global)"
|
||||
#
|
||||
$IPTABLES -N RULE_22
|
||||
$IPTABLES -A OUTPUT -j RULE_22
|
||||
$IPTABLES -A INPUT -j RULE_22
|
||||
$IPTABLES -A FORWARD -j RULE_22
|
||||
$IPTABLES -A RULE_22 -j LOG --log-level info --log-prefix "RULE 22 -- DENY "
|
||||
$IPTABLES -A RULE_22 -j DROP
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# ============== ROUTING RULES ==============
|
||||
|
||||
TMPDIRNAME="/tmp/.fwbuilder.tempdir.$$"
|
||||
TMPFILENAME="$TMPDIRNAME/.fwbuilder.out"
|
||||
(umask 077 && mkdir $TMPDIRNAME) || exit 1
|
||||
|
||||
#
|
||||
# This function stops stdout redirection
|
||||
# and sends previously saved output to terminal
|
||||
restore_script_output()
|
||||
{
|
||||
exec 1>&3 2>&1
|
||||
cat $TMPFILENAME
|
||||
rm -rf $TMPDIRNAME
|
||||
}
|
||||
|
||||
# if any routing rule fails we do our best to prevent freezing the firewall
|
||||
route_command_error()
|
||||
{
|
||||
echo "Error: Routing rule $1 couldn't be activated"
|
||||
echo "Recovering previous routing configuration..."
|
||||
# delete current routing rules
|
||||
$IP route show | while read route ; do $IP route del $route ; done
|
||||
# restore old routing rules
|
||||
(IFS="
|
||||
"; for route in $oldRoutes; do (IFS=' '; $IP route add $route); done)
|
||||
echo "...done"
|
||||
restore_script_output
|
||||
epilog_commands
|
||||
exit 1
|
||||
}
|
||||
|
||||
# redirect output to prevent ssh session from stalling
|
||||
exec 3>&1
|
||||
exec 1> $TMPFILENAME
|
||||
exec 2>&1
|
||||
|
||||
# store previous routing configuration (sort: 'via' GW has to be
|
||||
# inserted after device routes)
|
||||
oldRoutes=$($IP route show | sort -k 2)
|
||||
|
||||
echo "Deleting routing rules previously set by user space processes..."
|
||||
$IP route show | grep -v '\( proto kernel \)\|\(default via \)' | \
|
||||
while read route ; do $IP route del $route ; done
|
||||
|
||||
echo "Activating non-ecmp routing rules..."
|
||||
#
|
||||
# Rule 0 (main)
|
||||
#
|
||||
echo "Routing rule 0 (main)"
|
||||
#
|
||||
#
|
||||
#
|
||||
$IP route add 172.24.1.0/24 via 172.24.0.100 dev eth0 \
|
||||
|| route_command_error "0 (main)"
|
||||
|
||||
|
||||
restore_script_output
|
||||
echo "...done."
|
||||
}
|
||||
|
||||
ip_forward() {
|
||||
:
|
||||
echo 1 > /proc/sys/net/ipv4/ip_forward
|
||||
}
|
||||
|
||||
reset_all() {
|
||||
:
|
||||
reset_iptables_v4
|
||||
}
|
||||
|
||||
block_action() {
|
||||
reset_all
|
||||
}
|
||||
|
||||
stop_action() {
|
||||
reset_all
|
||||
$IPTABLES -P OUTPUT ACCEPT
|
||||
$IPTABLES -P INPUT ACCEPT
|
||||
$IPTABLES -P FORWARD ACCEPT
|
||||
}
|
||||
|
||||
check_iptables() {
|
||||
IP_TABLES="$1"
|
||||
[ ! -e $IP_TABLES ] && return 151
|
||||
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
|
||||
[ -z "$NF_TABLES" ] && return 152
|
||||
return 0
|
||||
}
|
||||
status_action() {
|
||||
check_iptables "/proc/net/ip_tables_names"
|
||||
ret_ipv4=$?
|
||||
check_iptables "/proc/net/ip6_tables_names"
|
||||
ret_ipv6=$?
|
||||
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
|
||||
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
|
||||
echo "iptables modules are not loaded"
|
||||
}
|
||||
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
|
||||
echo "Firewall is not configured"
|
||||
}
|
||||
exit 3
|
||||
}
|
||||
|
||||
# See how we were called.
|
||||
# For backwards compatibility missing argument is equivalent to 'start'
|
||||
|
||||
cmd=$1
|
||||
test -z "$cmd" && {
|
||||
cmd="start"
|
||||
}
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Fri Jan 7 13:12:17 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
load_modules "nat "
|
||||
configure_interfaces
|
||||
verify_interfaces
|
||||
|
||||
reset_all
|
||||
|
||||
script_body
|
||||
ip_forward
|
||||
epilog_commands
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
stop)
|
||||
stop_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
status)
|
||||
status_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
block)
|
||||
block_action
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
reload)
|
||||
$0 stop
|
||||
$0 start
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
interfaces)
|
||||
configure_interfaces
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
test_interfaces)
|
||||
FWBDEBUG="echo"
|
||||
configure_interfaces
|
||||
RETVAL=$?
|
||||
;;
|
||||
|
||||
|
||||
|
||||
*)
|
||||
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
|
||||
;;
|
||||
|
||||
esac
|
||||
|
||||
exit $RETVAL
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
|
||||
#
|
||||
# files: * openais_cluster_1_linux-1.fw
|
||||
#
|
||||
@ -707,7 +707,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
|
||||
#
|
||||
# files: * openais_cluster_1_linux-2.fw
|
||||
#
|
||||
@ -611,7 +611,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:47 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:27 2011 PST by vadim
|
||||
#
|
||||
# files: * rh90.fw
|
||||
#
|
||||
@ -421,7 +421,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:47 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:27 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
|
||||
#
|
||||
# files: * secuwall_cluster_1_secuwall-1.fw
|
||||
#
|
||||
@ -405,7 +405,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
|
||||
log "Database was cluster-tests.fwb"
|
||||
check_tools
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
|
||||
#
|
||||
# files: * server-cluster-1_server-1.fw
|
||||
#
|
||||
@ -398,7 +398,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
|
||||
#
|
||||
# files: * server-cluster-1_server-2.fw
|
||||
#
|
||||
@ -397,7 +397,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:52 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:32 2011 PST by vadim
|
||||
#
|
||||
# files: * test-shadowing-1.fw
|
||||
#
|
||||
@ -461,7 +461,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:52 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:32 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:54 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:35 2011 PST by vadim
|
||||
#
|
||||
# files: * test-shadowing-2.fw
|
||||
#
|
||||
@ -423,7 +423,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:54 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:35 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:58 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:38 2011 PST by vadim
|
||||
#
|
||||
# files: * test-shadowing-3.fw
|
||||
#
|
||||
@ -474,7 +474,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:58 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:38 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:55:50 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:30 2011 PST by vadim
|
||||
#
|
||||
# files: * test_fw.fw
|
||||
#
|
||||
@ -570,7 +570,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:55:50 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:30 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:43 2011 PST by vadim
|
||||
#
|
||||
# files: * vrrp_cluster_1_linux-1.fw
|
||||
#
|
||||
@ -710,7 +710,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:43 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:43 2011 PST by vadim
|
||||
#
|
||||
# files: * vrrp_cluster_1_linux-2.fw
|
||||
#
|
||||
@ -615,7 +615,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:43 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
|
||||
#
|
||||
# files: * vrrp_cluster_2_linux-1.fw
|
||||
#
|
||||
@ -642,7 +642,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
|
||||
#
|
||||
# files: * vrrp_cluster_2_linux-2.fw
|
||||
#
|
||||
@ -547,7 +547,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_ipt v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:56:04 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
|
||||
#
|
||||
# files: * vrrp_cluster_2_linux-3.fw
|
||||
#
|
||||
@ -523,7 +523,7 @@ test -z "$cmd" && {
|
||||
|
||||
case "$cmd" in
|
||||
start)
|
||||
log "Activating firewall script generated Tue Jan 4 11:56:04 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
|
||||
check_tools
|
||||
prolog_commands
|
||||
check_run_time_address_table_files
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:40 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:20 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-base-rulesets.fw
|
||||
# files: firewall-base-rulesets.conf
|
||||
@ -163,7 +163,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "en2 192.168.100.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:40 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:20 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:41 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:21 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-1.fw pf-ipv6.fw
|
||||
# files: firewall-ipv6-1-Policy_ipv4.conf /etc/fw/pf-ipv6-Policy_ipv4.conf
|
||||
@ -175,7 +175,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo ::1/128 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:41 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:21 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -5,7 +5,7 @@
|
||||
# Tables: (5)
|
||||
table <tbl.r4.s> { 222.222.222.22 , 222.222.222.23 }
|
||||
table <tbl.r4.sx> { 2001:5c0:0:2::24 , 3ffe:1200:2000::/36 , 3ffe:1200:2001:1:8000::1 }
|
||||
table <tbl.r5.s> { 61.150.47.112 , 74.125.19.99 , 74.125.19.103 , 74.125.19.104 , 74.125.19.147 , 192.168.1.0 }
|
||||
table <tbl.r5.s> { 61.150.47.112 , 74.125.224.48 , 74.125.224.49 , 74.125.224.50 , 74.125.224.51 , 74.125.224.52 , 192.168.1.0 }
|
||||
table <tbl.r5.sx> { 2001:5c0:0:2::24 , 3ffe:1200:2001:1:8000::1 }
|
||||
table <tbl.r7.s> { 61.150.47.112 , 192.168.1.0 }
|
||||
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall-ipv6-2.fw pf.fw
|
||||
# files: firewall-ipv6-2.conf pf.conf
|
||||
@ -179,7 +179,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo ::1/128 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:09 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:49 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall.fw /etc/pf.fw
|
||||
# files: firewall.conf /etc/pf.conf
|
||||
@ -167,7 +167,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:09 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:49 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:10 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:50 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall1.fw
|
||||
# files: firewall1.conf
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:10 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:50 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:10 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:51 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-1.fw
|
||||
# files: firewall10-1.conf
|
||||
@ -74,7 +74,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:10 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:51 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:11 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:52 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-2.fw
|
||||
# files: firewall10-2.conf
|
||||
@ -74,7 +74,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:11 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:52 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:12 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:52 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-3.fw
|
||||
# files: firewall10-3.conf
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:12 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:52 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:13 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:53 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-4.fw
|
||||
# files: firewall10-4.conf
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:13 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:53 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:13 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:54 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-5.fw
|
||||
# files: firewall10-5.conf
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:13 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:54 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:14 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:55 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall10-6.fw
|
||||
# files: firewall10-6.conf
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:14 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:55 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:15 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:55 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall11.fw
|
||||
# files: firewall11.conf
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:15 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:55 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:16 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:56 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall12.fw
|
||||
# files: firewall12.conf
|
||||
@ -159,7 +159,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:16 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:56 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:16 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:57 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall13.fw
|
||||
# files: firewall13.conf
|
||||
@ -88,7 +88,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:16 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:57 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:18 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall14-1.fw
|
||||
# files: firewall14-1.conf
|
||||
@ -244,7 +244,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:18 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:58 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:17 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:58 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall14.fw
|
||||
# files: firewall14.conf
|
||||
@ -244,7 +244,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:17 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:58 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:21 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:01 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2-1.fw
|
||||
# files: firewall2-1.conf
|
||||
@ -89,7 +89,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:21 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:01 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:19 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:18:59 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall2.fw
|
||||
# files: firewall2.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:19 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:18:59 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:19 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:00 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall20.fw
|
||||
# files: firewall20.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:19 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:00 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:20 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:01 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall21.fw
|
||||
# files: firewall21-NAT_1.conf
|
||||
@ -82,7 +82,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:20 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:01 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:22 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:02 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall22.fw
|
||||
# files: firewall22-NAT_1.conf
|
||||
@ -80,7 +80,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:22 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:02 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:03 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall3.fw
|
||||
# files: firewall3.conf
|
||||
@ -159,7 +159,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:03 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -6,7 +6,7 @@
|
||||
table <tbl.r0> { 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
|
||||
table <tbl.r10.d> { www.google.com , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
|
||||
table <tbl.r2> { www.google.com , www.cnn.com }
|
||||
table <tbl.r8.d> { 74.125.19.99 , 74.125.19.103 , 74.125.19.104 , 74.125.19.147 , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
|
||||
table <tbl.r8.d> { 74.125.224.48 , 74.125.224.49 , 74.125.224.50 , 74.125.224.51 , 74.125.224.52 , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
|
||||
|
||||
#
|
||||
# Rule 0 (NAT)
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:23 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:04 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall33.fw
|
||||
# files: firewall33.conf
|
||||
@ -162,7 +162,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:23 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:04 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:24 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:05 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall34.fw
|
||||
# files: firewall34.conf
|
||||
@ -158,7 +158,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:24 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:05 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:25 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:05 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall38.fw
|
||||
# files: firewall38.conf
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:25 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:05 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:26 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:06 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall39.fw pf.fw
|
||||
# files: firewall39.conf pf.conf
|
||||
@ -79,7 +79,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:26 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:06 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:26 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:07 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall4.fw pf.fw
|
||||
# files: firewall4.conf /etc/fw/pf.conf
|
||||
@ -78,7 +78,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:26 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:07 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:28 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:09 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall40-1.fw
|
||||
# files: firewall40-1.conf
|
||||
@ -176,7 +176,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:28 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:09 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:27 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:08 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall40.fw
|
||||
# files: firewall40.conf
|
||||
@ -160,7 +160,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:27 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:08 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:29 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:09 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall41.fw
|
||||
# files: firewall41.conf
|
||||
@ -163,7 +163,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "eth1 2.2.2.2/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:29 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:09 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:30 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:10 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall5.fw
|
||||
# files: firewall5.conf
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:30 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:10 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:31 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:11 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall51.fw
|
||||
# files: firewall51.conf
|
||||
@ -80,7 +80,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:31 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:11 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:31 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:12 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall6.fw
|
||||
# files: firewall6.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:31 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:12 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:32 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:13 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall62.fw
|
||||
# files: firewall62.conf
|
||||
@ -185,7 +185,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "en1 222.222.222.222/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:32 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:13 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:33 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:13 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall63.fw
|
||||
# files: firewall63.conf
|
||||
@ -77,7 +77,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:33 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:13 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:14 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall7.fw
|
||||
# files: firewall7.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:14 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:34 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:15 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall70.fw
|
||||
# files: firewall70.conf
|
||||
@ -82,7 +82,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:34 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:15 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:35 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:16 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall8.fw
|
||||
# files: firewall8.conf
|
||||
@ -72,7 +72,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:35 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:16 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:37 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:17 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall80-4.5.fw
|
||||
# files: firewall80-4.5.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:37 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:17 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:36 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:16 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall80.fw
|
||||
# files: firewall80.conf
|
||||
@ -73,7 +73,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:36 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:16 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:37 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:18 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall9.fw
|
||||
# files: firewall9.conf
|
||||
@ -76,7 +76,7 @@ configure_interfaces() {
|
||||
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:37 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:18 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:38 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:19 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall91.fw /etc/fw/pf.fw
|
||||
# files: firewall91.conf /etc/fw/pf.conf
|
||||
@ -243,7 +243,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:38 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:19 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:39 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:19 2011 PST by vadim
|
||||
#
|
||||
# files: * firewall92.fw /etc/fw/pf.fw
|
||||
# files: firewall92.conf /etc/fw/path\ with\ space/pf.conf
|
||||
@ -160,7 +160,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "em1 10.1.1.81/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:39 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:19 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
71
test/pf/openbsd-1.conf.orig
Normal file
71
test/pf/openbsd-1.conf.orig
Normal file
@ -0,0 +1,71 @@
|
||||
|
||||
|
||||
|
||||
|
||||
# Tables: (2)
|
||||
table <tbl.r1.d> { 172.24.0.1 , 172.24.0.2 , 192.168.1.1 , 192.168.1.2 }
|
||||
table <tbl.r2.s> { 172.24.0.1 , 172.24.0.2 }
|
||||
|
||||
#
|
||||
# Rule 0 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 1 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> { 172.24.0.2 , 172.24.0.3 }
|
||||
#
|
||||
# Rule 4 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.2
|
||||
#
|
||||
# Rule 5 (NAT)
|
||||
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.3
|
||||
#
|
||||
# Rule 6 (NAT)
|
||||
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
#
|
||||
# Rule 7 (NAT)
|
||||
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
#
|
||||
# Rule 8 (NAT)
|
||||
rdr proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
|
||||
#
|
||||
# Rule -3 pfsync (automatic)
|
||||
pass quick on en0 inet proto pfsync from any to any label "RULE -3 -- ACCEPT "
|
||||
#
|
||||
# Rule -2 CARP (automatic)
|
||||
pass quick on en1 inet proto carp from any to any label "RULE -2 -- ACCEPT "
|
||||
#
|
||||
# Rule -1 CARP (automatic)
|
||||
pass quick on en0 inet proto carp from any to any label "RULE -1 -- ACCEPT "
|
||||
#
|
||||
# Rule 0 (lo)
|
||||
pass quick on lo inet from any to any label "RULE 0 -- ACCEPT "
|
||||
#
|
||||
# Rule 1 (global)
|
||||
pass quick inet from any to <tbl.r1.d> label "RULE 1 -- ACCEPT "
|
||||
#
|
||||
# Rule 2 (global)
|
||||
pass quick inet from <tbl.r2.s> to any label "RULE 2 -- ACCEPT "
|
||||
#
|
||||
# Rule 3 (global)
|
||||
pass quick inet from any to <tbl.r2.s> label "RULE 3 -- ACCEPT "
|
||||
#
|
||||
# Rule 4 (carp0)
|
||||
pass in quick on en0 inet from any to any label "RULE 4 -- ACCEPT "
|
||||
#
|
||||
# Rule 5 (carp0)
|
||||
pass in quick on en1 inet from any to any label "RULE 5 -- ACCEPT "
|
||||
#
|
||||
# Rule 6 (global)
|
||||
block log quick inet from any to any no state label "RULE 6 -- DROP "
|
||||
#
|
||||
# Rule fallback rule
|
||||
# fallback rule
|
||||
block quick inet from any to any no state label "RULE 10000 -- DROP "
|
||||
|
||||
308
test/pf/openbsd-1.fw.orig
Executable file
308
test/pf/openbsd-1.fw.orig
Executable file
@ -0,0 +1,308 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# This is automatically generated file. DO NOT MODIFY !
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Fri Jan 7 13:02:11 2011 PST by vadim
|
||||
#
|
||||
# files: * openbsd-1.fw
|
||||
# files: openbsd-1.conf
|
||||
#
|
||||
# Compiled for pf 4.x
|
||||
#
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
FWDIR=`dirname $0`
|
||||
|
||||
IFCONFIG="/sbin/ifconfig"
|
||||
PFCTL="/sbin/pfctl"
|
||||
SYSCTL="/sbin/sysctl"
|
||||
LOGGER="/usr/bin/logger"
|
||||
|
||||
log() {
|
||||
echo "$1"
|
||||
test -x "$LOGGER" && $LOGGER -p info "$1"
|
||||
}
|
||||
|
||||
diff_intf() {
|
||||
func=$1
|
||||
list1=$2
|
||||
list2=$3
|
||||
cmd=$4
|
||||
for intf in $list1
|
||||
do
|
||||
echo $list2 | grep -q $intf || {
|
||||
# $vlan is absent in list 2
|
||||
$func $intf $cmd
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
missing_address() {
|
||||
address=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $address
|
||||
addr=$1
|
||||
interface=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
if echo "$addr" | grep -q ':'
|
||||
then
|
||||
inet="inet6"
|
||||
addr=$(echo "$addr" | sed 's!/! prefixlen !')
|
||||
else
|
||||
inet="inet"
|
||||
addr=$(echo "$addr" | sed 's!/! netmask !')
|
||||
fi
|
||||
|
||||
parameter=""
|
||||
test "$cmd" = "add" && {
|
||||
echo "# Adding ip address: $interface $addr"
|
||||
parameter="alias"
|
||||
}
|
||||
test "$cmd" = "del" && {
|
||||
echo "# Removing ip address: $interface $addr"
|
||||
parameter="delete"
|
||||
}
|
||||
|
||||
$FWBDEBUG $IFCONFIG $interface $inet $addr $parameter
|
||||
$FWBDEBUG $IFCONFIG $interface up
|
||||
}
|
||||
|
||||
list_addresses_by_scope() {
|
||||
interface=$1
|
||||
scope=$2
|
||||
ignore_list=$3
|
||||
|
||||
scope_regex="1"
|
||||
if test -n "$scope"; then scope_regex=" \$0 !~ \"$scope\" "; fi
|
||||
|
||||
$IFCONFIG $interface | sed "s/%$interface//" | \
|
||||
awk -v IGNORED="$ignore_list" \
|
||||
"BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/inet |inet6 / && $scope_regex && !(\$2 in ignored_dict)) {printf \"%s/%s\n\",\$2,\$4;}" | \
|
||||
while read addr; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
|
||||
}
|
||||
|
||||
update_addresses_of_interface() {
|
||||
ignore_list=$2
|
||||
set $1
|
||||
interface=$1
|
||||
shift
|
||||
|
||||
FWB_ADDRS=$(
|
||||
for addr in $*; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
)
|
||||
|
||||
CURRENT_ADDRS_ALL_SCOPES=""
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=""
|
||||
|
||||
$IFCONFIG $interface >/dev/null 2>&1 && {
|
||||
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface '' "$ignore_list")
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scopeid .*' "$ignore_list")
|
||||
} || {
|
||||
echo "# Interface $interface does not exist"
|
||||
# Stop the script if we are not in test mode
|
||||
test -z "$FWBDEBUG" && exit 1
|
||||
}
|
||||
|
||||
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
|
||||
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
|
||||
}
|
||||
|
||||
missing_vlan() {
|
||||
vlan=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $vlan
|
||||
subint=$1
|
||||
parent=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
vlan_id=$(echo $subint | sed 's/vlan//')
|
||||
test "$cmd" = "add" && {
|
||||
echo "# Adding VLAN interface $subint (parent: $parent)"
|
||||
$FWBDEBUG $IFCONFIG $subint vlan $vlan_id vlandev $parent
|
||||
$FWBDEBUG $IFCONFIG $subint up
|
||||
}
|
||||
test "$cmd" = "rem" && {
|
||||
echo "# Removing VLAN interface $subint (parent: $parent)"
|
||||
$FWBDEBUG $IFCONFIG $subint vlan $vlan_id -vlandev
|
||||
$FWBDEBUG $IFCONFIG $subint destroy
|
||||
}
|
||||
}
|
||||
|
||||
parse_fwb_vlans() {
|
||||
set $1
|
||||
vlan_parent_interface=$1
|
||||
shift
|
||||
|
||||
FWB_VLANS=$(
|
||||
for subint in $*; do
|
||||
echo "${subint}@$vlan_parent_interface"
|
||||
done | sort
|
||||
)
|
||||
echo $FWB_VLANS
|
||||
}
|
||||
|
||||
parse_current_vlans() {
|
||||
vlan_parent_interface=$1
|
||||
$IFCONFIG -A | grep 'vlan: ' | sed 's/priority:.*parent interface://' | \
|
||||
while read x vlan_id parent
|
||||
do
|
||||
test "$parent" = "$vlan_parent_interface" && echo "vlan$vlan_id@$parent"
|
||||
done | sort
|
||||
}
|
||||
|
||||
update_vlans_of_interface() {
|
||||
args="$1"
|
||||
set $1
|
||||
vlan_parent_interface=$1
|
||||
|
||||
FWB_VLANS=$(parse_fwb_vlans "$args")
|
||||
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
|
||||
|
||||
$IFCONFIG $vlan_parent_interface up
|
||||
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
|
||||
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
|
||||
}
|
||||
|
||||
sync_vlan_interfaces() {
|
||||
$IFCONFIG -A | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
|
||||
}
|
||||
($1 ~ /^vlan[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
|
||||
while read intf; do
|
||||
echo "# Deleting vlan interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf destroy
|
||||
done
|
||||
|
||||
for intf in $*; do
|
||||
$IFCONFIG $intf >/dev/null 2>&1 || {
|
||||
echo "# Creating vlan interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf create
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
sync_carp_interfaces() {
|
||||
$IFCONFIG -A | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
|
||||
}
|
||||
($1 ~ /^carp[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
|
||||
while read intf; do
|
||||
echo "# Deleting carp interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf destroy
|
||||
done
|
||||
|
||||
for intf in $*; do
|
||||
$IFCONFIG $intf >/dev/null 2>&1 || {
|
||||
echo "# Creating carp interface $intf"
|
||||
$SYSCTL -w net.inet.carp.allow=1
|
||||
$FWBDEBUG $IFCONFIG $intf create
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
sync_pfsync_interfaces() {
|
||||
$IFCONFIG -A | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
|
||||
}
|
||||
($1 ~ /^pfsync[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
|
||||
while read intf; do
|
||||
echo "# Deleting pfsync interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf destroy
|
||||
done
|
||||
|
||||
for intf in $*; do
|
||||
$IFCONFIG $intf >/dev/null 2>&1 || {
|
||||
echo "# Creating pfsync interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf create
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
verify_interfaces() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
set_kernel_vars() {
|
||||
:
|
||||
$SYSCTL -w net.inet.ip.forwarding=1
|
||||
}
|
||||
|
||||
prolog_commands() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
epilog_commands() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
run_epilog_and_exit() {
|
||||
epilog_commands
|
||||
exit $1
|
||||
}
|
||||
|
||||
configure_interfaces() {
|
||||
:
|
||||
sync_vlan_interfaces
|
||||
sync_carp_interfaces carp0 carp1
|
||||
$IFCONFIG carp0 vhid 101 pass secret carpdev en0
|
||||
$IFCONFIG carp1 vhid 100 pass secret carpdev en1
|
||||
|
||||
|
||||
update_addresses_of_interface "en0 172.24.0.2/0xffffff00 172.24.0.3/0xffffff00" ""
|
||||
update_addresses_of_interface "en1 192.168.1.2/0xffffff00" ""
|
||||
update_addresses_of_interface "carp0 172.24.0.1/0xffffff00" ""
|
||||
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
|
||||
|
||||
sync_pfsync_interfaces pfsync0
|
||||
$IFCONFIG pfsync0 syncdev en0 syncpeer 172.24.0.3
|
||||
$IFCONFIG pfsync0 up
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Fri Jan 7 13:02:11 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
prolog_commands
|
||||
|
||||
$PFCTL \
|
||||
-f \
|
||||
${FWDIR}/openbsd-1.conf || exit 1
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
epilog_commands
|
||||
71
test/pf/openbsd-2.conf.orig
Normal file
71
test/pf/openbsd-2.conf.orig
Normal file
@ -0,0 +1,71 @@
|
||||
|
||||
|
||||
|
||||
|
||||
# Tables: (2)
|
||||
table <tbl.r1.d> { 172.24.0.1 , 172.24.0.3 , 192.168.1.1 , 192.168.1.3 }
|
||||
table <tbl.r2.s> { 172.24.0.1 , 172.24.0.3 }
|
||||
|
||||
#
|
||||
# Rule 0 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 1 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 2 (NAT)
|
||||
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
|
||||
#
|
||||
# Rule 3 (NAT)
|
||||
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> { 172.24.0.2 , 172.24.0.3 }
|
||||
#
|
||||
# Rule 4 (NAT)
|
||||
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.2
|
||||
#
|
||||
# Rule 5 (NAT)
|
||||
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.3
|
||||
#
|
||||
# Rule 6 (NAT)
|
||||
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
#
|
||||
# Rule 7 (NAT)
|
||||
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
#
|
||||
# Rule 8 (NAT)
|
||||
rdr proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
|
||||
|
||||
#
|
||||
# Rule -3 pfsync (automatic)
|
||||
pass quick on en0 inet proto pfsync from any to any label "RULE -3 -- ACCEPT "
|
||||
#
|
||||
# Rule -2 CARP (automatic)
|
||||
pass quick on en1 inet proto carp from any to any label "RULE -2 -- ACCEPT "
|
||||
#
|
||||
# Rule -1 CARP (automatic)
|
||||
pass quick on en0 inet proto carp from any to any label "RULE -1 -- ACCEPT "
|
||||
#
|
||||
# Rule 0 (lo)
|
||||
pass quick on lo inet from any to any label "RULE 0 -- ACCEPT "
|
||||
#
|
||||
# Rule 1 (global)
|
||||
pass quick inet from any to <tbl.r1.d> label "RULE 1 -- ACCEPT "
|
||||
#
|
||||
# Rule 2 (global)
|
||||
pass quick inet from <tbl.r2.s> to any label "RULE 2 -- ACCEPT "
|
||||
#
|
||||
# Rule 3 (global)
|
||||
pass quick inet from any to <tbl.r2.s> label "RULE 3 -- ACCEPT "
|
||||
#
|
||||
# Rule 4 (carp0)
|
||||
pass in quick on en0 inet from any to any label "RULE 4 -- ACCEPT "
|
||||
#
|
||||
# Rule 5 (carp0)
|
||||
pass in quick on en1 inet from any to any label "RULE 5 -- ACCEPT "
|
||||
#
|
||||
# Rule 6 (global)
|
||||
block log quick inet from any to any no state label "RULE 6 -- DROP "
|
||||
#
|
||||
# Rule fallback rule
|
||||
# fallback rule
|
||||
block quick inet from any to any no state label "RULE 10000 -- DROP "
|
||||
|
||||
204
test/pf/openbsd-2.fw.orig
Executable file
204
test/pf/openbsd-2.fw.orig
Executable file
@ -0,0 +1,204 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# This is automatically generated file. DO NOT MODIFY !
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Fri Jan 7 13:02:11 2011 PST by vadim
|
||||
#
|
||||
# files: * openbsd-2.fw
|
||||
# files: openbsd-2.conf
|
||||
#
|
||||
# Compiled for pf 4.x
|
||||
#
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
FWDIR=`dirname $0`
|
||||
|
||||
IFCONFIG="/sbin/ifconfig"
|
||||
PFCTL="/sbin/pfctl"
|
||||
SYSCTL="/sbin/sysctl"
|
||||
LOGGER="/usr/bin/logger"
|
||||
|
||||
log() {
|
||||
echo "$1"
|
||||
test -x "$LOGGER" && $LOGGER -p info "$1"
|
||||
}
|
||||
|
||||
diff_intf() {
|
||||
func=$1
|
||||
list1=$2
|
||||
list2=$3
|
||||
cmd=$4
|
||||
for intf in $list1
|
||||
do
|
||||
echo $list2 | grep -q $intf || {
|
||||
# $vlan is absent in list 2
|
||||
$func $intf $cmd
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
|
||||
missing_address() {
|
||||
address=$1
|
||||
cmd=$2
|
||||
|
||||
oldIFS=$IFS
|
||||
IFS="@"
|
||||
set $address
|
||||
addr=$1
|
||||
interface=$2
|
||||
IFS=$oldIFS
|
||||
|
||||
if echo "$addr" | grep -q ':'
|
||||
then
|
||||
inet="inet6"
|
||||
addr=$(echo "$addr" | sed 's!/! prefixlen !')
|
||||
else
|
||||
inet="inet"
|
||||
addr=$(echo "$addr" | sed 's!/! netmask !')
|
||||
fi
|
||||
|
||||
parameter=""
|
||||
test "$cmd" = "add" && {
|
||||
echo "# Adding ip address: $interface $addr"
|
||||
parameter="alias"
|
||||
}
|
||||
test "$cmd" = "del" && {
|
||||
echo "# Removing ip address: $interface $addr"
|
||||
parameter="delete"
|
||||
}
|
||||
|
||||
$FWBDEBUG $IFCONFIG $interface $inet $addr $parameter
|
||||
$FWBDEBUG $IFCONFIG $interface up
|
||||
}
|
||||
|
||||
list_addresses_by_scope() {
|
||||
interface=$1
|
||||
scope=$2
|
||||
ignore_list=$3
|
||||
|
||||
scope_regex="1"
|
||||
if test -n "$scope"; then scope_regex=" \$0 !~ \"$scope\" "; fi
|
||||
|
||||
$IFCONFIG $interface | sed "s/%$interface//" | \
|
||||
awk -v IGNORED="$ignore_list" \
|
||||
"BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
|
||||
}
|
||||
(/inet |inet6 / && $scope_regex && !(\$2 in ignored_dict)) {printf \"%s/%s\n\",\$2,\$4;}" | \
|
||||
while read addr; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
|
||||
}
|
||||
|
||||
update_addresses_of_interface() {
|
||||
ignore_list=$2
|
||||
set $1
|
||||
interface=$1
|
||||
shift
|
||||
|
||||
FWB_ADDRS=$(
|
||||
for addr in $*; do
|
||||
echo "${addr}@$interface"
|
||||
done | sort
|
||||
)
|
||||
|
||||
CURRENT_ADDRS_ALL_SCOPES=""
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=""
|
||||
|
||||
$IFCONFIG $interface >/dev/null 2>&1 && {
|
||||
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface '' "$ignore_list")
|
||||
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scopeid .*' "$ignore_list")
|
||||
} || {
|
||||
echo "# Interface $interface does not exist"
|
||||
# Stop the script if we are not in test mode
|
||||
test -z "$FWBDEBUG" && exit 1
|
||||
}
|
||||
|
||||
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
|
||||
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
|
||||
}
|
||||
|
||||
|
||||
|
||||
sync_carp_interfaces() {
|
||||
$IFCONFIG -A | awk -v IGNORED="$*" \
|
||||
'BEGIN {
|
||||
split(IGNORED,ignored_arr);
|
||||
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
|
||||
}
|
||||
($1 ~ /^carp[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
|
||||
while read intf; do
|
||||
echo "# Deleting carp interface $intf"
|
||||
$FWBDEBUG $IFCONFIG $intf destroy
|
||||
done
|
||||
|
||||
for intf in $*; do
|
||||
$IFCONFIG $intf >/dev/null 2>&1 || {
|
||||
echo "# Creating carp interface $intf"
|
||||
$SYSCTL -w net.inet.carp.allow=1
|
||||
$FWBDEBUG $IFCONFIG $intf create
|
||||
}
|
||||
done
|
||||
}
|
||||
|
||||
verify_interfaces() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
set_kernel_vars() {
|
||||
:
|
||||
$SYSCTL -w net.inet.ip.forwarding=1
|
||||
}
|
||||
|
||||
prolog_commands() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
epilog_commands() {
|
||||
:
|
||||
|
||||
}
|
||||
|
||||
run_epilog_and_exit() {
|
||||
epilog_commands
|
||||
exit $1
|
||||
}
|
||||
|
||||
configure_interfaces() {
|
||||
:
|
||||
sync_carp_interfaces carp0 carp1
|
||||
$IFCONFIG carp0 vhid 101 pass secret advskew 1 carpdev en0
|
||||
$IFCONFIG carp1 vhid 100 pass secret advskew 1 carpdev en1
|
||||
|
||||
|
||||
update_addresses_of_interface "en0 172.24.0.3/0xffffff00 172.24.0.2/0xffffff00" ""
|
||||
update_addresses_of_interface "en1 192.168.1.3/0xffffff00" ""
|
||||
update_addresses_of_interface "carp0 172.24.0.1/0xffffff00" ""
|
||||
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Fri Jan 7 13:02:11 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
prolog_commands
|
||||
|
||||
$PFCTL \
|
||||
-f \
|
||||
${FWDIR}/openbsd-2.conf || exit 1
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
epilog_commands
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
|
||||
#
|
||||
# files: * pf_cluster_1_openbsd-1.fw
|
||||
# files: pf_cluster_1_openbsd-1.conf
|
||||
@ -291,7 +291,7 @@ configure_interfaces() {
|
||||
$IFCONFIG pfsync0 up
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
|
||||
#
|
||||
# files: * pf_cluster_1_openbsd-2.fw
|
||||
# files: pf_cluster_1_openbsd-2.conf
|
||||
@ -187,7 +187,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
|
||||
#
|
||||
# files: * pf_cluster_2_freebsd-2.fw
|
||||
# files: pf_cluster_2_freebsd-2.conf
|
||||
@ -190,7 +190,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
|
||||
#
|
||||
# files: * pf_cluster_3_openbsd-3.fw
|
||||
# files: pf_cluster_3_openbsd-3.conf
|
||||
@ -303,7 +303,7 @@ configure_interfaces() {
|
||||
sync_pfsync_interfaces
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
@ -4,7 +4,7 @@
|
||||
#
|
||||
# Firewall Builder fwb_pf v4.2.0.3425
|
||||
#
|
||||
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
|
||||
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
|
||||
#
|
||||
# files: * pf_cluster_3_openbsd-4.fw
|
||||
# files: pf_cluster_3_openbsd-4.conf
|
||||
@ -192,7 +192,7 @@ configure_interfaces() {
|
||||
update_addresses_of_interface "carp2 172.20.0.1/0xffffff00" ""
|
||||
}
|
||||
|
||||
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
|
||||
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
|
||||
|
||||
set_kernel_vars
|
||||
configure_interfaces
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user