1
0
mirror of https://github.com/fwbuilder/fwbuilder synced 2026-03-18 17:27:20 +01:00

minor refactoring in NATCompiler::ExpandMultipleAddresses::processNext to include SDNAT rules; rerun tests

This commit is contained in:
Vadim Kurland 2011-01-07 13:27:37 -08:00
parent 3ff086ecc1
commit 83646b91fa
195 changed files with 2852 additions and 410 deletions

View File

@ -343,31 +343,43 @@ bool NATCompiler::ExpandMultipleAddresses::processNext()
tmp_queue.push_back(rule);
RuleElement *rel;
if (rule->getRuleType()==NATRule::NONAT ||
rule->getRuleType()==NATRule::Return)
switch (rule->getRuleType())
{
case NATRule::NONAT:
case NATRule::Return:
{
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, true);
break;
}
if (rule->getRuleType()==NATRule::SNAT)
case NATRule::SNAT:
case NATRule::SDNAT:
{
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, true);
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
rel=rule->getTDst(); assert(rel); compiler->_expand_addr(rule, rel, false);
break;
}
if (rule->getRuleType()==NATRule::DNAT)
case NATRule::DNAT:
{
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, false);
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
rel=rule->getTDst(); assert(rel); compiler->_expand_addr(rule, rel, false);
break;
}
if (rule->getRuleType()==NATRule::Redirect)
case NATRule::Redirect:
{
rel=rule->getOSrc(); assert(rel); compiler->_expand_addr(rule, rel, true);
rel=rule->getODst(); assert(rel); compiler->_expand_addr(rule, rel, false);
rel=rule->getTSrc(); assert(rel); compiler->_expand_addr(rule, rel, false);
break;
}
}
return true;
}

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
# Generated Fri Jan 7 12:51:57 2011 PST by vadim
#
# files: * firewall.fw ipfw.fw
#
@ -81,7 +81,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:57 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
#
# files: * firewall1.fw
#
@ -83,7 +83,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:56 2011 PST by vadim
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
#
# files: * firewall2.fw
#
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:56 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
# Generated Fri Jan 7 12:51:58 2011 PST by vadim
#
# files: * firewall33.fw
#
@ -163,7 +163,7 @@ configure_interfaces() {
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:58 2011 by vadim"
set_kernel_vars
configure_interfaces
@ -221,39 +221,40 @@ prolog_commands
"$IPFW" add 220 set 1 permit all from any to any keep-state || exit 1
#
# Rule 8 (global)
"$IPFW" add 230 set 1 skipto 340 all from any to 74.125.19.99 || exit 1
"$IPFW" add 240 set 1 skipto 340 all from any to 74.125.19.103 || exit 1
"$IPFW" add 250 set 1 skipto 340 all from any to 74.125.19.104 || exit 1
"$IPFW" add 260 set 1 skipto 340 all from any to 74.125.19.147 || exit 1
"$IPFW" add 270 set 1 skipto 340 all from any to 157.166.224.25 || exit 1
"$IPFW" add 280 set 1 skipto 340 all from any to 157.166.224.26 || exit 1
"$IPFW" add 290 set 1 skipto 340 all from any to 157.166.226.25 || exit 1
"$IPFW" add 300 set 1 skipto 340 all from any to 157.166.226.26 || exit 1
"$IPFW" add 310 set 1 skipto 340 all from any to 157.166.255.18 || exit 1
"$IPFW" add 320 set 1 skipto 340 all from any to 157.166.255.19 || exit 1
"$IPFW" add 330 set 1 permit all from any to any keep-state || exit 1
"$IPFW" add 230 set 1 skipto 350 all from any to 74.125.224.48 || exit 1
"$IPFW" add 240 set 1 skipto 350 all from any to 74.125.224.49 || exit 1
"$IPFW" add 250 set 1 skipto 350 all from any to 74.125.224.50 || exit 1
"$IPFW" add 260 set 1 skipto 350 all from any to 74.125.224.51 || exit 1
"$IPFW" add 270 set 1 skipto 350 all from any to 74.125.224.52 || exit 1
"$IPFW" add 280 set 1 skipto 350 all from any to 157.166.224.25 || exit 1
"$IPFW" add 290 set 1 skipto 350 all from any to 157.166.224.26 || exit 1
"$IPFW" add 300 set 1 skipto 350 all from any to 157.166.226.25 || exit 1
"$IPFW" add 310 set 1 skipto 350 all from any to 157.166.226.26 || exit 1
"$IPFW" add 320 set 1 skipto 350 all from any to 157.166.255.18 || exit 1
"$IPFW" add 330 set 1 skipto 350 all from any to 157.166.255.19 || exit 1
"$IPFW" add 340 set 1 permit all from any to any keep-state || exit 1
#
# Rule 9 (global)
"$IPFW" add 340 set 1 skipto 370 all from any to www.google.com || exit 1
"$IPFW" add 350 set 1 skipto 370 all from any to www.cnn.com || exit 1
"$IPFW" add 360 set 1 permit all from any to any keep-state || exit 1
"$IPFW" add 350 set 1 skipto 380 all from any to www.google.com || exit 1
"$IPFW" add 360 set 1 skipto 380 all from any to www.cnn.com || exit 1
"$IPFW" add 370 set 1 permit all from any to any keep-state || exit 1
#
# Rule 10 (global)
"$IPFW" add 370 set 1 skipto 450 all from any to www.google.com || exit 1
"$IPFW" add 380 set 1 skipto 450 all from any to 157.166.224.25 || exit 1
"$IPFW" add 390 set 1 skipto 450 all from any to 157.166.224.26 || exit 1
"$IPFW" add 400 set 1 skipto 450 all from any to 157.166.226.25 || exit 1
"$IPFW" add 410 set 1 skipto 450 all from any to 157.166.226.26 || exit 1
"$IPFW" add 420 set 1 skipto 450 all from any to 157.166.255.18 || exit 1
"$IPFW" add 430 set 1 skipto 450 all from any to 157.166.255.19 || exit 1
"$IPFW" add 440 set 1 permit all from any to any keep-state || exit 1
"$IPFW" add 380 set 1 skipto 460 all from any to www.google.com || exit 1
"$IPFW" add 390 set 1 skipto 460 all from any to 157.166.224.25 || exit 1
"$IPFW" add 400 set 1 skipto 460 all from any to 157.166.224.26 || exit 1
"$IPFW" add 410 set 1 skipto 460 all from any to 157.166.226.25 || exit 1
"$IPFW" add 420 set 1 skipto 460 all from any to 157.166.226.26 || exit 1
"$IPFW" add 430 set 1 skipto 460 all from any to 157.166.255.18 || exit 1
"$IPFW" add 440 set 1 skipto 460 all from any to 157.166.255.19 || exit 1
"$IPFW" add 450 set 1 permit all from any to any keep-state || exit 1
#
# Rule 11 (global)
"$IPFW" add 450 set 1 drop log all from any to any || exit 1
"$IPFW" add 460 set 1 drop log all from any to any || exit 1
#
# Rule fallback rule
# fallback rule
"$IPFW" add 460 set 1 drop all from any to any || exit 1
"$IPFW" add 470 set 1 drop all from any to any || exit 1
epilog_commands

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
#
# files: * firewall34.fw
#
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:57 2011 PST by vadim
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
#
# files: * firewall4.fw
#
@ -80,7 +80,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:57 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
#
# files: * firewall7.fw
#
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
# Generated Fri Jan 7 12:51:59 2011 PST by vadim
#
# files: * firewall8.fw
#
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:51:59 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
#
# files: * firewall9.fw
#
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:58 2011 PST by vadim
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
#
# files: * host.fw
#
@ -79,7 +79,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipfw v4.2.0.3425
#
# Generated Tue Jan 4 11:17:59 2011 PST by vadim
# Generated Fri Jan 7 12:52:00 2011 PST by vadim
#
# files: * mac.fw
#
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:17:59 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 12:52:00 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -2123,7 +2123,7 @@
<ClusterGroupOptions/>
</StateSyncClusterGroup>
</Cluster>
<Cluster id="id3433X13311" host_OS="linux24" inactive="False" lastCompiled="1265516307" lastInstalled="0" lastModified="1272731835" platform="iptables" name="heartbeat_cluster_1" comment="This is an example of linux/heartbeat cluster with two policy rule sets. Branching rule in the top policy passes control to rule set to_fw, which is different in member firewalls. See ticket #372 for explanation.&#10;" ro="False">
<Cluster id="id3433X13311" host_OS="linux24" inactive="False" lastCompiled="1265516307" lastInstalled="0" lastModified="1294434730" platform="iptables" name="heartbeat_cluster_1" comment="This is an example of linux/heartbeat cluster with two policy rule sets. Branching rule in the top policy passes control to rule set to_fw, which is different in member firewalls. See ticket #372 for explanation.&#10;" ro="False">
<NAT id="id3587X13311" name="NAT" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<NATRule id="id5131X78768" disabled="False" position="0" action="Translate" comment="">
<OSrc neg="False">
@ -2167,6 +2167,48 @@
</TSrv>
<NATRuleOptions/>
</NATRule>
<NATRule id="id108371X21712" disabled="False" group="" position="2" action="Translate" comment="">
<OSrc neg="False">
<ObjectRef ref="sysid0"/>
</OSrc>
<ODst neg="False">
<ObjectRef ref="id3441X13311"/>
</ODst>
<OSrv neg="False">
<ServiceRef ref="tcp-SSH"/>
</OSrv>
<TSrc neg="False">
<ObjectRef ref="sysid0"/>
</TSrc>
<TDst neg="False">
<ObjectRef ref="id99608X66859"/>
</TDst>
<TSrv neg="False">
<ServiceRef ref="sysid1"/>
</TSrv>
<NATRuleOptions/>
</NATRule>
<NATRule id="id323007X21712" disabled="False" group="" position="3" action="Translate" comment="">
<OSrc neg="False">
<ObjectRef ref="sysid0"/>
</OSrc>
<ODst neg="False">
<ObjectRef ref="id3448X13311"/>
</ODst>
<OSrv neg="False">
<ServiceRef ref="tcp-SSH"/>
</OSrv>
<TSrc neg="False">
<ObjectRef ref="sysid0"/>
</TSrc>
<TDst neg="False">
<ObjectRef ref="id99608X66859"/>
</TDst>
<TSrv neg="False">
<ServiceRef ref="sysid1"/>
</TSrv>
<NATRuleOptions/>
</NATRule>
<RuleSetOptions/>
</NAT>
<Policy id="id3465X13311" name="Policy" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
@ -2993,7 +3035,7 @@
</RoutingRule>
<RuleSetOptions/>
</Routing>
<Interface id="id3441X13311" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
<Interface id="id3441X13311" dedicated_failover="False" dyn="False" label="hb_cluster_1:eth0" mgmt="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
<IPv4 id="id3448X13311" name="heartbeat_cluster_1:eth0:ip" comment="" ro="False" address="172.24.0.1" netmask="255.255.0.0"/>
<InterfaceOptions>
<Option name="enable_stp">False</Option>

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:58 2011 PST by vadim
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
#
# files: * cluster1_secuwall-1.fw
#
@ -588,7 +588,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
log "Database was cluster-tests.fwb"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:38 2011 PST by vadim
# Generated Fri Jan 7 13:23:18 2011 PST by vadim
#
# files: * firewall-base-rulesets.fw
#
@ -445,7 +445,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:38 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:18 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:43 2011 PST by vadim
# Generated Fri Jan 7 13:23:24 2011 PST by vadim
#
# files: * firewall-ipv6-1.fw
#
@ -687,7 +687,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:43 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:24 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:49 2011 PST by vadim
# Generated Fri Jan 7 13:23:30 2011 PST by vadim
#
# files: * firewall-ipv6-2.fw
#
@ -930,7 +930,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:49 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:55 2011 PST by vadim
# Generated Fri Jan 7 13:23:36 2011 PST by vadim
#
# files: * firewall-ipv6-3.fw
#
@ -592,7 +592,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:55 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:36 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:07 2011 PST by vadim
# Generated Fri Jan 7 13:23:47 2011 PST by vadim
#
# files: * firewall-ipv6-4-1.fw
#
@ -539,7 +539,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:07 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:00 2011 PST by vadim
# Generated Fri Jan 7 13:23:41 2011 PST by vadim
#
# files: * firewall-ipv6-4.fw
#
@ -577,7 +577,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:00 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:09 2011 PST by vadim
# Generated Fri Jan 7 13:23:50 2011 PST by vadim
#
# files: * firewall-ipv6-5.fw
#
@ -412,7 +412,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:09 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:50 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:12 2011 PST by vadim
# Generated Fri Jan 7 13:23:52 2011 PST by vadim
#
# files: * firewall-ipv6-6.fw
#
@ -399,7 +399,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:12 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:52 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:15 2011 PST by vadim
# Generated Fri Jan 7 13:23:55 2011 PST by vadim
#
# files: * firewall-ipv6-7.fw
#
@ -443,7 +443,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:15 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:55 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:18 2011 PST by vadim
# Generated Fri Jan 7 13:23:58 2011 PST by vadim
#
# files: * firewall-ipv6-8.fw
#
@ -484,7 +484,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:18 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:20 2011 PST by vadim
# Generated Fri Jan 7 13:24:01 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-after-flush.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:20 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:01 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:23 2011 PST by vadim
# Generated Fri Jan 7 13:24:04 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-after-interfaces.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:04 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:26 2011 PST by vadim
# Generated Fri Jan 7 13:24:06 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-top.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:26 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:06 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:29 2011 PST by vadim
# Generated Fri Jan 7 13:24:09 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-after-flush.fw
#
@ -420,7 +420,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:29 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:09 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:31 2011 PST by vadim
# Generated Fri Jan 7 13:24:12 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-after-interfaces.fw
#
@ -420,7 +420,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:31 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:12 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:34 2011 PST by vadim
# Generated Fri Jan 7 13:24:14 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-top.fw
#
@ -420,7 +420,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:14 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:36 2011 PST by vadim
# Generated Fri Jan 7 13:24:16 2011 PST by vadim
#
# files: * firewall-server-1-s.fw
#
@ -393,7 +393,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:36 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:16 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:06 2011 PST by vadim
# Generated Fri Jan 7 13:19:46 2011 PST by vadim
#
# files: * firewall.fw
#
@ -1341,7 +1341,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:06 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:09 2011 PST by vadim
# Generated Fri Jan 7 13:19:50 2011 PST by vadim
#
# files: * firewall1.fw
#
@ -1252,7 +1252,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:09 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:50 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:11 2011 PST by vadim
# Generated Fri Jan 7 13:19:52 2011 PST by vadim
#
# files: * firewall10.fw
#
@ -473,7 +473,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:11 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:52 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:14 2011 PST by vadim
# Generated Fri Jan 7 13:19:54 2011 PST by vadim
#
# files: * firewall11.fw
#
@ -589,7 +589,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:14 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:54 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:16 2011 PST by vadim
# Generated Fri Jan 7 13:19:56 2011 PST by vadim
#
# files: * firewall12.fw
#
@ -511,7 +511,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:16 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:18 2011 PST by vadim
# Generated Fri Jan 7 13:19:58 2011 PST by vadim
#
# files: * firewall13.fw
#
@ -385,7 +385,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:18 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:20 2011 PST by vadim
# Generated Fri Jan 7 13:20:00 2011 PST by vadim
#
# files: * firewall14.fw
#
@ -404,7 +404,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:20 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:00 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:22 2011 PST by vadim
# Generated Fri Jan 7 13:20:03 2011 PST by vadim
#
# files: * firewall15.fw
#
@ -388,7 +388,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:22 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:03 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:24 2011 PST by vadim
# Generated Fri Jan 7 13:20:05 2011 PST by vadim
#
# files: * firewall16.fw
#
@ -492,7 +492,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:24 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:05 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:26 2011 PST by vadim
# Generated Fri Jan 7 13:20:07 2011 PST by vadim
#
# files: * firewall17.fw
#
@ -471,7 +471,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:26 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:07 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:29 2011 PST by vadim
# Generated Fri Jan 7 13:20:09 2011 PST by vadim
#
# files: * firewall18.fw
#
@ -504,7 +504,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:29 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:09 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:31 2011 PST by vadim
# Generated Fri Jan 7 13:20:11 2011 PST by vadim
#
# files: * firewall19.fw
#
@ -509,7 +509,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:31 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:44 2011 PST by vadim
# Generated Fri Jan 7 13:20:24 2011 PST by vadim
#
# files: * firewall2-1.fw
#
@ -1420,7 +1420,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:44 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:24 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:51 2011 PST by vadim
# Generated Fri Jan 7 13:20:32 2011 PST by vadim
#
# files: * firewall2-2.fw
#
@ -1249,7 +1249,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:51 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:32 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:56 2011 PST by vadim
# Generated Fri Jan 7 13:20:37 2011 PST by vadim
#
# files: * firewall2-3.fw
#
@ -1120,7 +1120,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:56 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:37 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:03 2011 PST by vadim
# Generated Fri Jan 7 13:20:43 2011 PST by vadim
#
# files: * firewall2-4.fw
#
@ -424,7 +424,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:03 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:43 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:08 2011 PST by vadim
# Generated Fri Jan 7 13:20:48 2011 PST by vadim
#
# files: * firewall2-5.fw
#
@ -453,7 +453,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:08 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:48 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:34 2011 PST by vadim
# Generated Fri Jan 7 13:20:15 2011 PST by vadim
#
# files: * firewall2.fw
#
@ -1470,7 +1470,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:15 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:39 2011 PST by vadim
# Generated Fri Jan 7 13:20:19 2011 PST by vadim
#
# files: * firewall20-ipv6.fw
#
@ -456,7 +456,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:39 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:19 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:36 2011 PST by vadim
# Generated Fri Jan 7 13:20:17 2011 PST by vadim
#
# files: * firewall20.fw
#
@ -674,7 +674,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:36 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:17 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:46 2011 PST by vadim
# Generated Fri Jan 7 13:20:27 2011 PST by vadim
#
# files: * firewall21-1.fw
#
@ -470,7 +470,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:46 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:27 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:41 2011 PST by vadim
# Generated Fri Jan 7 13:20:21 2011 PST by vadim
#
# files: * firewall21.fw
#
@ -469,7 +469,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:41 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:21 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:48 2011 PST by vadim
# Generated Fri Jan 7 13:20:29 2011 PST by vadim
#
# files: * firewall22.fw
#
@ -390,7 +390,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:48 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:29 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:58 2011 PST by vadim
# Generated Fri Jan 7 13:20:39 2011 PST by vadim
#
# files: * firewall23-1.fw
#
@ -564,7 +564,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:39 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:51:53 2011 PST by vadim
# Generated Fri Jan 7 13:20:34 2011 PST by vadim
#
# files: * firewall23.fw
#
@ -476,7 +476,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:51:53 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:34 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:01 2011 PST by vadim
# Generated Fri Jan 7 13:20:41 2011 PST by vadim
#
# files: * firewall24.fw
#
@ -493,7 +493,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:01 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:06 2011 PST by vadim
# Generated Fri Jan 7 13:20:46 2011 PST by vadim
#
# files: * firewall25.fw
#
@ -687,7 +687,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:06 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:10 2011 PST by vadim
# Generated Fri Jan 7 13:20:51 2011 PST by vadim
#
# files: * firewall26.fw
#
@ -562,7 +562,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:10 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:51 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:12 2011 PST by vadim
# Generated Fri Jan 7 13:20:53 2011 PST by vadim
#
# files: * firewall27.fw
#
@ -546,7 +546,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:12 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:53 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:15 2011 PST by vadim
# Generated Fri Jan 7 13:20:55 2011 PST by vadim
#
# files: * firewall28.fw
#
@ -407,7 +407,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:15 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:55 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:17 2011 PST by vadim
# Generated Fri Jan 7 13:20:57 2011 PST by vadim
#
# files: * firewall29.fw
#
@ -440,7 +440,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:17 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:57 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:19 2011 PST by vadim
# Generated Fri Jan 7 13:20:59 2011 PST by vadim
#
# files: * firewall3.fw
#
@ -578,7 +578,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:19 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:20:59 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:21 2011 PST by vadim
# Generated Fri Jan 7 13:21:02 2011 PST by vadim
#
# files: * firewall30.fw
#
@ -375,7 +375,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:21 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:23 2011 PST by vadim
# Generated Fri Jan 7 13:21:04 2011 PST by vadim
#
# files: * firewall31.fw
#
@ -445,7 +445,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:04 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:25 2011 PST by vadim
# Generated Fri Jan 7 13:21:06 2011 PST by vadim
#
# files: * firewall32.fw
#
@ -416,7 +416,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:25 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:06 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:33 2011 PST by vadim
# Generated Fri Jan 7 13:21:14 2011 PST by vadim
#
# files: * firewall33-1.fw
#
@ -393,10 +393,11 @@ script_body() {
#
$IPTABLES -N Cid438728A918346.0
$IPTABLES -A Policy -m state --state NEW -j Cid438728A918346.0
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.99 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.103 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.104 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.147 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.48 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.49 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.50 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.51 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.52 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.25 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.26 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.226.25 -j RETURN
@ -521,7 +522,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:33 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:14 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:29 2011 PST by vadim
# Generated Fri Jan 7 13:21:10 2011 PST by vadim
#
# files: * firewall33.fw
#
@ -442,10 +442,11 @@ script_body() {
$IPTABLES -A OUTPUT -m state --state NEW -j Cid438728A918346.0
$IPTABLES -A INPUT -m state --state NEW -j Cid438728A918346.0
$IPTABLES -A FORWARD -m state --state NEW -j Cid438728A918346.0
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.99 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.103 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.104 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.19.147 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.48 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.49 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.50 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.51 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 74.125.224.52 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.25 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.224.26 -j RETURN
$IPTABLES -A Cid438728A918346.0 -d 157.166.226.25 -j RETURN
@ -570,7 +571,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:29 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:10 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:36 2011 PST by vadim
# Generated Fri Jan 7 13:21:16 2011 PST by vadim
#
# files: * firewall34.fw
#
@ -636,7 +636,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:36 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:16 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:39 2011 PST by vadim
# Generated Fri Jan 7 13:21:19 2011 PST by vadim
#
# files: * firewall35.fw
#
@ -540,7 +540,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:39 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:19 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:43 2011 PST by vadim
# Generated Fri Jan 7 13:21:23 2011 PST by vadim
#
# files: * firewall36-1.fw
#
@ -433,7 +433,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:43 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:23 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:45 2011 PST by vadim
# Generated Fri Jan 7 13:21:25 2011 PST by vadim
#
# files: * firewall36-2.fw
#
@ -433,7 +433,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:45 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:25 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:41 2011 PST by vadim
# Generated Fri Jan 7 13:21:21 2011 PST by vadim
#
# files: * firewall36.fw
#
@ -535,7 +535,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:41 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:21 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:52 2011 PST by vadim
# Generated Fri Jan 7 13:21:32 2011 PST by vadim
#
# files: * firewall37-1.fw
#
@ -769,7 +769,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:52 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:49 2011 PST by vadim
# Generated Fri Jan 7 13:21:30 2011 PST by vadim
#
# files: * firewall37.fw
#
@ -1049,7 +1049,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:49 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:52:54 2011 PST by vadim
# Generated Fri Jan 7 13:21:34 2011 PST by vadim
#
# files: * firewall38.fw
#
@ -498,7 +498,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:52:54 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:34 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:00 2011 PST by vadim
# Generated Fri Jan 7 13:21:41 2011 PST by vadim
#
# files: * firewall39.fw
#
@ -876,7 +876,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:00 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:03 2011 PST by vadim
# Generated Fri Jan 7 13:21:43 2011 PST by vadim
#
# files: * firewall4.fw
#
@ -710,7 +710,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:03 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:07 2011 PST by vadim
# Generated Fri Jan 7 13:21:48 2011 PST by vadim
#
# files: * firewall40-1.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:07 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:48 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:10 2011 PST by vadim
# Generated Fri Jan 7 13:21:50 2011 PST by vadim
#
# files: * firewall40-2.fw
#
@ -437,7 +437,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:10 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:50 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:05 2011 PST by vadim
# Generated Fri Jan 7 13:21:46 2011 PST by vadim
#
# files: * firewall40.fw
#
@ -439,7 +439,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:05 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:19 2011 PST by vadim
# Generated Fri Jan 7 13:22:00 2011 PST by vadim
#
# files: * firewall41-1.fw
#
@ -575,7 +575,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:19 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:00 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:21 2011 PST by vadim
# Generated Fri Jan 7 13:22:02 2011 PST by vadim
#
# files: * firewall41-2.fw
#
@ -483,7 +483,7 @@ status_action() {
}
start() {
log "Activating firewall script generated Tue Jan 4 11:53:21 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:17 2011 PST by vadim
# Generated Fri Jan 7 13:21:58 2011 PST by vadim
#
# files: * firewall41.fw
#
@ -456,7 +456,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:17 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:21:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:23 2011 PST by vadim
# Generated Fri Jan 7 13:22:04 2011 PST by vadim
#
# files: * firewall42.fw
#
@ -382,7 +382,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:04 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:26 2011 PST by vadim
# Generated Fri Jan 7 13:22:06 2011 PST by vadim
#
# files: * firewall5.fw
#
@ -622,7 +622,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:26 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:06 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:28 2011 PST by vadim
# Generated Fri Jan 7 13:22:09 2011 PST by vadim
#
# files: * firewall50.fw
#
@ -407,7 +407,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:28 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:09 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:32 2011 PST by vadim
# Generated Fri Jan 7 13:22:13 2011 PST by vadim
#
# files: * firewall51.fw
#
@ -491,7 +491,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:32 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:13 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:34 2011 PST by vadim
# Generated Fri Jan 7 13:22:15 2011 PST by vadim
#
# files: * firewall6.fw
#
@ -513,7 +513,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:15 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:36 2011 PST by vadim
# Generated Fri Jan 7 13:22:17 2011 PST by vadim
#
# files: * firewall60.fw
#
@ -419,7 +419,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:36 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:17 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:39 2011 PST by vadim
# Generated Fri Jan 7 13:22:20 2011 PST by vadim
#
# files: * firewall61-1.2.5.fw
#
@ -499,7 +499,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:39 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:20 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:42 2011 PST by vadim
# Generated Fri Jan 7 13:22:22 2011 PST by vadim
#
# files: * firewall61-1.2.6.fw
#
@ -505,7 +505,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:22 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:45 2011 PST by vadim
# Generated Fri Jan 7 13:22:25 2011 PST by vadim
#
# files: * firewall61-1.3.x.fw
#
@ -492,7 +492,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:45 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:25 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:47 2011 PST by vadim
# Generated Fri Jan 7 13:22:28 2011 PST by vadim
#
# files: * firewall61-1.4.fw
#
@ -493,7 +493,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:47 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:28 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:50 2011 PST by vadim
# Generated Fri Jan 7 13:22:30 2011 PST by vadim
#
# files: * firewall62.fw
#
@ -543,7 +543,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:50 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:52 2011 PST by vadim
# Generated Fri Jan 7 13:22:32 2011 PST by vadim
#
# files: * firewall63.fw
#
@ -389,7 +389,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:52 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:54 2011 PST by vadim
# Generated Fri Jan 7 13:22:35 2011 PST by vadim
#
# files: * firewall7.fw
#
@ -473,7 +473,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:54 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:35 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:57 2011 PST by vadim
# Generated Fri Jan 7 13:22:37 2011 PST by vadim
#
# files: * firewall70.fw iptables.sh
#
@ -412,7 +412,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:57 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:37 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:53:59 2011 PST by vadim
# Generated Fri Jan 7 13:22:40 2011 PST by vadim
#
# files: * firewall71.fw
#
@ -428,7 +428,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:53:59 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:40 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:01 2011 PST by vadim
# Generated Fri Jan 7 13:22:42 2011 PST by vadim
#
# files: * firewall72-1.3.x.fw
#
@ -555,7 +555,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:01 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:42 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:04 2011 PST by vadim
# Generated Fri Jan 7 13:22:44 2011 PST by vadim
#
# files: * firewall72-1.4.3.fw
#
@ -555,7 +555,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:04 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:06 2011 PST by vadim
# Generated Fri Jan 7 13:22:47 2011 PST by vadim
#
# files: * firewall73.fw
#
@ -523,7 +523,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:06 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:08 2011 PST by vadim
# Generated Fri Jan 7 13:22:49 2011 PST by vadim
#
# files: * firewall74.fw
#
@ -375,7 +375,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:08 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:49 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:10 2011 PST by vadim
# Generated Fri Jan 7 13:22:51 2011 PST by vadim
#
# files: * firewall8.fw
#
@ -358,7 +358,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:10 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:51 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:12 2011 PST by vadim
# Generated Fri Jan 7 13:22:53 2011 PST by vadim
#
# files: * firewall80.fw
#
@ -399,7 +399,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:12 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:53 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:15 2011 PST by vadim
# Generated Fri Jan 7 13:22:56 2011 PST by vadim
#
# files: * firewall81.fw
#
@ -419,7 +419,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:15 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:18 2011 PST by vadim
# Generated Fri Jan 7 13:22:59 2011 PST by vadim
#
# files: * firewall82.fw
#
@ -414,7 +414,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:18 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:22:59 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:20 2011 PST by vadim
# Generated Fri Jan 7 13:23:01 2011 PST by vadim
#
# files: * firewall82_A.fw
#
@ -406,7 +406,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:20 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:01 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:23 2011 PST by vadim
# Generated Fri Jan 7 13:23:03 2011 PST by vadim
#
# files: * firewall82_B.fw
#
@ -363,7 +363,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:03 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:25 2011 PST by vadim
# Generated Fri Jan 7 13:23:06 2011 PST by vadim
#
# files: * firewall9.fw
#
@ -633,7 +633,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:25 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:06 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:27 2011 PST by vadim
# Generated Fri Jan 7 13:23:08 2011 PST by vadim
#
# files: * firewall90.fw
#
@ -383,7 +383,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:27 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:08 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:29 2011 PST by vadim
# Generated Fri Jan 7 13:23:10 2011 PST by vadim
#
# files: * firewall91.fw
#
@ -383,7 +383,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:29 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:10 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:32 2011 PST by vadim
# Generated Fri Jan 7 13:23:12 2011 PST by vadim
#
# files: * firewall92.fw
#
@ -419,7 +419,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:32 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:12 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:54:34 2011 PST by vadim
# Generated Fri Jan 7 13:23:15 2011 PST by vadim
#
# files: * firewall93.fw
#
@ -458,7 +458,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:54:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:23:15 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:40 2011 PST by vadim
# Generated Fri Jan 7 13:24:21 2011 PST by vadim
#
# files: * fw-A.fw
#
@ -722,7 +722,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:40 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:21 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:38 2011 PST by vadim
# Generated Fri Jan 7 13:24:19 2011 PST by vadim
#
# files: * fw1.fw
#
@ -519,7 +519,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:38 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:19 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
# Generated Fri Jan 7 13:24:40 2011 PST by vadim
#
# files: * heartbeat_cluster_1_d_linux-1-d.fw firewall.sh
#
@ -720,7 +720,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:40 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
# Generated Fri Jan 7 13:24:40 2011 PST by vadim
#
# files: * heartbeat_cluster_1_d_linux-2-d.fw firewall.sh
#
@ -723,7 +723,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:40 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
#
# files: * heartbeat_cluster_1_linux-1.fw
#
@ -412,6 +412,18 @@ script_body() {
echo "Rule 1 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 2 (NAT)
#
echo "Rule 2 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
#
# Rule 3 (NAT)
#
echo "Rule 3 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
@ -831,7 +843,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:59 2011 PST by vadim
# Generated Fri Jan 7 13:24:39 2011 PST by vadim
#
# files: * heartbeat_cluster_1_linux-2.fw
#
@ -317,6 +317,18 @@ script_body() {
echo "Rule 1 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 2 (NAT)
#
echo "Rule 2 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
#
# Rule 3 (NAT)
#
echo "Rule 3 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
@ -729,7 +741,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:59 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:39 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
#
# files: * heartbeat_cluster_2_linux-1.fw
#
@ -707,7 +707,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:00 2011 PST by vadim
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
#
# files: * heartbeat_cluster_2_linux-2.fw
#
@ -620,7 +620,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:00 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:43 2011 PST by vadim
# Generated Fri Jan 7 13:24:23 2011 PST by vadim
#
# files: * host.fw
#
@ -422,7 +422,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:43 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:23 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:45 2011 PST by vadim
# Generated Fri Jan 7 13:24:25 2011 PST by vadim
#
# files: * ipcop1.fw
#

905
test/ipt/linux-1.fw.orig Executable file
View File

@ -0,0 +1,905 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Fri Jan 7 13:12:17 2011 PST by vadim
#
# files: * linux-1.fw
#
# Compiled for iptables (any version)
#
#
# linux-1:to_fw:: warning: ignoring cluster rule set "to_fw" because member firewall "linux-1" has rule set with the same name.
FWBDEBUG=""
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
export PATH
LSMOD="/sbin/lsmod"
MODPROBE="/sbin/modprobe"
IPTABLES="/sbin/iptables"
IP6TABLES="/sbin/ip6tables"
IPTABLES_RESTORE="/sbin/iptables-restore"
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
IP="/sbin/ip"
IFCONFIG="/sbin/ifconfig"
VCONFIG="/sbin/vconfig"
BRCTL="/sbin/brctl"
IFENSLAVE="/sbin/ifenslave"
IPSET="/usr/sbin/ipset"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
test -x "$LOGGER" && $LOGGER -p info "$1"
}
getInterfaceVarName() {
echo $1 | sed 's/\./_/'
}
getaddr_internal() {
dev=$1
name=$2
af=$3
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getaddr() {
getaddr_internal $1 $2 "-4"
}
getaddr6() {
getaddr_internal $1 $2 "-6"
}
# function getinterfaces is used to process wildcard interfaces
getinterfaces() {
NAME=$1
$IP link show | grep ": $NAME" | while read L; do
OIFS=$IFS
IFS=" :"
set $L
IFS=$OIFS
echo $2
done
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
find_program() {
PGM=$1
$PGM </dev/null >/dev/null 2>&1; test $? = 127 && {
echo "$PGM not found"
exit 1
}
}
check_tools() {
find_program $IPTABLES
find_program $MODPROBE
find_program $IP
find_program $VCONFIG
}
reset_iptables_v4() {
$IPTABLES -P OUTPUT DROP
$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
cat /proc/net/ip_tables_names | while read table; do
$IPTABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IPTABLES -t $table -F $chain
fi
done
$IPTABLES -t $table -X
done
}
reset_iptables_v6() {
$IP6TABLES -P OUTPUT DROP
$IP6TABLES -P INPUT DROP
$IP6TABLES -P FORWARD DROP
cat /proc/net/ip6_tables_names | while read table; do
$IP6TABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IP6TABLES -t $table -F $chain
fi
done
$IP6TABLES -t $table -X
done
}
P2P_INTERFACE_WARNING=""
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
$IP addr show dev $interface | grep -q POINTOPOINT && {
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
P2P_INTERFACE_WARNING="yes"
return
}
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
echo $addr | grep -q ':' && {
$FWBDEBUG $IP addr $cmd $addr dev $interface
} || {
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
}
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
$FWBDEBUG $IP addr $cmd $addr dev $interface
}
$FWBDEBUG $IP link set $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
$IP addr ls dev $interface | \
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IP link show dev $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
clear_addresses_except_known_interfaces() {
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
while read intf; do
echo "# Removing addresses not configured in fwbuilder from interface $intf"
$FWBDEBUG $IP addr flush dev $intf scope global
$FWBDEBUG $IP link set $intf down
done
}
missing_vlan() {
vlan=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $vlan
subint=$1
parent=$2
IFS=$oldIFS
vlan_id=$(echo $subint | sed -r 's/(vlan|[^.]*\.)//')
test "$cmd" = "add" && {
echo $subint | grep -q "vlan" && name_type="VLAN_PLUS_VID" || name_type="DEV_PLUS_VID"
test "$vlan_id" \< "1" || name_type="${name_type}_NO_PAD"
echo "# Adding VLAN interface $subint (parent: $parent)"
$FWBDEBUG $VCONFIG set_name_type $name_type
$FWBDEBUG $VCONFIG $cmd $parent $vlan_id
$FWBDEBUG $IP link set $subint up
}
test "$cmd" = "rem" && {
echo "# Removing VLAN interface $subint (parent: $parent)"
$FWBDEBUG $VCONFIG $cmd $subint
}
}
parse_fwb_vlans() {
set $1
vlan_parent_interface=$1
shift
FWB_VLANS=$(
for subint in $*; do
echo "${subint}@$vlan_parent_interface"
done | sort
)
echo $FWB_VLANS
}
parse_current_vlans() {
vlan_parent_interface=$1
CURRENT_VLANS=""
PROC_DIR="/proc/net/vlan/"
test -d $PROC_DIR || $MODPROBE 8021q || {
echo "$PROC_DIR does not exist. Vlan interfaces are not available."
exit 1
}
test -f "/proc/net/vlan/config" && {
CURRENT_VLANS=$(
cat /proc/net/vlan/config | grep -v 'Dev name' | grep $vlan_parent_interface | \
while read subint a vlan_id b parent; do
echo "${subint}@$parent"
done | sort
)
}
echo $CURRENT_VLANS
}
update_vlans_of_interface() {
args="$1"
set $1
vlan_parent_interface=$1
FWB_VLANS=$(parse_fwb_vlans "$args")
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
$IP link set $vlan_parent_interface up
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
}
add_vlans() {
args="$1"
set $1
vlan_parent_interface=$1
FWB_VLANS=$(parse_fwb_vlans $args)
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
$IP link set $vlan_parent_interface up
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
}
clear_vlans_except_known() {
FWB_VLANS=$*
CURRENT_VLANS=$(parse_current_vlans '|')
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
}
check_file() {
test -r "$2" || {
echo "Can not find file $2 referenced by address table object $1"
exit 1
}
}
check_run_time_address_table_files() {
:
}
load_modules() {
:
OPTS=$1
MODULES_DIR="/lib/modules/`uname -r`/kernel/net/"
MODULES=$(find $MODULES_DIR -name '*conntrack*' \! -name '*ipv6*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')
echo $OPTS | grep -q nat && {
MODULES="$MODULES $(find $MODULES_DIR -name '*nat*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
}
echo $OPTS | grep -q ipv6 && {
MODULES="$MODULES $(find $MODULES_DIR -name nf_conntrack_ipv6|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
}
for module in $MODULES; do
if $LSMOD | grep ${module} >/dev/null; then continue; fi
$MODPROBE ${module} || exit 1
done
}
verify_interfaces() {
:
echo "Verifying interfaces: eth0 eth1 lo eth0.100"
for i in eth0 eth1 lo eth0.100 ; do
$IP link show "$i" > /dev/null 2>&1 || {
log "Interface $i does not exist"
exit 1
}
done
}
prolog_commands() {
echo "Running prolog script"
}
epilog_commands() {
echo "Running epilog script"
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
# Configure interfaces
update_vlans_of_interface "eth0 eth0.100"
clear_vlans_except_known eth0.100@eth0
update_addresses_of_interface "eth0 172.24.0.2/16" "172.24.0.1/16"
update_addresses_of_interface "eth1 192.168.1.2/24" "192.168.1.1/24"
update_addresses_of_interface "lo 127.0.0.1/8" ""
update_addresses_of_interface "eth0.100 192.168.100.1/24" ""
}
script_body() {
# ================ IPv4
# ================ Table 'filter', automatic rules
# accept established sessions
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# ================ Table 'nat', rule set NAT
#
# Rule 0 (NAT)
#
echo "Rule 0 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 1 (NAT)
#
echo "Rule 1 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 2 (NAT)
#
echo "Rule 2 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.2 --dport 22 -j DNAT --to-destination 192.168.1.100
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 192.168.100.1 --dport 22 -j DNAT --to-destination 192.168.1.100
#
# Rule 3 (NAT)
#
echo "Rule 3 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
# ================ Table 'filter', rule set to_fw
#
# Rule to_fw 0 (global)
#
echo "Rule to_fw 0 (global)"
#
# hashlimit 10/sec
$IPTABLES -N to_fw
$IPTABLES -N to_fw_0
$IPTABLES -A to_fw -m hashlimit --hashlimit 10/second --hashlimit-name htable_rule_0 -j to_fw_0
$IPTABLES -A to_fw_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY "
$IPTABLES -A to_fw_0 -j DROP
# ================ Table 'filter', rule set Policy
#
# Rule -4 heartbeat (automatic)
#
echo "Rule -4 heartbeat (automatic)"
#
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j ACCEPT
#
# Rule -3 heartbeat (automatic)
#
echo "Rule -3 heartbeat (automatic)"
#
$IPTABLES -A INPUT -i eth0 -p udp -m udp -s 172.24.0.3 -d 224.0.10.100 --dport 694 -j ACCEPT
#
# Rule -2 CONNTRACK (automatic)
#
echo "Rule -2 CONNTRACK (automatic)"
#
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
#
# Rule -1 CONNTRACK (automatic)
#
echo "Rule -1 CONNTRACK (automatic)"
#
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
#
# Rule 0 (eth0)
#
echo "Rule 0 (eth0)"
#
$IPTABLES -A INPUT -i eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
#
# Rule 1 (eth0)
#
echo "Rule 1 (eth0)"
#
# anti spoofing rule
$IPTABLES -N In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 172.24.0.2 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.2 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.100.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.2 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.2 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.100.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
$IPTABLES -A In_RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY "
$IPTABLES -A In_RULE_1 -j DROP
#
# Rule 2 (lo)
#
echo "Rule 2 (lo)"
#
$IPTABLES -A INPUT -i lo -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o lo -m state --state NEW -j ACCEPT
#
# Rule 3 (global)
#
echo "Rule 3 (global)"
#
# SSH Access to firewall is permitted
# only from internal network
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 4 (global)
#
echo "Rule 4 (global)"
#
# SSH Access to firewall is permitted
# only from internal network
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 5 (global)
#
echo "Rule 5 (global)"
#
# Firewall uses one of the machines
# on internal network for DNS
$IPTABLES -N RULE_5
$IPTABLES -A OUTPUT -p tcp -m tcp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
$IPTABLES -A OUTPUT -p udp -m udp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
$IPTABLES -A RULE_5 -j LOG --log-level info --log-prefix "RULE 5 -- ACCEPT "
$IPTABLES -A RULE_5 -j ACCEPT
#
# Rule 6 (global)
#
echo "Rule 6 (global)"
#
# branch rule set is different in members linux-1 and linux-2
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
$IPTABLES -A INPUT -j to_fw
#
# Rule 7 (global)
#
echo "Rule 7 (global)"
#
# branch rule set is different in members linux-1 and linux-2
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
$IPTABLES -A INPUT -j to_fw
#
# Rule 8 (global)
#
echo "Rule 8 (global)"
#
$IPTABLES -A OUTPUT -d 172.24.0.1 -j DROP
$IPTABLES -A OUTPUT -d 172.24.0.2 -j DROP
$IPTABLES -A OUTPUT -d 192.168.1.1 -j DROP
$IPTABLES -A OUTPUT -d 192.168.1.2 -j DROP
$IPTABLES -A OUTPUT -d 192.168.100.1 -j DROP
$IPTABLES -A INPUT -j DROP
#
# Rule 9 (global)
#
echo "Rule 9 (global)"
#
$IPTABLES -A INPUT -j DROP
#
# Rule 10 (global)
#
echo "Rule 10 (global)"
#
# fw is part of any
$IPTABLES -N Cid997025X96143.0
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid997025X96143.0
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.2 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 11 (global)
#
echo "Rule 11 (global)"
#
# fw is NOT part of any
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 12 (global)
#
echo "Rule 12 (global)"
#
# fw is NOT part of any
$IPTABLES -N Cid143289X96143.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143289X96143.0
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid143289X96143.0 -s 192.168.100.1 -j ACCEPT
#
# Rule 13 (global)
#
echo "Rule 13 (global)"
#
# fw is NOT part of any
$IPTABLES -N Cid1946680X96143.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1946680X96143.0
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid1946680X96143.0 -s 192.168.100.1 -j ACCEPT
#
# Rule 14 (eth0)
#
echo "Rule 14 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid378955X96143.0
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.0
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid378955X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -N Cid378955X96143.1
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.1
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid378955X96143.1 -s 192.168.100.1 -j ACCEPT
#
# Rule 15 (eth0)
#
echo "Rule 15 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid1801407X96143.0
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1801407X96143.0
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid1801407X96143.0 -s 192.168.100.1 -j ACCEPT
#
# Rule 16 (global)
#
echo "Rule 16 (global)"
#
# fw is NOT part of any
$IPTABLES -N Cid143343X96143.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143343X96143.0
$IPTABLES -A Cid143343X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid143343X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A FORWARD -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 17 (eth0)
#
echo "Rule 17 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid2241935X96143.0
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.0
$IPTABLES -A Cid2241935X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241935X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -N Cid2241935X96143.1
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.1
$IPTABLES -A Cid2241935X96143.1 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241935X96143.1 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 18 (eth0)
#
echo "Rule 18 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid2241981X96143.0
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241981X96143.0
$IPTABLES -A Cid2241981X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241981X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 19 (global)
#
echo "Rule 19 (global)"
#
# using interface of another cluster in the rule
$IPTABLES -N Cid8228X45618.0
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid8228X45618.0
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.2 -j ACCEPT
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.100 -j ACCEPT
#
# Rule 20 (global)
#
echo "Rule 20 (global)"
#
$IPTABLES -N Cid147047X84105.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid147047X84105.0
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.2 -j ACCEPT
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.100 -j ACCEPT
#
# Rule 21 (global)
#
echo "Rule 21 (global)"
#
$IPTABLES -N RULE_21
$IPTABLES -A OUTPUT -m state --state NEW -j RULE_21
$IPTABLES -A INPUT -m state --state NEW -j RULE_21
$IPTABLES -A FORWARD -m state --state NEW -j RULE_21
$IPTABLES -A RULE_21 -j LOG --log-level info --log-prefix "RULE 21 -- DENY "
$IPTABLES -A RULE_21 -j DROP
#
# Rule 22 (global)
#
echo "Rule 22 (global)"
#
$IPTABLES -N RULE_22
$IPTABLES -A OUTPUT -j RULE_22
$IPTABLES -A INPUT -j RULE_22
$IPTABLES -A FORWARD -j RULE_22
$IPTABLES -A RULE_22 -j LOG --log-level info --log-prefix "RULE 22 -- DENY "
$IPTABLES -A RULE_22 -j DROP
# ============== ROUTING RULES ==============
TMPDIRNAME="/tmp/.fwbuilder.tempdir.$$"
TMPFILENAME="$TMPDIRNAME/.fwbuilder.out"
(umask 077 && mkdir $TMPDIRNAME) || exit 1
#
# This function stops stdout redirection
# and sends previously saved output to terminal
restore_script_output()
{
exec 1>&3 2>&1
cat $TMPFILENAME
rm -rf $TMPDIRNAME
}
# if any routing rule fails we do our best to prevent freezing the firewall
route_command_error()
{
echo "Error: Routing rule $1 couldn't be activated"
echo "Recovering previous routing configuration..."
# delete current routing rules
$IP route show | while read route ; do $IP route del $route ; done
# restore old routing rules
(IFS="
"; for route in $oldRoutes; do (IFS=' '; $IP route add $route); done)
echo "...done"
restore_script_output
epilog_commands
exit 1
}
# redirect output to prevent ssh session from stalling
exec 3>&1
exec 1> $TMPFILENAME
exec 2>&1
# store previous routing configuration (sort: 'via' GW has to be
# inserted after device routes)
oldRoutes=$($IP route show | sort -k 2)
echo "Deleting routing rules previously set by user space processes..."
$IP route show | grep -v '\( proto kernel \)\|\(default via \)' | \
while read route ; do $IP route del $route ; done
echo "Activating non-ecmp routing rules..."
#
# Rule 0 (main)
#
echo "Routing rule 0 (main)"
#
#
#
$IP route add 172.24.1.0/24 via 172.24.0.100 dev eth0 \
|| route_command_error "0 (main)"
restore_script_output
echo "...done."
}
ip_forward() {
:
echo 1 > /proc/sys/net/ipv4/ip_forward
}
reset_all() {
:
reset_iptables_v4
}
block_action() {
reset_all
}
stop_action() {
reset_all
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
}
check_iptables() {
IP_TABLES="$1"
[ ! -e $IP_TABLES ] && return 151
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
[ -z "$NF_TABLES" ] && return 152
return 0
}
status_action() {
check_iptables "/proc/net/ip_tables_names"
ret_ipv4=$?
check_iptables "/proc/net/ip6_tables_names"
ret_ipv6=$?
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
echo "iptables modules are not loaded"
}
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
echo "Firewall is not configured"
}
exit 3
}
# See how we were called.
# For backwards compatibility missing argument is equivalent to 'start'
cmd=$1
test -z "$cmd" && {
cmd="start"
}
case "$cmd" in
start)
log "Activating firewall script generated Fri Jan 7 13:12:17 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files
load_modules "nat "
configure_interfaces
verify_interfaces
reset_all
script_body
ip_forward
epilog_commands
RETVAL=$?
;;
stop)
stop_action
RETVAL=$?
;;
status)
status_action
RETVAL=$?
;;
block)
block_action
RETVAL=$?
;;
reload)
$0 stop
$0 start
RETVAL=$?
;;
interfaces)
configure_interfaces
RETVAL=$?
;;
test_interfaces)
FWBDEBUG="echo"
configure_interfaces
RETVAL=$?
;;
*)
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
;;
esac
exit $RETVAL

802
test/ipt/linux-2.fw.orig Executable file
View File

@ -0,0 +1,802 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Fri Jan 7 13:12:17 2011 PST by vadim
#
# files: * linux-2.fw
#
# Compiled for iptables (any version)
#
# linux-2:to_fw:: warning: ignoring cluster rule set "to_fw" because member firewall "linux-2" has rule set with the same name.
FWBDEBUG=""
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
export PATH
LSMOD="/sbin/lsmod"
MODPROBE="/sbin/modprobe"
IPTABLES="/sbin/iptables"
IP6TABLES="/sbin/ip6tables"
IPTABLES_RESTORE="/sbin/iptables-restore"
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
IP="/sbin/ip"
IFCONFIG="/sbin/ifconfig"
VCONFIG="/sbin/vconfig"
BRCTL="/sbin/brctl"
IFENSLAVE="/sbin/ifenslave"
IPSET="/usr/sbin/ipset"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
test -x "$LOGGER" && $LOGGER -p info "$1"
}
getInterfaceVarName() {
echo $1 | sed 's/\./_/'
}
getaddr_internal() {
dev=$1
name=$2
af=$3
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getaddr() {
getaddr_internal $1 $2 "-4"
}
getaddr6() {
getaddr_internal $1 $2 "-6"
}
# function getinterfaces is used to process wildcard interfaces
getinterfaces() {
NAME=$1
$IP link show | grep ": $NAME" | while read L; do
OIFS=$IFS
IFS=" :"
set $L
IFS=$OIFS
echo $2
done
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
find_program() {
PGM=$1
$PGM </dev/null >/dev/null 2>&1; test $? = 127 && {
echo "$PGM not found"
exit 1
}
}
check_tools() {
find_program $IPTABLES
find_program $MODPROBE
find_program $IP
}
reset_iptables_v4() {
$IPTABLES -P OUTPUT DROP
$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
cat /proc/net/ip_tables_names | while read table; do
$IPTABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IPTABLES -t $table -F $chain
fi
done
$IPTABLES -t $table -X
done
}
reset_iptables_v6() {
$IP6TABLES -P OUTPUT DROP
$IP6TABLES -P INPUT DROP
$IP6TABLES -P FORWARD DROP
cat /proc/net/ip6_tables_names | while read table; do
$IP6TABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IP6TABLES -t $table -F $chain
fi
done
$IP6TABLES -t $table -X
done
}
P2P_INTERFACE_WARNING=""
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
$IP addr show dev $interface | grep -q POINTOPOINT && {
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
P2P_INTERFACE_WARNING="yes"
return
}
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
echo $addr | grep -q ':' && {
$FWBDEBUG $IP addr $cmd $addr dev $interface
} || {
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
}
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
$FWBDEBUG $IP addr $cmd $addr dev $interface
}
$FWBDEBUG $IP link set $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
$IP addr ls dev $interface | \
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IP link show dev $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
clear_addresses_except_known_interfaces() {
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
while read intf; do
echo "# Removing addresses not configured in fwbuilder from interface $intf"
$FWBDEBUG $IP addr flush dev $intf scope global
$FWBDEBUG $IP link set $intf down
done
}
check_file() {
test -r "$2" || {
echo "Can not find file $2 referenced by address table object $1"
exit 1
}
}
check_run_time_address_table_files() {
:
}
load_modules() {
:
OPTS=$1
MODULES_DIR="/lib/modules/`uname -r`/kernel/net/"
MODULES=$(find $MODULES_DIR -name '*conntrack*' \! -name '*ipv6*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')
echo $OPTS | grep -q nat && {
MODULES="$MODULES $(find $MODULES_DIR -name '*nat*'|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
}
echo $OPTS | grep -q ipv6 && {
MODULES="$MODULES $(find $MODULES_DIR -name nf_conntrack_ipv6|sed -e 's/^.*\///' -e 's/\([^\.]\)\..*/\1/')"
}
for module in $MODULES; do
if $LSMOD | grep ${module} >/dev/null; then continue; fi
$MODPROBE ${module} || exit 1
done
}
verify_interfaces() {
:
echo "Verifying interfaces: eth0 eth1 lo"
for i in eth0 eth1 lo ; do
$IP link show "$i" > /dev/null 2>&1 || {
log "Interface $i does not exist"
exit 1
}
done
}
prolog_commands() {
echo "Running prolog script"
}
epilog_commands() {
echo "Running epilog script"
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
# Configure interfaces
update_addresses_of_interface "eth0 172.24.0.3/16" "172.24.0.1/16"
update_addresses_of_interface "eth1 192.168.1.3/24" "192.168.1.1/24"
update_addresses_of_interface "lo 127.0.0.1/8" ""
}
script_body() {
# ================ IPv4
# ================ Table 'filter', automatic rules
# accept established sessions
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# ================ Table 'nat', rule set NAT
#
# Rule 0 (NAT)
#
echo "Rule 0 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 1 (NAT)
#
echo "Rule 1 (NAT)"
#
$IPTABLES -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j SNAT --to-source 172.24.0.1
#
# Rule 2 (NAT)
#
echo "Rule 2 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.3 --dport 22 -j DNAT --to-destination 192.168.1.100
#
# Rule 3 (NAT)
#
echo "Rule 3 (NAT)"
#
$IPTABLES -t nat -A PREROUTING -p tcp -m tcp -d 172.24.0.1 --dport 22 -j DNAT --to-destination 192.168.1.100
# ================ Table 'filter', rule set to_fw
#
# Rule to_fw 0 (global)
#
echo "Rule to_fw 0 (global)"
#
# hashlimit 20/sec
$IPTABLES -N to_fw
$IPTABLES -N to_fw_0
$IPTABLES -A to_fw -m hashlimit --hashlimit 20/second --hashlimit-name htable_rule_0 -j to_fw_0
$IPTABLES -A to_fw_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY "
$IPTABLES -A to_fw_0 -j DROP
# ================ Table 'filter', rule set Policy
#
# Rule -4 heartbeat (automatic)
#
echo "Rule -4 heartbeat (automatic)"
#
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j ACCEPT
#
# Rule -3 heartbeat (automatic)
#
echo "Rule -3 heartbeat (automatic)"
#
$IPTABLES -N C.0
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 224.0.10.100 --dport 694 -j C.0
$IPTABLES -A C.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A C.0 -s 192.168.100.1 -j ACCEPT
#
# Rule -2 CONNTRACK (automatic)
#
echo "Rule -2 CONNTRACK (automatic)"
#
$IPTABLES -A OUTPUT -o eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
#
# Rule -1 CONNTRACK (automatic)
#
echo "Rule -1 CONNTRACK (automatic)"
#
$IPTABLES -A INPUT -i eth0 -p udp -m udp -d 225.0.0.50 --dport 3781 -j ACCEPT
#
# Rule 0 (eth0)
#
echo "Rule 0 (eth0)"
#
$IPTABLES -A INPUT -i eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o eth0 -p vrrp -d 224.0.0.18 -m state --state NEW -j ACCEPT
#
# Rule 1 (eth0)
#
echo "Rule 1 (eth0)"
#
# anti spoofing rule
$IPTABLES -N In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 172.24.0.3 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.3 -m state --state NEW -j In_RULE_1
$IPTABLES -A INPUT -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 172.24.0.3 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.1 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.3 -m state --state NEW -j In_RULE_1
$IPTABLES -A FORWARD -i eth0 -s 192.168.1.0/24 -m state --state NEW -j In_RULE_1
$IPTABLES -A In_RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY "
$IPTABLES -A In_RULE_1 -j DROP
#
# Rule 2 (lo)
#
echo "Rule 2 (lo)"
#
$IPTABLES -A INPUT -i lo -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -o lo -m state --state NEW -j ACCEPT
#
# Rule 3 (global)
#
echo "Rule 3 (global)"
#
# SSH Access to firewall is permitted
# only from internal network
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 4 (global)
#
echo "Rule 4 (global)"
#
# SSH Access to firewall is permitted
# only from internal network
$IPTABLES -A INPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -A OUTPUT -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -A FORWARD -p tcp -m tcp -s 192.168.1.0/24 -d 192.168.1.2 --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 5 (global)
#
echo "Rule 5 (global)"
#
# Firewall uses one of the machines
# on internal network for DNS
$IPTABLES -N RULE_5
$IPTABLES -A OUTPUT -p tcp -m tcp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
$IPTABLES -A OUTPUT -p udp -m udp -d 192.168.1.0/24 --dport 53 -m state --state NEW -j RULE_5
$IPTABLES -A RULE_5 -j LOG --log-level info --log-prefix "RULE 5 -- ACCEPT "
$IPTABLES -A RULE_5 -j ACCEPT
#
# Rule 6 (global)
#
echo "Rule 6 (global)"
#
# branch rule set is different in members linux-1 and linux-2
$IPTABLES -A OUTPUT -d 172.24.0.1 -j to_fw
$IPTABLES -A OUTPUT -d 172.24.0.3 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.1 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.3 -j to_fw
$IPTABLES -A INPUT -j to_fw
#
# Rule 7 (global)
#
echo "Rule 7 (global)"
#
# branch rule set is different in members linux-1 and linux-2
$IPTABLES -A OUTPUT -d 172.24.0.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.1.2 -j to_fw
$IPTABLES -A OUTPUT -d 192.168.100.1 -j to_fw
$IPTABLES -A FORWARD -d 172.24.0.2 -j to_fw
$IPTABLES -A FORWARD -d 192.168.1.2 -j to_fw
$IPTABLES -A FORWARD -d 192.168.100.1 -j to_fw
#
# Rule 8 (global)
#
echo "Rule 8 (global)"
#
$IPTABLES -A OUTPUT -d 172.24.0.1 -j DROP
$IPTABLES -A OUTPUT -d 172.24.0.3 -j DROP
$IPTABLES -A OUTPUT -d 192.168.1.1 -j DROP
$IPTABLES -A OUTPUT -d 192.168.1.3 -j DROP
$IPTABLES -A INPUT -j DROP
#
# Rule 9 (global)
#
echo "Rule 9 (global)"
#
$IPTABLES -A INPUT -j DROP
#
# Rule 10 (global)
#
echo "Rule 10 (global)"
#
# fw is part of any
$IPTABLES -N Cid997025X96143.0
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid997025X96143.0
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 172.24.0.3 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid997025X96143.0 -s 192.168.1.3 -j ACCEPT
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 11 (global)
#
echo "Rule 11 (global)"
#
# fw is NOT part of any
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT
#
# Rule 12 (global)
#
echo "Rule 12 (global)"
#
# fw is NOT part of any
$IPTABLES -N Cid143289X96143.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143289X96143.0
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid143289X96143.0 -s 172.24.0.3 -j ACCEPT
#
# Rule 13 (global)
#
echo "Rule 13 (global)"
#
# fw is NOT part of any
$IPTABLES -N Cid1946680X96143.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1946680X96143.0
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid1946680X96143.0 -s 172.24.0.3 -j ACCEPT
#
# Rule 14 (eth0)
#
echo "Rule 14 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid378955X96143.0
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.0
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid378955X96143.0 -s 172.24.0.3 -j ACCEPT
$IPTABLES -N Cid378955X96143.1
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid378955X96143.1
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid378955X96143.1 -s 172.24.0.3 -j ACCEPT
#
# Rule 15 (eth0)
#
echo "Rule 15 (eth0)"
#
# fw is NOT part of any
$IPTABLES -N Cid1801407X96143.0
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid1801407X96143.0
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.1 -j ACCEPT
$IPTABLES -A Cid1801407X96143.0 -s 172.24.0.3 -j ACCEPT
#
# Rule 16 (global)
#
echo "Rule 16 (global)"
#
# fw is NOT part of any
$IPTABLES -A OUTPUT -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -N Cid143343X96143.0
$IPTABLES -A FORWARD -p tcp -m tcp --dport 22 -m state --state NEW -j Cid143343X96143.0
$IPTABLES -A Cid143343X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid143343X96143.0 -s 192.168.100.1 -j ACCEPT
#
# Rule 17 (eth0)
#
echo "Rule 17 (eth0)"
#
# fw is NOT part of any
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -N Cid2241935X96143.0
$IPTABLES -A FORWARD -i eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.0
$IPTABLES -A Cid2241935X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241935X96143.0 -s 192.168.100.1 -j ACCEPT
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -N Cid2241935X96143.1
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241935X96143.1
$IPTABLES -A Cid2241935X96143.1 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241935X96143.1 -s 192.168.100.1 -j ACCEPT
#
# Rule 18 (eth0)
#
echo "Rule 18 (eth0)"
#
# fw is NOT part of any
$IPTABLES -A OUTPUT -o eth0 -p tcp -m tcp -s 172.24.0.3 --dport 22 -m state --state NEW -j ACCEPT
$IPTABLES -N Cid2241981X96143.0
$IPTABLES -A FORWARD -o eth0 -p tcp -m tcp --dport 22 -m state --state NEW -j Cid2241981X96143.0
$IPTABLES -A Cid2241981X96143.0 -s 172.24.0.2 -j ACCEPT
$IPTABLES -A Cid2241981X96143.0 -s 192.168.100.1 -j ACCEPT
#
# Rule 19 (global)
#
echo "Rule 19 (global)"
#
# using interface of another cluster in the rule
$IPTABLES -N Cid8228X45618.0
$IPTABLES -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid8228X45618.0
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.2 -j ACCEPT
$IPTABLES -A Cid8228X45618.0 -s 192.168.1.100 -j ACCEPT
#
# Rule 20 (global)
#
echo "Rule 20 (global)"
#
$IPTABLES -N Cid147047X84105.0
$IPTABLES -A OUTPUT -p tcp -m tcp --dport 22 -m state --state NEW -j Cid147047X84105.0
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.1 -j ACCEPT
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.2 -j ACCEPT
$IPTABLES -A Cid147047X84105.0 -d 192.168.1.100 -j ACCEPT
#
# Rule 21 (global)
#
echo "Rule 21 (global)"
#
$IPTABLES -N RULE_21
$IPTABLES -A OUTPUT -m state --state NEW -j RULE_21
$IPTABLES -A INPUT -m state --state NEW -j RULE_21
$IPTABLES -A FORWARD -m state --state NEW -j RULE_21
$IPTABLES -A RULE_21 -j LOG --log-level info --log-prefix "RULE 21 -- DENY "
$IPTABLES -A RULE_21 -j DROP
#
# Rule 22 (global)
#
echo "Rule 22 (global)"
#
$IPTABLES -N RULE_22
$IPTABLES -A OUTPUT -j RULE_22
$IPTABLES -A INPUT -j RULE_22
$IPTABLES -A FORWARD -j RULE_22
$IPTABLES -A RULE_22 -j LOG --log-level info --log-prefix "RULE 22 -- DENY "
$IPTABLES -A RULE_22 -j DROP
# ============== ROUTING RULES ==============
TMPDIRNAME="/tmp/.fwbuilder.tempdir.$$"
TMPFILENAME="$TMPDIRNAME/.fwbuilder.out"
(umask 077 && mkdir $TMPDIRNAME) || exit 1
#
# This function stops stdout redirection
# and sends previously saved output to terminal
restore_script_output()
{
exec 1>&3 2>&1
cat $TMPFILENAME
rm -rf $TMPDIRNAME
}
# if any routing rule fails we do our best to prevent freezing the firewall
route_command_error()
{
echo "Error: Routing rule $1 couldn't be activated"
echo "Recovering previous routing configuration..."
# delete current routing rules
$IP route show | while read route ; do $IP route del $route ; done
# restore old routing rules
(IFS="
"; for route in $oldRoutes; do (IFS=' '; $IP route add $route); done)
echo "...done"
restore_script_output
epilog_commands
exit 1
}
# redirect output to prevent ssh session from stalling
exec 3>&1
exec 1> $TMPFILENAME
exec 2>&1
# store previous routing configuration (sort: 'via' GW has to be
# inserted after device routes)
oldRoutes=$($IP route show | sort -k 2)
echo "Deleting routing rules previously set by user space processes..."
$IP route show | grep -v '\( proto kernel \)\|\(default via \)' | \
while read route ; do $IP route del $route ; done
echo "Activating non-ecmp routing rules..."
#
# Rule 0 (main)
#
echo "Routing rule 0 (main)"
#
#
#
$IP route add 172.24.1.0/24 via 172.24.0.100 dev eth0 \
|| route_command_error "0 (main)"
restore_script_output
echo "...done."
}
ip_forward() {
:
echo 1 > /proc/sys/net/ipv4/ip_forward
}
reset_all() {
:
reset_iptables_v4
}
block_action() {
reset_all
}
stop_action() {
reset_all
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
}
check_iptables() {
IP_TABLES="$1"
[ ! -e $IP_TABLES ] && return 151
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
[ -z "$NF_TABLES" ] && return 152
return 0
}
status_action() {
check_iptables "/proc/net/ip_tables_names"
ret_ipv4=$?
check_iptables "/proc/net/ip6_tables_names"
ret_ipv6=$?
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
echo "iptables modules are not loaded"
}
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
echo "Firewall is not configured"
}
exit 3
}
# See how we were called.
# For backwards compatibility missing argument is equivalent to 'start'
cmd=$1
test -z "$cmd" && {
cmd="start"
}
case "$cmd" in
start)
log "Activating firewall script generated Fri Jan 7 13:12:17 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files
load_modules "nat "
configure_interfaces
verify_interfaces
reset_all
script_body
ip_forward
epilog_commands
RETVAL=$?
;;
stop)
stop_action
RETVAL=$?
;;
status)
status_action
RETVAL=$?
;;
block)
block_action
RETVAL=$?
;;
reload)
$0 stop
$0 start
RETVAL=$?
;;
interfaces)
configure_interfaces
RETVAL=$?
;;
test_interfaces)
FWBDEBUG="echo"
configure_interfaces
RETVAL=$?
;;
*)
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
;;
esac
exit $RETVAL

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
# Generated Fri Jan 7 13:24:41 2011 PST by vadim
#
# files: * openais_cluster_1_linux-1.fw
#
@ -707,7 +707,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
#
# files: * openais_cluster_1_linux-2.fw
#
@ -611,7 +611,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:47 2011 PST by vadim
# Generated Fri Jan 7 13:24:27 2011 PST by vadim
#
# files: * rh90.fw
#
@ -421,7 +421,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:47 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:27 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:01 2011 PST by vadim
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
#
# files: * secuwall_cluster_1_secuwall-1.fw
#
@ -405,7 +405,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:01 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
log "Database was cluster-tests.fwb"
check_tools
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
#
# files: * server-cluster-1_server-1.fw
#
@ -398,7 +398,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
# Generated Fri Jan 7 13:24:42 2011 PST by vadim
#
# files: * server-cluster-1_server-2.fw
#
@ -397,7 +397,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:42 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:52 2011 PST by vadim
# Generated Fri Jan 7 13:24:32 2011 PST by vadim
#
# files: * test-shadowing-1.fw
#
@ -461,7 +461,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:52 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:54 2011 PST by vadim
# Generated Fri Jan 7 13:24:35 2011 PST by vadim
#
# files: * test-shadowing-2.fw
#
@ -423,7 +423,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:54 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:35 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:58 2011 PST by vadim
# Generated Fri Jan 7 13:24:38 2011 PST by vadim
#
# files: * test-shadowing-3.fw
#
@ -474,7 +474,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:58 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:38 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:55:50 2011 PST by vadim
# Generated Fri Jan 7 13:24:30 2011 PST by vadim
#
# files: * test_fw.fw
#
@ -570,7 +570,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:55:50 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:02 2011 PST by vadim
# Generated Fri Jan 7 13:24:43 2011 PST by vadim
#
# files: * vrrp_cluster_1_linux-1.fw
#
@ -710,7 +710,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:02 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
# Generated Fri Jan 7 13:24:43 2011 PST by vadim
#
# files: * vrrp_cluster_1_linux-2.fw
#
@ -615,7 +615,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-1.fw
#
@ -642,7 +642,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:03 2011 PST by vadim
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-2.fw
#
@ -547,7 +547,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:03 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_ipt v4.2.0.3425
#
# Generated Tue Jan 4 11:56:04 2011 PST by vadim
# Generated Fri Jan 7 13:24:44 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-3.fw
#
@ -523,7 +523,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Tue Jan 4 11:56:04 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:24:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:40 2011 PST by vadim
# Generated Fri Jan 7 13:19:20 2011 PST by vadim
#
# files: * firewall-base-rulesets.fw
# files: firewall-base-rulesets.conf
@ -163,7 +163,7 @@ configure_interfaces() {
update_addresses_of_interface "en2 192.168.100.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:40 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:20 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:41 2011 PST by vadim
# Generated Fri Jan 7 13:19:21 2011 PST by vadim
#
# files: * firewall-ipv6-1.fw pf-ipv6.fw
# files: firewall-ipv6-1-Policy_ipv4.conf /etc/fw/pf-ipv6-Policy_ipv4.conf
@ -175,7 +175,7 @@ configure_interfaces() {
update_addresses_of_interface "lo ::1/128 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:41 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:21 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -5,7 +5,7 @@
# Tables: (5)
table <tbl.r4.s> { 222.222.222.22 , 222.222.222.23 }
table <tbl.r4.sx> { 2001:5c0:0:2::24 , 3ffe:1200:2000::/36 , 3ffe:1200:2001:1:8000::1 }
table <tbl.r5.s> { 61.150.47.112 , 74.125.19.99 , 74.125.19.103 , 74.125.19.104 , 74.125.19.147 , 192.168.1.0 }
table <tbl.r5.s> { 61.150.47.112 , 74.125.224.48 , 74.125.224.49 , 74.125.224.50 , 74.125.224.51 , 74.125.224.52 , 192.168.1.0 }
table <tbl.r5.sx> { 2001:5c0:0:2::24 , 3ffe:1200:2001:1:8000::1 }
table <tbl.r7.s> { 61.150.47.112 , 192.168.1.0 }

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
#
# files: * firewall-ipv6-2.fw pf.fw
# files: firewall-ipv6-2.conf pf.conf
@ -179,7 +179,7 @@ configure_interfaces() {
update_addresses_of_interface "lo ::1/128 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:09 2011 PST by vadim
# Generated Fri Jan 7 13:18:49 2011 PST by vadim
#
# files: * firewall.fw /etc/pf.fw
# files: firewall.conf /etc/pf.conf
@ -167,7 +167,7 @@ configure_interfaces() {
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:09 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:49 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:10 2011 PST by vadim
# Generated Fri Jan 7 13:18:50 2011 PST by vadim
#
# files: * firewall1.fw
# files: firewall1.conf
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:10 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:50 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:10 2011 PST by vadim
# Generated Fri Jan 7 13:18:51 2011 PST by vadim
#
# files: * firewall10-1.fw
# files: firewall10-1.conf
@ -74,7 +74,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:10 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:51 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:11 2011 PST by vadim
# Generated Fri Jan 7 13:18:52 2011 PST by vadim
#
# files: * firewall10-2.fw
# files: firewall10-2.conf
@ -74,7 +74,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:11 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:52 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:12 2011 PST by vadim
# Generated Fri Jan 7 13:18:52 2011 PST by vadim
#
# files: * firewall10-3.fw
# files: firewall10-3.conf
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:12 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:52 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:13 2011 PST by vadim
# Generated Fri Jan 7 13:18:53 2011 PST by vadim
#
# files: * firewall10-4.fw
# files: firewall10-4.conf
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:13 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:53 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:13 2011 PST by vadim
# Generated Fri Jan 7 13:18:54 2011 PST by vadim
#
# files: * firewall10-5.fw
# files: firewall10-5.conf
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:13 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:54 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:14 2011 PST by vadim
# Generated Fri Jan 7 13:18:55 2011 PST by vadim
#
# files: * firewall10-6.fw
# files: firewall10-6.conf
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:14 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:55 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:15 2011 PST by vadim
# Generated Fri Jan 7 13:18:55 2011 PST by vadim
#
# files: * firewall11.fw
# files: firewall11.conf
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:15 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:55 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:16 2011 PST by vadim
# Generated Fri Jan 7 13:18:56 2011 PST by vadim
#
# files: * firewall12.fw
# files: firewall12.conf
@ -159,7 +159,7 @@ configure_interfaces() {
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:16 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:56 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:16 2011 PST by vadim
# Generated Fri Jan 7 13:18:57 2011 PST by vadim
#
# files: * firewall13.fw
# files: firewall13.conf
@ -88,7 +88,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:16 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:57 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:18 2011 PST by vadim
# Generated Fri Jan 7 13:18:58 2011 PST by vadim
#
# files: * firewall14-1.fw
# files: firewall14-1.conf
@ -244,7 +244,7 @@ configure_interfaces() {
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:18 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:58 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:17 2011 PST by vadim
# Generated Fri Jan 7 13:18:58 2011 PST by vadim
#
# files: * firewall14.fw
# files: firewall14.conf
@ -244,7 +244,7 @@ configure_interfaces() {
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:17 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:58 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:21 2011 PST by vadim
# Generated Fri Jan 7 13:19:01 2011 PST by vadim
#
# files: * firewall2-1.fw
# files: firewall2-1.conf
@ -89,7 +89,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:21 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:01 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:19 2011 PST by vadim
# Generated Fri Jan 7 13:18:59 2011 PST by vadim
#
# files: * firewall2.fw
# files: firewall2.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:19 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:18:59 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:19 2011 PST by vadim
# Generated Fri Jan 7 13:19:00 2011 PST by vadim
#
# files: * firewall20.fw
# files: firewall20.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:19 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:00 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:20 2011 PST by vadim
# Generated Fri Jan 7 13:19:01 2011 PST by vadim
#
# files: * firewall21.fw
# files: firewall21-NAT_1.conf
@ -82,7 +82,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:20 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:01 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:22 2011 PST by vadim
# Generated Fri Jan 7 13:19:02 2011 PST by vadim
#
# files: * firewall22.fw
# files: firewall22-NAT_1.conf
@ -80,7 +80,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:22 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:02 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:23 2011 PST by vadim
# Generated Fri Jan 7 13:19:03 2011 PST by vadim
#
# files: * firewall3.fw
# files: firewall3.conf
@ -159,7 +159,7 @@ configure_interfaces() {
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:03 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -6,7 +6,7 @@
table <tbl.r0> { 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
table <tbl.r10.d> { www.google.com , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
table <tbl.r2> { www.google.com , www.cnn.com }
table <tbl.r8.d> { 74.125.19.99 , 74.125.19.103 , 74.125.19.104 , 74.125.19.147 , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
table <tbl.r8.d> { 74.125.224.48 , 74.125.224.49 , 74.125.224.50 , 74.125.224.51 , 74.125.224.52 , 157.166.224.25 , 157.166.224.26 , 157.166.226.25 , 157.166.226.26 , 157.166.255.18 , 157.166.255.19 }
#
# Rule 0 (NAT)

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:23 2011 PST by vadim
# Generated Fri Jan 7 13:19:04 2011 PST by vadim
#
# files: * firewall33.fw
# files: firewall33.conf
@ -162,7 +162,7 @@ configure_interfaces() {
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:23 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:04 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:24 2011 PST by vadim
# Generated Fri Jan 7 13:19:05 2011 PST by vadim
#
# files: * firewall34.fw
# files: firewall34.conf
@ -158,7 +158,7 @@ configure_interfaces() {
update_addresses_of_interface "lo 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:24 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:05 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:25 2011 PST by vadim
# Generated Fri Jan 7 13:19:05 2011 PST by vadim
#
# files: * firewall38.fw
# files: firewall38.conf
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:25 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:05 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:26 2011 PST by vadim
# Generated Fri Jan 7 13:19:06 2011 PST by vadim
#
# files: * firewall39.fw pf.fw
# files: firewall39.conf pf.conf
@ -79,7 +79,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:26 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:06 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:26 2011 PST by vadim
# Generated Fri Jan 7 13:19:07 2011 PST by vadim
#
# files: * firewall4.fw pf.fw
# files: firewall4.conf /etc/fw/pf.conf
@ -78,7 +78,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:26 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:07 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:28 2011 PST by vadim
# Generated Fri Jan 7 13:19:09 2011 PST by vadim
#
# files: * firewall40-1.fw
# files: firewall40-1.conf
@ -176,7 +176,7 @@ configure_interfaces() {
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:28 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:09 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:27 2011 PST by vadim
# Generated Fri Jan 7 13:19:08 2011 PST by vadim
#
# files: * firewall40.fw
# files: firewall40.conf
@ -160,7 +160,7 @@ configure_interfaces() {
update_addresses_of_interface "lo0 127.0.0.1/0xff000000" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:27 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:08 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:29 2011 PST by vadim
# Generated Fri Jan 7 13:19:09 2011 PST by vadim
#
# files: * firewall41.fw
# files: firewall41.conf
@ -163,7 +163,7 @@ configure_interfaces() {
update_addresses_of_interface "eth1 2.2.2.2/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:29 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:09 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:30 2011 PST by vadim
# Generated Fri Jan 7 13:19:10 2011 PST by vadim
#
# files: * firewall5.fw
# files: firewall5.conf
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:30 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:10 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:31 2011 PST by vadim
# Generated Fri Jan 7 13:19:11 2011 PST by vadim
#
# files: * firewall51.fw
# files: firewall51.conf
@ -80,7 +80,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:31 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:11 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:31 2011 PST by vadim
# Generated Fri Jan 7 13:19:12 2011 PST by vadim
#
# files: * firewall6.fw
# files: firewall6.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:31 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:12 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:32 2011 PST by vadim
# Generated Fri Jan 7 13:19:13 2011 PST by vadim
#
# files: * firewall62.fw
# files: firewall62.conf
@ -185,7 +185,7 @@ configure_interfaces() {
update_addresses_of_interface "en1 222.222.222.222/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:32 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:13 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:33 2011 PST by vadim
# Generated Fri Jan 7 13:19:13 2011 PST by vadim
#
# files: * firewall63.fw
# files: firewall63.conf
@ -77,7 +77,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:33 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:13 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:34 2011 PST by vadim
# Generated Fri Jan 7 13:19:14 2011 PST by vadim
#
# files: * firewall7.fw
# files: firewall7.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:14 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:34 2011 PST by vadim
# Generated Fri Jan 7 13:19:15 2011 PST by vadim
#
# files: * firewall70.fw
# files: firewall70.conf
@ -82,7 +82,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:34 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:15 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:35 2011 PST by vadim
# Generated Fri Jan 7 13:19:16 2011 PST by vadim
#
# files: * firewall8.fw
# files: firewall8.conf
@ -72,7 +72,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:35 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:16 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:37 2011 PST by vadim
# Generated Fri Jan 7 13:19:17 2011 PST by vadim
#
# files: * firewall80-4.5.fw
# files: firewall80-4.5.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:37 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:17 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:36 2011 PST by vadim
# Generated Fri Jan 7 13:19:16 2011 PST by vadim
#
# files: * firewall80.fw
# files: firewall80.conf
@ -73,7 +73,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:36 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:16 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:37 2011 PST by vadim
# Generated Fri Jan 7 13:19:18 2011 PST by vadim
#
# files: * firewall9.fw
# files: firewall9.conf
@ -76,7 +76,7 @@ configure_interfaces() {
}
log "Activating firewall script generated Tue Jan 4 11:58:37 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:18 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:38 2011 PST by vadim
# Generated Fri Jan 7 13:19:19 2011 PST by vadim
#
# files: * firewall91.fw /etc/fw/pf.fw
# files: firewall91.conf /etc/fw/pf.conf
@ -243,7 +243,7 @@ configure_interfaces() {
update_addresses_of_interface "vlan103 10.100.103.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:38 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:19 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:39 2011 PST by vadim
# Generated Fri Jan 7 13:19:19 2011 PST by vadim
#
# files: * firewall92.fw /etc/fw/pf.fw
# files: firewall92.conf /etc/fw/path\ with\ space/pf.conf
@ -160,7 +160,7 @@ configure_interfaces() {
update_addresses_of_interface "em1 10.1.1.81/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:39 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:19 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -0,0 +1,71 @@
# Tables: (2)
table <tbl.r1.d> { 172.24.0.1 , 172.24.0.2 , 192.168.1.1 , 192.168.1.2 }
table <tbl.r2.s> { 172.24.0.1 , 172.24.0.2 }
#
# Rule 0 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 1 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 2 (NAT)
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 3 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> { 172.24.0.2 , 172.24.0.3 }
#
# Rule 4 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.2
#
# Rule 5 (NAT)
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.3
#
# Rule 6 (NAT)
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule 7 (NAT)
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule 8 (NAT)
rdr proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule -3 pfsync (automatic)
pass quick on en0 inet proto pfsync from any to any label "RULE -3 -- ACCEPT "
#
# Rule -2 CARP (automatic)
pass quick on en1 inet proto carp from any to any label "RULE -2 -- ACCEPT "
#
# Rule -1 CARP (automatic)
pass quick on en0 inet proto carp from any to any label "RULE -1 -- ACCEPT "
#
# Rule 0 (lo)
pass quick on lo inet from any to any label "RULE 0 -- ACCEPT "
#
# Rule 1 (global)
pass quick inet from any to <tbl.r1.d> label "RULE 1 -- ACCEPT "
#
# Rule 2 (global)
pass quick inet from <tbl.r2.s> to any label "RULE 2 -- ACCEPT "
#
# Rule 3 (global)
pass quick inet from any to <tbl.r2.s> label "RULE 3 -- ACCEPT "
#
# Rule 4 (carp0)
pass in quick on en0 inet from any to any label "RULE 4 -- ACCEPT "
#
# Rule 5 (carp0)
pass in quick on en1 inet from any to any label "RULE 5 -- ACCEPT "
#
# Rule 6 (global)
block log quick inet from any to any no state label "RULE 6 -- DROP "
#
# Rule fallback rule
# fallback rule
block quick inet from any to any no state label "RULE 10000 -- DROP "

308
test/pf/openbsd-1.fw.orig Executable file
View File

@ -0,0 +1,308 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Fri Jan 7 13:02:11 2011 PST by vadim
#
# files: * openbsd-1.fw
# files: openbsd-1.conf
#
# Compiled for pf 4.x
#
FWDIR=`dirname $0`
IFCONFIG="/sbin/ifconfig"
PFCTL="/sbin/pfctl"
SYSCTL="/sbin/sysctl"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
test -x "$LOGGER" && $LOGGER -p info "$1"
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
if echo "$addr" | grep -q ':'
then
inet="inet6"
addr=$(echo "$addr" | sed 's!/! prefixlen !')
else
inet="inet"
addr=$(echo "$addr" | sed 's!/! netmask !')
fi
parameter=""
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
parameter="alias"
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
parameter="delete"
}
$FWBDEBUG $IFCONFIG $interface $inet $addr $parameter
$FWBDEBUG $IFCONFIG $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
scope_regex="1"
if test -n "$scope"; then scope_regex=" \$0 !~ \"$scope\" "; fi
$IFCONFIG $interface | sed "s/%$interface//" | \
awk -v IGNORED="$ignore_list" \
"BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $scope_regex && !(\$2 in ignored_dict)) {printf \"%s/%s\n\",\$2,\$4;}" | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IFCONFIG $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface '' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scopeid .*' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
missing_vlan() {
vlan=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $vlan
subint=$1
parent=$2
IFS=$oldIFS
vlan_id=$(echo $subint | sed 's/vlan//')
test "$cmd" = "add" && {
echo "# Adding VLAN interface $subint (parent: $parent)"
$FWBDEBUG $IFCONFIG $subint vlan $vlan_id vlandev $parent
$FWBDEBUG $IFCONFIG $subint up
}
test "$cmd" = "rem" && {
echo "# Removing VLAN interface $subint (parent: $parent)"
$FWBDEBUG $IFCONFIG $subint vlan $vlan_id -vlandev
$FWBDEBUG $IFCONFIG $subint destroy
}
}
parse_fwb_vlans() {
set $1
vlan_parent_interface=$1
shift
FWB_VLANS=$(
for subint in $*; do
echo "${subint}@$vlan_parent_interface"
done | sort
)
echo $FWB_VLANS
}
parse_current_vlans() {
vlan_parent_interface=$1
$IFCONFIG -A | grep 'vlan: ' | sed 's/priority:.*parent interface://' | \
while read x vlan_id parent
do
test "$parent" = "$vlan_parent_interface" && echo "vlan$vlan_id@$parent"
done | sort
}
update_vlans_of_interface() {
args="$1"
set $1
vlan_parent_interface=$1
FWB_VLANS=$(parse_fwb_vlans "$args")
CURRENT_VLANS=$(parse_current_vlans $vlan_parent_interface)
$IFCONFIG $vlan_parent_interface up
diff_intf missing_vlan "$FWB_VLANS" "$CURRENT_VLANS" add
diff_intf missing_vlan "$CURRENT_VLANS" "$FWB_VLANS" rem
}
sync_vlan_interfaces() {
$IFCONFIG -A | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
}
($1 ~ /^vlan[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
while read intf; do
echo "# Deleting vlan interface $intf"
$FWBDEBUG $IFCONFIG $intf destroy
done
for intf in $*; do
$IFCONFIG $intf >/dev/null 2>&1 || {
echo "# Creating vlan interface $intf"
$FWBDEBUG $IFCONFIG $intf create
}
done
}
sync_carp_interfaces() {
$IFCONFIG -A | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
}
($1 ~ /^carp[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
while read intf; do
echo "# Deleting carp interface $intf"
$FWBDEBUG $IFCONFIG $intf destroy
done
for intf in $*; do
$IFCONFIG $intf >/dev/null 2>&1 || {
echo "# Creating carp interface $intf"
$SYSCTL -w net.inet.carp.allow=1
$FWBDEBUG $IFCONFIG $intf create
}
done
}
sync_pfsync_interfaces() {
$IFCONFIG -A | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
}
($1 ~ /^pfsync[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
while read intf; do
echo "# Deleting pfsync interface $intf"
$FWBDEBUG $IFCONFIG $intf destroy
done
for intf in $*; do
$IFCONFIG $intf >/dev/null 2>&1 || {
echo "# Creating pfsync interface $intf"
$FWBDEBUG $IFCONFIG $intf create
}
done
}
verify_interfaces() {
:
}
set_kernel_vars() {
:
$SYSCTL -w net.inet.ip.forwarding=1
}
prolog_commands() {
:
}
epilog_commands() {
:
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
sync_vlan_interfaces
sync_carp_interfaces carp0 carp1
$IFCONFIG carp0 vhid 101 pass secret carpdev en0
$IFCONFIG carp1 vhid 100 pass secret carpdev en1
update_addresses_of_interface "en0 172.24.0.2/0xffffff00 172.24.0.3/0xffffff00" ""
update_addresses_of_interface "en1 192.168.1.2/0xffffff00" ""
update_addresses_of_interface "carp0 172.24.0.1/0xffffff00" ""
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
sync_pfsync_interfaces pfsync0
$IFCONFIG pfsync0 syncdev en0 syncpeer 172.24.0.3
$IFCONFIG pfsync0 up
}
log "Activating firewall script generated Fri Jan 7 13:02:11 2011 by vadim"
set_kernel_vars
configure_interfaces
prolog_commands
$PFCTL \
-f \
${FWDIR}/openbsd-1.conf || exit 1
epilog_commands

View File

@ -0,0 +1,71 @@
# Tables: (2)
table <tbl.r1.d> { 172.24.0.1 , 172.24.0.3 , 192.168.1.1 , 192.168.1.3 }
table <tbl.r2.s> { 172.24.0.1 , 172.24.0.3 }
#
# Rule 0 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 1 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 2 (NAT)
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.1
#
# Rule 3 (NAT)
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> { 172.24.0.2 , 172.24.0.3 }
#
# Rule 4 (NAT)
nat proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.2
#
# Rule 5 (NAT)
nat on en0 proto {tcp udp icmp} from 192.168.1.0/24 to any -> 172.24.0.3
#
# Rule 6 (NAT)
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule 7 (NAT)
rdr on en0 proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule 8 (NAT)
rdr proto tcp from any to 172.24.0.1 port 80 -> 172.24.0.100 port 80
#
# Rule -3 pfsync (automatic)
pass quick on en0 inet proto pfsync from any to any label "RULE -3 -- ACCEPT "
#
# Rule -2 CARP (automatic)
pass quick on en1 inet proto carp from any to any label "RULE -2 -- ACCEPT "
#
# Rule -1 CARP (automatic)
pass quick on en0 inet proto carp from any to any label "RULE -1 -- ACCEPT "
#
# Rule 0 (lo)
pass quick on lo inet from any to any label "RULE 0 -- ACCEPT "
#
# Rule 1 (global)
pass quick inet from any to <tbl.r1.d> label "RULE 1 -- ACCEPT "
#
# Rule 2 (global)
pass quick inet from <tbl.r2.s> to any label "RULE 2 -- ACCEPT "
#
# Rule 3 (global)
pass quick inet from any to <tbl.r2.s> label "RULE 3 -- ACCEPT "
#
# Rule 4 (carp0)
pass in quick on en0 inet from any to any label "RULE 4 -- ACCEPT "
#
# Rule 5 (carp0)
pass in quick on en1 inet from any to any label "RULE 5 -- ACCEPT "
#
# Rule 6 (global)
block log quick inet from any to any no state label "RULE 6 -- DROP "
#
# Rule fallback rule
# fallback rule
block quick inet from any to any no state label "RULE 10000 -- DROP "

204
test/pf/openbsd-2.fw.orig Executable file
View File

@ -0,0 +1,204 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Fri Jan 7 13:02:11 2011 PST by vadim
#
# files: * openbsd-2.fw
# files: openbsd-2.conf
#
# Compiled for pf 4.x
#
FWDIR=`dirname $0`
IFCONFIG="/sbin/ifconfig"
PFCTL="/sbin/pfctl"
SYSCTL="/sbin/sysctl"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
test -x "$LOGGER" && $LOGGER -p info "$1"
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
if echo "$addr" | grep -q ':'
then
inet="inet6"
addr=$(echo "$addr" | sed 's!/! prefixlen !')
else
inet="inet"
addr=$(echo "$addr" | sed 's!/! netmask !')
fi
parameter=""
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
parameter="alias"
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
parameter="delete"
}
$FWBDEBUG $IFCONFIG $interface $inet $addr $parameter
$FWBDEBUG $IFCONFIG $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
scope_regex="1"
if test -n "$scope"; then scope_regex=" \$0 !~ \"$scope\" "; fi
$IFCONFIG $interface | sed "s/%$interface//" | \
awk -v IGNORED="$ignore_list" \
"BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $scope_regex && !(\$2 in ignored_dict)) {printf \"%s/%s\n\",\$2,\$4;}" | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IFCONFIG $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface '' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scopeid .*' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
sync_carp_interfaces() {
$IFCONFIG -A | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ii=ignored_arr[a]":"; ignored_dict[ii]=1;}
}
($1 ~ /^carp[0-9]/ && !($1 in ignored_dict)) {print $1;}' | sed 's/://' |\
while read intf; do
echo "# Deleting carp interface $intf"
$FWBDEBUG $IFCONFIG $intf destroy
done
for intf in $*; do
$IFCONFIG $intf >/dev/null 2>&1 || {
echo "# Creating carp interface $intf"
$SYSCTL -w net.inet.carp.allow=1
$FWBDEBUG $IFCONFIG $intf create
}
done
}
verify_interfaces() {
:
}
set_kernel_vars() {
:
$SYSCTL -w net.inet.ip.forwarding=1
}
prolog_commands() {
:
}
epilog_commands() {
:
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
sync_carp_interfaces carp0 carp1
$IFCONFIG carp0 vhid 101 pass secret advskew 1 carpdev en0
$IFCONFIG carp1 vhid 100 pass secret advskew 1 carpdev en1
update_addresses_of_interface "en0 172.24.0.3/0xffffff00 172.24.0.2/0xffffff00" ""
update_addresses_of_interface "en1 192.168.1.3/0xffffff00" ""
update_addresses_of_interface "carp0 172.24.0.1/0xffffff00" ""
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
}
log "Activating firewall script generated Fri Jan 7 13:02:11 2011 by vadim"
set_kernel_vars
configure_interfaces
prolog_commands
$PFCTL \
-f \
${FWDIR}/openbsd-2.conf || exit 1
epilog_commands

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
#
# files: * pf_cluster_1_openbsd-1.fw
# files: pf_cluster_1_openbsd-1.conf
@ -291,7 +291,7 @@ configure_interfaces() {
$IFCONFIG pfsync0 up
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:22 2011 PST by vadim
#
# files: * pf_cluster_1_openbsd-2.fw
# files: pf_cluster_1_openbsd-2.conf
@ -187,7 +187,7 @@ configure_interfaces() {
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:22 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
#
# files: * pf_cluster_2_freebsd-2.fw
# files: pf_cluster_2_freebsd-2.conf
@ -190,7 +190,7 @@ configure_interfaces() {
update_addresses_of_interface "carp1 192.168.1.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
#
# files: * pf_cluster_3_openbsd-3.fw
# files: pf_cluster_3_openbsd-3.conf
@ -303,7 +303,7 @@ configure_interfaces() {
sync_pfsync_interfaces
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
set_kernel_vars
configure_interfaces

View File

@ -4,7 +4,7 @@
#
# Firewall Builder fwb_pf v4.2.0.3425
#
# Generated Tue Jan 4 11:58:42 2011 PST by vadim
# Generated Fri Jan 7 13:19:23 2011 PST by vadim
#
# files: * pf_cluster_3_openbsd-4.fw
# files: pf_cluster_3_openbsd-4.conf
@ -192,7 +192,7 @@ configure_interfaces() {
update_addresses_of_interface "carp2 172.20.0.1/0xffffff00" ""
}
log "Activating firewall script generated Tue Jan 4 11:58:42 2011 by vadim"
log "Activating firewall script generated Fri Jan 7 13:19:23 2011 by vadim"
set_kernel_vars
configure_interfaces