1
0
mirror of https://github.com/fwbuilder/fwbuilder synced 2026-03-23 19:57:21 +01:00

more fixes for SF bug #3439613. Adding "-i" / "-o" clause to match

parent bridge interface. This allows us to correctly match which
bridge the packet comes through in configurations using wildcard
bridge port interfaces. For example, when br0 and br1 have "vnet+"
bridge port interface, iptables can still correctly match which bridge
the packet went through using "-o br0" or "-o br1" clause. This can be
useful in installations with many bridged interfaces that get created
and destroyed dynamically, e.g.  with virtual machines. Note that the
"-i br0" / "-o br0" clause is only added when there is more than one
bridge interface and bridge port name ends with a wild card symbol "+"
This commit is contained in:
Vadim Kurland 2011-11-28 12:27:21 -08:00
parent e681556c0f
commit c26cadeb6a
146 changed files with 1800 additions and 419 deletions

View File

@ -7,7 +7,7 @@ FWB_MICRO_VERSION=1
# build number is like "nano" version number. I am incrementing build
# number during development cycle
#
BUILD_NUM="3589"
BUILD_NUM="3590"
VERSION="$FWB_MAJOR_VERSION.$FWB_MINOR_VERSION.$FWB_MICRO_VERSION.$BUILD_NUM"

View File

@ -1,2 +1,2 @@
#define VERSION "5.0.1.3589"
#define VERSION "5.0.1.3590"
#define GENERATION "5.0"

View File

@ -1,3 +1,18 @@
2011-11-28 Vadim Kurland <vadim@netcitadel.com>
* PolicyCompiler_PrintRule.cpp (_printDirectionAndInterface): more
fixes for SF bug #3439613. Adding "-i" / "-o" clause to match
parent bridge interface. This allows us to correctly match which
bridge the packet comes through in configurations using wildcard
bridge port interfaces. For example, when br0 and br1 have "vnet+"
bridge port interface, iptables can still correctly match which
bridge the packet went through using "-o br0" or "-o br1"
clause. This can be useful in installations with many bridged
interfaces that get created and destroyed dynamically, e.g. with
virtual machines. Note that the "-i br0" / "-o br0" clause is only
added when there is more than one bridge interface and bridge
port name ends with a wild card symbol "+"
2011-11-21 Vadim Kurland <vadim@netcitadel.com>
* TableFactory.cpp (TableFactory::createTablesForRE): see #2671
@ -21,7 +36,7 @@
table that exactly reflects configuration user created in the
GUI (i.e. includes both ipv4 and ipv6 addresses) and then uses
this table in both "inet" and "inet6" rules.
* PolicyCompiler_pf.cpp (createTables): With this fix, when option
"preserve group and addresses table object names" is in effect,
compiler for PF will create named tables for the user-defined

View File

@ -3,7 +3,7 @@
%define name fwbuilder
%define version 5.0.1.3589
%define version 5.0.1.3590
%define release 1
%if "%_vendor" == "MandrakeSoft"

View File

@ -4,6 +4,6 @@ Replaces: fwbuilder (<=4.1.1-1), fwbuilder-common, fwbuilder-bsd, fwbuilder-linu
Priority: extra
Section: checkinstall
Maintainer: vadim@fwbuilder.org
Version: 5.0.1.3589-1
Version: 5.0.1.3590-1
Depends: libqt4-gui (>= 4.4.0), libqt4-network (>= 4.4.0), libxml2, libxslt1.1, libsnmp | libsnmp15
Description: Firewall Builder GUI and policy compilers

View File

@ -1,6 +1,6 @@
%define name fwbuilder
%define version 5.0.1.3589
%define version 5.0.1.3590
%define release 1
%if "%_vendor" == "MandrakeSoft"

View File

@ -452,6 +452,7 @@ string PolicyCompiler_ipt::PrintRule::_printMultiport(PolicyRule *rule)
string PolicyCompiler_ipt::PrintRule::_printDirectionAndInterface(PolicyRule *rule)
{
PolicyCompiler_ipt *ipt_comp = dynamic_cast<PolicyCompiler_ipt*>(compiler);
QStringList res;
if (rule->getStr(".iface") == "nil") return "";
@ -467,28 +468,53 @@ string PolicyCompiler_ipt::PrintRule::_printDirectionAndInterface(PolicyRule *ru
rule_iface_obj = FWObjectReference::getObject(itfrel->front());
rule_iface = Interface::cast(rule_iface_obj);
iface_name = rule_iface_obj->getName().c_str();
if (iface_name.endsWith("*")) iface_name.replace("*", "+");
if (rule_iface && rule_iface->isBridgePort() &&
(version.empty() ||
XMLTools::version_compare(version, "1.3.0")>=0))
{
// http://www.netfilter.org/projects/iptables/files/changes-iptables-1.2.9.txt
// See SF bug #3439613
// https://sourceforge.net/tracker/index.php?func=detail&aid=3439613&group_id=5314&atid=1129518#
//
// physdev module does not allow --physdev-out for
// non-bridged traffic anymore. We should add
// --physdev-is-bridged to make sure this matches only
// bridged packets.
/*
http://www.netfilter.org/projects/iptables/files/changes-iptables-1.2.9.txt
See SF bug #3439613
https://sourceforge.net/tracker/index.php?func=detail&aid=3439613&group_id=5314&atid=1129518#
physdev module does not allow --physdev-out for
non-bridged traffic anymore. We should add
--physdev-is-bridged to make sure this matches only
bridged packets.
if (rule->getDirection()==PolicyRule::Inbound)
Also, adding "-i" / "-o" clause to match parent bridge
interface. This allows us to correctly match which
bridge the packet comes through in configurations using
wildcard bridge port interfaces. For example, when br0
and br1 have "vnet+" bridge port interface, iptables can
still correctly match which bridge the packet went
through using "-o br0" or "-o br1" clause. This can be
useful in installations with many bridged interfaces
that get created and destroyed dynamically, e.g. with
virtual machines.
However add "-i br0" / "-o br0" only when there is more
than one bridge interface _and_ bridge port name ends with
a wild card symbol "+"
*/
QString parent_name = rule_iface->getParent()->getName().c_str();
if (rule->getDirection()==PolicyRule::Inbound)
{
if (ipt_comp->bridge_count > 1 && iface_name.endsWith("+"))
res << "-i" << parent_name;
res << "-m physdev --physdev-in" << iface_name;
}
if (rule->getDirection()==PolicyRule::Outbound)
res << "-m physdev --physdev-is-bridged --physdev-out" << iface_name;
if (rule->getDirection()==PolicyRule::Outbound)
{
if (ipt_comp->bridge_count > 1 && iface_name.endsWith("+"))
res << "-o" << parent_name;
res << "-m physdev --physdev-is-bridged --physdev-out" << iface_name;
}
} else
{
if (rule->getDirection()==PolicyRule::Inbound)

View File

@ -480,6 +480,20 @@ int PolicyCompiler_ipt::prolog()
actually_used_module_set = false;
build_interface_groups(dbcopy, persistent_objects, fw, ipv6, regular_interfaces);
// count bridge interfaces. We need this later in
// PrintRule::_printDirectionAndInterface
list<FWObject*> l2 = fw->getByTypeDeep(Interface::TYPENAME);
for (list<FWObject*>::iterator i=l2.begin(); i!=l2.end(); ++i)
{
Interface *iface = Interface::cast(*i);
assert(iface);
string interface_type = iface->getOptionsObject()->getStr("type");
if (interface_type == "bridge") bridge_count++;
}
return n;
}

View File

@ -82,6 +82,9 @@ protected:
typedef std::list<std::string> chain_list;
std::map<std::string, chain_list*> chains;
// number of bridge interfaces (br0 / br1 / etc)
int bridge_count;
// use minus_n_commands map to track creation of chains.
// Using external map object for this to be able to track
// new chains across different compiler runs (used to process
@ -1006,6 +1009,7 @@ public:
have_connmark_in_output = false;
my_table = "filter";
minus_n_commands = m_n_commands_map;
bridge_count = 0;
}
virtual ~PolicyCompiler_ipt();

View File

@ -351,7 +351,17 @@
SF bug #3439613. physdev module does not allow --physdev-out
for non-bridged traffic anymore. We should add
--physdev-is-bridged to make sure this matches only bridged
packets.
packets. Also adding "-i" / "-o" clause to match parent bridge
interface. This allows us to correctly match which bridge the
packet comes through in configurations using wildcard bridge
port interfaces. For example, when br0 and br1 have "vnet+"
bridge port interface, iptables can still correctly match which
bridge the packet went through using "-o br0" or "-o br1"
clause. This can be useful in installations with many bridged
interfaces that get created and destroyed dynamically, e.g.
with virtual machines. Note that the "-i br0" / "-o br0" clause
is only added when there is more than one bridge interface and
bridge port name ends with a wild card symbol "+"
</li>
</ul>
</ul>

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:21 2011 PST by vadim
# Generated Mon Nov 28 12:23:42 2011 PST by vadim
#
# files: * cluster1_secuwall-1.fw /etc/cluster1_secuwall-1.fw
#
@ -610,7 +610,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:21 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:42 2011 by vadim"
log "Database was cluster-tests.fwb"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:48 2011 PST by vadim
# Generated Mon Nov 28 12:23:04 2011 PST by vadim
#
# files: * firewall-base-rulesets.fw /etc/fw/firewall-base-rulesets.fw
#
@ -467,7 +467,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:48 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:04 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:53 2011 PST by vadim
# Generated Mon Nov 28 12:23:10 2011 PST by vadim
#
# files: * firewall-ipv6-1.fw /etc/firewall-ipv6-1.fw
#
@ -724,7 +724,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:53 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:10 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:54 2011 PST by vadim
# Generated Mon Nov 28 12:23:10 2011 PST by vadim
#
# files: * firewall-ipv6-2.fw /etc/firewall-ipv6-2.fw
#
@ -988,7 +988,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:54 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:10 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:54 2011 PST by vadim
# Generated Mon Nov 28 12:23:10 2011 PST by vadim
#
# files: * firewall-ipv6-3.fw /etc/firewall-ipv6-3.fw
#
@ -618,7 +618,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:54 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:10 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:59 2011 PST by vadim
# Generated Mon Nov 28 12:23:18 2011 PST by vadim
#
# files: * firewall-ipv6-4-1.fw /etc/firewall-ipv6-4-1.fw
#
@ -569,7 +569,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:18 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:54 2011 PST by vadim
# Generated Mon Nov 28 12:23:11 2011 PST by vadim
#
# files: * firewall-ipv6-4.fw /etc/firewall-ipv6-4.fw
#
@ -605,7 +605,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:54 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:59 2011 PST by vadim
# Generated Mon Nov 28 12:23:16 2011 PST by vadim
#
# files: * firewall-ipv6-5.fw /etc/firewall-ipv6-5.fw
#
@ -434,7 +434,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:16 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:59 2011 PST by vadim
# Generated Mon Nov 28 12:23:16 2011 PST by vadim
#
# files: * firewall-ipv6-6.fw /etc/firewall-ipv6-6.fw
#
@ -423,7 +423,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:16 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:59 2011 PST by vadim
# Generated Mon Nov 28 12:23:16 2011 PST by vadim
#
# files: * firewall-ipv6-7.fw /etc/firewall-ipv6-7.fw
#
@ -467,7 +467,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:16 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:04 2011 PST by vadim
# Generated Mon Nov 28 12:23:22 2011 PST by vadim
#
# files: * firewall-ipv6-8.fw /etc/firewall-ipv6-8.fw
#
@ -540,7 +540,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:22 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:04 2011 PST by vadim
# Generated Mon Nov 28 12:23:22 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-after-flush.fw /etc/firewall-ipv6-ipt-reset-prolog-after-flush.fw
#
@ -464,7 +464,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:22 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:04 2011 PST by vadim
# Generated Mon Nov 28 12:23:23 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-after-interfaces.fw /etc/firewall-ipv6-ipt-reset-prolog-after-interfaces.fw
#
@ -464,7 +464,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:23 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:04 2011 PST by vadim
# Generated Mon Nov 28 12:23:23 2011 PST by vadim
#
# files: * firewall-ipv6-ipt-reset-prolog-top.fw /etc/firewall-ipv6-ipt-reset-prolog-top.fw
#
@ -464,7 +464,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:23 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:09 2011 PST by vadim
# Generated Mon Nov 28 12:23:28 2011 PST by vadim
#
# files: * firewall-ipv6-nd-ns-1.fw /etc/firewall-ipv6-nd-ns-1.fw
#
@ -464,7 +464,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:09 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:28 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:09 2011 PST by vadim
# Generated Mon Nov 28 12:23:29 2011 PST by vadim
#
# files: * firewall-ipv6-nd-ns-2.fw /etc/firewall-ipv6-nd-ns-2.fw
#
@ -468,7 +468,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:09 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:29 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:10 2011 PST by vadim
# Generated Mon Nov 28 12:23:29 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-after-flush.fw /etc/firewall-ipv6-prolog-after-flush.fw
#
@ -442,7 +442,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:10 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:29 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:10 2011 PST by vadim
# Generated Mon Nov 28 12:23:29 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-after-interfaces.fw /etc/firewall-ipv6-prolog-after-interfaces.fw
#
@ -442,7 +442,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:10 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:29 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:15 2011 PST by vadim
# Generated Mon Nov 28 12:23:34 2011 PST by vadim
#
# files: * firewall-ipv6-prolog-top.fw /etc/firewall-ipv6-prolog-top.fw
#
@ -442,7 +442,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:34 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:15 2011 PST by vadim
# Generated Mon Nov 28 12:23:35 2011 PST by vadim
#
# files: * firewall-server-1-s.fw /etc/fw/firewall-server-1-s.fw
#
@ -415,7 +415,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:35 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:03 2011 PST by vadim
# Generated Mon Nov 28 12:20:46 2011 PST by vadim
#
# files: * firewall.fw /etc/fw/firewall.fw
#
@ -1398,7 +1398,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:03 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:03 2011 PST by vadim
# Generated Mon Nov 28 12:20:46 2011 PST by vadim
#
# files: * firewall1.fw /etc/fw/firewall1.fw
#
@ -1270,7 +1270,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:03 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:46 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:02 2011 PST by vadim
# Generated Mon Nov 28 12:20:45 2011 PST by vadim
#
# files: * firewall10.fw /etc/fw/firewall10.fw
#
@ -495,7 +495,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:02 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:45 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:07 2011 PST by vadim
# Generated Mon Nov 28 12:20:51 2011 PST by vadim
#
# files: * firewall11.fw /etc/fw/firewall11.fw
#
@ -615,7 +615,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:07 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:51 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:07 2011 PST by vadim
# Generated Mon Nov 28 12:20:51 2011 PST by vadim
#
# files: * firewall12.fw /etc/fw/firewall12.fw
#
@ -533,7 +533,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:07 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:51 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:07 2011 PST by vadim
# Generated Mon Nov 28 12:20:52 2011 PST by vadim
#
# files: * firewall13.fw /etc/fw/firewall13.fw
#
@ -407,7 +407,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:07 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:52 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:07 2011 PST by vadim
# Generated Mon Nov 28 12:20:52 2011 PST by vadim
#
# files: * firewall14.fw /etc/fw/firewall14.fw
#
@ -426,7 +426,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:07 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:52 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:12 2011 PST by vadim
# Generated Mon Nov 28 12:20:57 2011 PST by vadim
#
# files: * firewall15.fw /etc/fw/firewall15.fw
#
@ -410,7 +410,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:12 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:57 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:12 2011 PST by vadim
# Generated Mon Nov 28 12:20:57 2011 PST by vadim
#
# files: * firewall16.fw /etc/fw/firewall16.fw
#
@ -514,7 +514,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:12 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:57 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:12 2011 PST by vadim
# Generated Mon Nov 28 12:20:58 2011 PST by vadim
#
# files: * firewall17.fw /etc/fw/firewall17.fw
#
@ -493,7 +493,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:12 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:12 2011 PST by vadim
# Generated Mon Nov 28 12:20:58 2011 PST by vadim
#
# files: * firewall18.fw /etc/fw/firewall18.fw
#
@ -528,7 +528,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:12 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:20:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:17 2011 PST by vadim
# Generated Mon Nov 28 12:21:02 2011 PST by vadim
#
# files: * firewall19.fw /etc/fw/firewall19.fw
#
@ -532,7 +532,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:17 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:24 2011 PST by vadim
# Generated Mon Nov 28 12:21:12 2011 PST by vadim
#
# files: * firewall2-1.fw /etc/fw/firewall2-1.fw
#
@ -1452,7 +1452,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:12 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:29 2011 PST by vadim
# Generated Mon Nov 28 12:21:14 2011 PST by vadim
#
# files: * firewall2-2.fw /etc/fw/firewall2-2.fw
#
@ -1282,7 +1282,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:29 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:14 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:29 2011 PST by vadim
# Generated Mon Nov 28 12:21:19 2011 PST by vadim
#
# files: * firewall2-3.fw /etc/fw/firewall2-3.fw
#
@ -1140,7 +1140,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:29 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:19 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:34 2011 PST by vadim
# Generated Mon Nov 28 12:21:25 2011 PST by vadim
#
# files: * firewall2-4.fw /etc/fw/firewall2-4.fw
#
@ -446,7 +446,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:25 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:34 2011 PST by vadim
# Generated Mon Nov 28 12:21:30 2011 PST by vadim
#
# files: * firewall2-5.fw /etc/fw/firewall2-5.fw
#
@ -477,7 +477,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:30 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:39 2011 PST by vadim
# Generated Mon Nov 28 12:21:31 2011 PST by vadim
#
# files: * firewall2-6.fw /etc/fw/firewall2-6.fw
#
@ -502,7 +502,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:31 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:39 2011 PST by vadim
# Generated Mon Nov 28 12:21:36 2011 PST by vadim
#
# files: * firewall2-7.fw /etc/fw/firewall2-7.fw
#
@ -442,7 +442,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:36 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:18 2011 PST by vadim
# Generated Mon Nov 28 12:21:05 2011 PST by vadim
#
# files: * firewall2.fw /etc/fw/firewall2.fw
#
@ -1504,7 +1504,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:18 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:05 2011 by vadim"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:17 2011 PST by vadim
# Generated Mon Nov 28 12:21:04 2011 PST by vadim
#
# files: * firewall20-ipv6.fw /etc/fw/firewall20-ipv6.fw
#
@ -478,7 +478,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:17 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:04 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:17 2011 PST by vadim
# Generated Mon Nov 28 12:21:04 2011 PST by vadim
#
# files: * firewall20.fw /etc/fw/firewall20.fw
#
@ -696,7 +696,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:17 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:04 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:23 2011 PST by vadim
# Generated Mon Nov 28 12:21:11 2011 PST by vadim
#
# files: * firewall21-1.fw /etc/fw/firewall21-1.fw
#
@ -496,7 +496,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:23 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:23 2011 PST by vadim
# Generated Mon Nov 28 12:21:08 2011 PST by vadim
#
# files: * firewall21.fw /etc/fw/firewall21.fw
#
@ -495,7 +495,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:23 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:08 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:23 2011 PST by vadim
# Generated Mon Nov 28 12:21:11 2011 PST by vadim
#
# files: * firewall22.fw /etc/fw/firewall22.fw
#
@ -412,7 +412,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:23 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3588
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Mon Nov 21 11:50:27 2011 PST by vadim
# Generated Mon Nov 28 12:21:18 2011 PST by vadim
#
# files: * firewall23-1.fw /etc/fw/firewall23-1.fw
#
@ -586,7 +586,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Mon Nov 21 11:50:27 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:18 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

462
test/ipt/firewall23-2.fw.orig Executable file
View File

@ -0,0 +1,462 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Mon Nov 28 12:21:20 2011 PST by vadim
#
# files: * firewall23-2.fw /etc/fw/firewall23-2.fw
#
# Compiled for iptables 1.3.0
#
# This is BRIDGING FIREWALL
# with two bridges and wildcard bridge port interfaces
# see SF bug #3439613
FWBDEBUG=""
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
export PATH
LSMOD="/sbin/lsmod"
MODPROBE="/sbin/modprobe"
IPTABLES="/sbin/iptables"
IP6TABLES="/sbin/ip6tables"
IPTABLES_RESTORE="/sbin/iptables-restore"
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
IP="/sbin/ip"
IFCONFIG="/sbin/ifconfig"
VCONFIG="/sbin/vconfig"
BRCTL="/sbin/brctl"
IFENSLAVE="/sbin/ifenslave"
IPSET="/usr/sbin/ipset"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
which "$LOGGER" >/dev/null 2>&1 && $LOGGER -p info "$1"
}
getInterfaceVarName() {
echo $1 | sed 's/\./_/'
}
getaddr_internal() {
dev=$1
name=$2
af=$3
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getnet_internal() {
dev=$1
name=$2
af=$3
L=$($IP route list proto kernel | grep $dev | grep -v default | sed 's! .*$!!')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getaddr() {
getaddr_internal $1 $2 "-4"
}
getaddr6() {
getaddr_internal $1 $2 "-6"
}
getnet() {
getnet_internal $1 $2 "-4"
}
getnet6() {
getnet_internal $1 $2 "-6"
}
# function getinterfaces is used to process wildcard interfaces
getinterfaces() {
NAME=$1
$IP link show | grep ": $NAME" | while read L; do
OIFS=$IFS
IFS=" :"
set $L
IFS=$OIFS
echo $2
done
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
find_program() {
PGM=$1
which $PGM >/dev/null 2>&1 || {
echo "\"$PGM\" not found"
exit 1
}
}
check_tools() {
find_program which
find_program $IPTABLES
find_program $IP
}
reset_iptables_v4() {
$IPTABLES -P OUTPUT DROP
$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
cat /proc/net/ip_tables_names | while read table; do
$IPTABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IPTABLES -t $table -F $chain
fi
done
$IPTABLES -t $table -X
done
}
reset_iptables_v6() {
$IP6TABLES -P OUTPUT DROP
$IP6TABLES -P INPUT DROP
$IP6TABLES -P FORWARD DROP
cat /proc/net/ip6_tables_names | while read table; do
$IP6TABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IP6TABLES -t $table -F $chain
fi
done
$IP6TABLES -t $table -X
done
}
P2P_INTERFACE_WARNING=""
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
$IP addr show dev $interface | grep -q POINTOPOINT && {
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
P2P_INTERFACE_WARNING="yes"
return
}
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
echo $addr | grep -q ':' && {
$FWBDEBUG $IP addr $cmd $addr dev $interface
} || {
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
}
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
$FWBDEBUG $IP addr $cmd $addr dev $interface || exit 1
}
$FWBDEBUG $IP link set $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
$IP addr ls dev $interface | \
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IP link show dev $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
clear_addresses_except_known_interfaces() {
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
while read intf; do
echo "# Removing addresses not configured in fwbuilder from interface $intf"
$FWBDEBUG $IP addr flush dev $intf scope global
$FWBDEBUG $IP link set $intf down
done
}
check_file() {
test -r "$2" || {
echo "Can not find file $2 referenced by address table object $1"
exit 1
}
}
check_run_time_address_table_files() {
:
}
load_modules() {
:
}
verify_interfaces() {
:
}
prolog_commands() {
echo "Running prolog script"
}
epilog_commands() {
echo "Running epilog script"
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
# Configure interfaces
update_addresses_of_interface "lo 127.0.0.1/8" ""
}
script_body() {
echo 30 > /proc/sys/net/ipv4/tcp_fin_timeout
echo 1800 > /proc/sys/net/ipv4/tcp_keepalive_intvl
# ================ IPv4
# ================ Table 'filter', automatic rules
# accept established sessions
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# ================ Table 'mangle', automatic rules
$IPTABLES -t mangle -A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
# ================ Table 'filter', rule set Policy
#
# Rule 0 (vnet+)
#
echo "Rule 0 (vnet+)"
#
# -i br0
$IPTABLES -A INPUT -i br0 -m physdev --physdev-in vnet+ -m state --state NEW -j ACCEPT
#
# Rule 1 (vnet+)
#
echo "Rule 1 (vnet+)"
#
# -i br1
$IPTABLES -A INPUT -i br1 -m physdev --physdev-in vnet+ -m state --state NEW -j ACCEPT
#
# Rule 2 (vnet+)
#
echo "Rule 2 (vnet+)"
#
# -o br0
$IPTABLES -A OUTPUT -o br0 -m physdev --physdev-is-bridged --physdev-out vnet+ -m state --state NEW -j ACCEPT
#
# Rule 3 (vnet+)
#
echo "Rule 3 (vnet+)"
#
# -o br1
$IPTABLES -A OUTPUT -o br1 -m physdev --physdev-is-bridged --physdev-out vnet+ -m state --state NEW -j ACCEPT
}
ip_forward() {
:
}
reset_all() {
:
reset_iptables_v4
}
block_action() {
reset_all
}
stop_action() {
reset_all
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
}
check_iptables() {
IP_TABLES="$1"
[ ! -e $IP_TABLES ] && return 151
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
[ -z "$NF_TABLES" ] && return 152
return 0
}
status_action() {
check_iptables "/proc/net/ip_tables_names"
ret_ipv4=$?
check_iptables "/proc/net/ip6_tables_names"
ret_ipv6=$?
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
echo "iptables modules are not loaded"
}
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
echo "Firewall is not configured"
}
exit 3
}
# See how we were called.
# For backwards compatibility missing argument is equivalent to 'start'
cmd=$1
test -z "$cmd" && {
cmd="start"
}
case "$cmd" in
start)
log "Activating firewall script generated Mon Nov 28 12:21:20 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files
load_modules " "
configure_interfaces
verify_interfaces
reset_all
script_body
ip_forward
epilog_commands
RETVAL=$?
;;
stop)
stop_action
RETVAL=$?
;;
status)
status_action
RETVAL=$?
;;
block)
block_action
RETVAL=$?
;;
reload)
$0 stop
$0 start
RETVAL=$?
;;
interfaces)
configure_interfaces
RETVAL=$?
;;
test_interfaces)
FWBDEBUG="echo"
configure_interfaces
RETVAL=$?
;;
*)
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
;;
esac
exit $RETVAL

448
test/ipt/firewall23-3.fw.orig Executable file
View File

@ -0,0 +1,448 @@
#!/bin/sh
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Mon Nov 28 12:21:24 2011 PST by vadim
#
# files: * firewall23-3.fw /etc/fw/firewall23-3.fw
#
# Compiled for iptables 1.3.0
#
# This is BRIDGING FIREWALL
# with one bridge and wildcard bridge port interfaces.
# Since there is only one bridge, there is no need to add -i br0 / -o br0
# see SF bug #3439613
FWBDEBUG=""
PATH="/sbin:/usr/sbin:/bin:/usr/bin:${PATH}"
export PATH
LSMOD="/sbin/lsmod"
MODPROBE="/sbin/modprobe"
IPTABLES="/sbin/iptables"
IP6TABLES="/sbin/ip6tables"
IPTABLES_RESTORE="/sbin/iptables-restore"
IP6TABLES_RESTORE="/sbin/ip6tables-restore"
IP="/sbin/ip"
IFCONFIG="/sbin/ifconfig"
VCONFIG="/sbin/vconfig"
BRCTL="/sbin/brctl"
IFENSLAVE="/sbin/ifenslave"
IPSET="/usr/sbin/ipset"
LOGGER="/usr/bin/logger"
log() {
echo "$1"
which "$LOGGER" >/dev/null 2>&1 && $LOGGER -p info "$1"
}
getInterfaceVarName() {
echo $1 | sed 's/\./_/'
}
getaddr_internal() {
dev=$1
name=$2
af=$3
L=$($IP $af addr show dev $dev | sed -n '/inet/{s!.*inet6* !!;s!/.*!!p}' | sed 's/peer.*//')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getnet_internal() {
dev=$1
name=$2
af=$3
L=$($IP route list proto kernel | grep $dev | grep -v default | sed 's! .*$!!')
test -z "$L" && {
eval "$name=''"
return
}
eval "${name}_list=\"$L\""
}
getaddr() {
getaddr_internal $1 $2 "-4"
}
getaddr6() {
getaddr_internal $1 $2 "-6"
}
getnet() {
getnet_internal $1 $2 "-4"
}
getnet6() {
getnet_internal $1 $2 "-6"
}
# function getinterfaces is used to process wildcard interfaces
getinterfaces() {
NAME=$1
$IP link show | grep ": $NAME" | while read L; do
OIFS=$IFS
IFS=" :"
set $L
IFS=$OIFS
echo $2
done
}
diff_intf() {
func=$1
list1=$2
list2=$3
cmd=$4
for intf in $list1
do
echo $list2 | grep -q $intf || {
# $vlan is absent in list 2
$func $intf $cmd
}
done
}
find_program() {
PGM=$1
which $PGM >/dev/null 2>&1 || {
echo "\"$PGM\" not found"
exit 1
}
}
check_tools() {
find_program which
find_program $IPTABLES
find_program $IP
}
reset_iptables_v4() {
$IPTABLES -P OUTPUT DROP
$IPTABLES -P INPUT DROP
$IPTABLES -P FORWARD DROP
cat /proc/net/ip_tables_names | while read table; do
$IPTABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IPTABLES -t $table -F $chain
fi
done
$IPTABLES -t $table -X
done
}
reset_iptables_v6() {
$IP6TABLES -P OUTPUT DROP
$IP6TABLES -P INPUT DROP
$IP6TABLES -P FORWARD DROP
cat /proc/net/ip6_tables_names | while read table; do
$IP6TABLES -t $table -L -n | while read c chain rest; do
if test "X$c" = "XChain" ; then
$IP6TABLES -t $table -F $chain
fi
done
$IP6TABLES -t $table -X
done
}
P2P_INTERFACE_WARNING=""
missing_address() {
address=$1
cmd=$2
oldIFS=$IFS
IFS="@"
set $address
addr=$1
interface=$2
IFS=$oldIFS
$IP addr show dev $interface | grep -q POINTOPOINT && {
test -z "$P2P_INTERFACE_WARNING" && echo "Warning: Can not update address of interface $interface. fwbuilder can not manage addresses of point-to-point interfaces yet"
P2P_INTERFACE_WARNING="yes"
return
}
test "$cmd" = "add" && {
echo "# Adding ip address: $interface $addr"
echo $addr | grep -q ':' && {
$FWBDEBUG $IP addr $cmd $addr dev $interface
} || {
$FWBDEBUG $IP addr $cmd $addr broadcast + dev $interface
}
}
test "$cmd" = "del" && {
echo "# Removing ip address: $interface $addr"
$FWBDEBUG $IP addr $cmd $addr dev $interface || exit 1
}
$FWBDEBUG $IP link set $interface up
}
list_addresses_by_scope() {
interface=$1
scope=$2
ignore_list=$3
$IP addr ls dev $interface | \
awk -v IGNORED="$ignore_list" -v SCOPE="$scope" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/inet |inet6 / && $0 ~ SCOPE && !($2 in ignored_dict)) {print $2;}' | \
while read addr; do
echo "${addr}@$interface"
done | sort
}
update_addresses_of_interface() {
ignore_list=$2
set $1
interface=$1
shift
FWB_ADDRS=$(
for addr in $*; do
echo "${addr}@$interface"
done | sort
)
CURRENT_ADDRS_ALL_SCOPES=""
CURRENT_ADDRS_GLOBAL_SCOPE=""
$IP link show dev $interface >/dev/null 2>&1 && {
CURRENT_ADDRS_ALL_SCOPES=$(list_addresses_by_scope $interface 'scope .*' "$ignore_list")
CURRENT_ADDRS_GLOBAL_SCOPE=$(list_addresses_by_scope $interface 'scope global' "$ignore_list")
} || {
echo "# Interface $interface does not exist"
# Stop the script if we are not in test mode
test -z "$FWBDEBUG" && exit 1
}
diff_intf missing_address "$FWB_ADDRS" "$CURRENT_ADDRS_ALL_SCOPES" add
diff_intf missing_address "$CURRENT_ADDRS_GLOBAL_SCOPE" "$FWB_ADDRS" del
}
clear_addresses_except_known_interfaces() {
$IP link show | sed 's/://g' | awk -v IGNORED="$*" \
'BEGIN {
split(IGNORED,ignored_arr);
for (a in ignored_arr) {ignored_dict[ignored_arr[a]]=1;}
}
(/state/ && !($2 in ignored_dict)) {print $2;}' | \
while read intf; do
echo "# Removing addresses not configured in fwbuilder from interface $intf"
$FWBDEBUG $IP addr flush dev $intf scope global
$FWBDEBUG $IP link set $intf down
done
}
check_file() {
test -r "$2" || {
echo "Can not find file $2 referenced by address table object $1"
exit 1
}
}
check_run_time_address_table_files() {
:
}
load_modules() {
:
}
verify_interfaces() {
:
}
prolog_commands() {
echo "Running prolog script"
}
epilog_commands() {
echo "Running epilog script"
}
run_epilog_and_exit() {
epilog_commands
exit $1
}
configure_interfaces() {
:
# Configure interfaces
update_addresses_of_interface "lo 127.0.0.1/8" ""
}
script_body() {
echo 30 > /proc/sys/net/ipv4/tcp_fin_timeout
echo 1800 > /proc/sys/net/ipv4/tcp_keepalive_intvl
# ================ IPv4
# ================ Table 'filter', automatic rules
# accept established sessions
$IPTABLES -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
$IPTABLES -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
# ================ Table 'mangle', automatic rules
$IPTABLES -t mangle -A FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
# ================ Table 'filter', rule set Policy
#
# Rule 0 (vnet+)
#
echo "Rule 0 (vnet+)"
#
$IPTABLES -A INPUT -m physdev --physdev-in vnet+ -m state --state NEW -j ACCEPT
#
# Rule 1 (vnet+)
#
echo "Rule 1 (vnet+)"
#
# -o br0
$IPTABLES -A OUTPUT -m physdev --physdev-is-bridged --physdev-out vnet+ -m state --state NEW -j ACCEPT
}
ip_forward() {
:
}
reset_all() {
:
reset_iptables_v4
}
block_action() {
reset_all
}
stop_action() {
reset_all
$IPTABLES -P OUTPUT ACCEPT
$IPTABLES -P INPUT ACCEPT
$IPTABLES -P FORWARD ACCEPT
}
check_iptables() {
IP_TABLES="$1"
[ ! -e $IP_TABLES ] && return 151
NF_TABLES=$(cat $IP_TABLES 2>/dev/null)
[ -z "$NF_TABLES" ] && return 152
return 0
}
status_action() {
check_iptables "/proc/net/ip_tables_names"
ret_ipv4=$?
check_iptables "/proc/net/ip6_tables_names"
ret_ipv6=$?
[ $ret_ipv4 -eq 0 -o $ret_ipv6 -eq 0 ] && return 0
[ $ret_ipv4 -eq 151 -o $ret_ipv6 -eq 151 ] && {
echo "iptables modules are not loaded"
}
[ $ret_ipv4 -eq 152 -o $ret_ipv6 -eq 152 ] && {
echo "Firewall is not configured"
}
exit 3
}
# See how we were called.
# For backwards compatibility missing argument is equivalent to 'start'
cmd=$1
test -z "$cmd" && {
cmd="start"
}
case "$cmd" in
start)
log "Activating firewall script generated Mon Nov 28 12:21:24 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files
load_modules " "
configure_interfaces
verify_interfaces
reset_all
script_body
ip_forward
epilog_commands
RETVAL=$?
;;
stop)
stop_action
RETVAL=$?
;;
status)
status_action
RETVAL=$?
;;
block)
block_action
RETVAL=$?
;;
reload)
$0 stop
$0 start
RETVAL=$?
;;
interfaces)
configure_interfaces
RETVAL=$?
;;
test_interfaces)
FWBDEBUG="echo"
configure_interfaces
RETVAL=$?
;;
*)
echo "Usage $0 [start|stop|status|block|reload|interfaces|test_interfaces]"
;;
esac
exit $RETVAL

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:29 2011 PST by vadim
# Generated Mon Nov 28 12:21:18 2011 PST by vadim
#
# files: * firewall23.fw /etc/fw/firewall23.fw
#
@ -498,7 +498,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:29 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:18 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:34 2011 PST by vadim
# Generated Mon Nov 28 12:21:25 2011 PST by vadim
#
# files: * firewall24.fw /etc/fw/firewall24.fw
#
@ -515,7 +515,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:25 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:34 2011 PST by vadim
# Generated Mon Nov 28 12:21:26 2011 PST by vadim
#
# files: * firewall25.fw /etc/fw/firewall25.fw
#
@ -706,7 +706,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:26 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:38 2011 PST by vadim
# Generated Mon Nov 28 12:21:32 2011 PST by vadim
#
# files: * firewall26.fw /etc/fw/firewall26.fw
#
@ -586,7 +586,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:38 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:39 2011 PST by vadim
# Generated Mon Nov 28 12:21:32 2011 PST by vadim
#
# files: * firewall27.fw /etc/fw/firewall27.fw
#
@ -568,7 +568,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:43 2011 PST by vadim
# Generated Mon Nov 28 12:21:37 2011 PST by vadim
#
# files: * firewall28.fw /etc/fw/firewall28.fw
#
@ -431,7 +431,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:43 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:37 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:44 2011 PST by vadim
# Generated Mon Nov 28 12:21:38 2011 PST by vadim
#
# files: * firewall29.fw /etc/fw/firewall29.fw
#
@ -466,7 +466,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:44 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:38 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:44 2011 PST by vadim
# Generated Mon Nov 28 12:21:38 2011 PST by vadim
#
# files: * firewall3.fw /etc/fw/firewall3.fw
#
@ -600,7 +600,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:44 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:38 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:44 2011 PST by vadim
# Generated Mon Nov 28 12:21:41 2011 PST by vadim
#
# files: * firewall30.fw /etc/fw/firewall30.fw
#
@ -397,7 +397,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:44 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:47 2011 PST by vadim
# Generated Mon Nov 28 12:21:44 2011 PST by vadim
#
# files: * firewall31.fw /etc/fw/firewall31.fw
#
@ -469,7 +469,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:47 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:48 2011 PST by vadim
# Generated Mon Nov 28 12:21:44 2011 PST by vadim
#
# files: * firewall32.fw /etc/fw/firewall32.fw
#
@ -440,7 +440,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:48 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:50 2011 PST by vadim
# Generated Mon Nov 28 12:21:48 2011 PST by vadim
#
# files: * firewall33-1.fw /etc/fw/firewall33-1.fw
#
@ -539,7 +539,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:50 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:48 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:50 2011 PST by vadim
# Generated Mon Nov 28 12:21:46 2011 PST by vadim
#
# files: * firewall33.fw /etc/fw/firewall33.fw
#
@ -584,7 +584,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:50 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:51 2011 PST by vadim
# Generated Mon Nov 28 12:21:50 2011 PST by vadim
#
# files: * firewall34.fw /etc/fw/firewall34.fw
#
@ -672,7 +672,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:51 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:50 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:53 2011 PST by vadim
# Generated Mon Nov 28 12:21:51 2011 PST by vadim
#
# files: * firewall35.fw /etc/fw/firewall35.fw
#
@ -564,7 +564,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:53 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:51 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:55 2011 PST by vadim
# Generated Mon Nov 28 12:21:55 2011 PST by vadim
#
# files: * firewall36-1.fw /etc/firewall36-1.fw
#
@ -455,7 +455,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:55 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:55 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:55 2011 PST by vadim
# Generated Mon Nov 28 12:21:56 2011 PST by vadim
#
# files: * firewall36-2.fw /etc/firewall36-2.fw
#
@ -455,7 +455,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:55 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:55 2011 PST by vadim
# Generated Mon Nov 28 12:21:52 2011 PST by vadim
#
# files: * firewall36.fw /etc/firewall36.fw
#
@ -519,7 +519,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:55 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:52 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:59 2011 PST by vadim
# Generated Mon Nov 28 12:21:58 2011 PST by vadim
#
# files: * firewall37-1.fw /etc/fw/firewall37-1.fw
#
@ -988,7 +988,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:59 2011 PST by vadim
# Generated Mon Nov 28 12:22:01 2011 PST by vadim
#
# files: * firewall37-2.fw /etc/fw/firewall37-2.fw
#
@ -705,7 +705,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:01 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:58 2011 PST by vadim
# Generated Mon Nov 28 12:21:58 2011 PST by vadim
#
# files: * firewall37.fw /etc/fw/firewall37.fw
#
@ -1314,7 +1314,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:58 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:21:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:57:59 2011 PST by vadim
# Generated Mon Nov 28 12:22:02 2011 PST by vadim
#
# files: * firewall38.fw /etc/fw/firewall38.fw
#
@ -541,7 +541,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:57:59 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:01 2011 PST by vadim
# Generated Mon Nov 28 12:22:05 2011 PST by vadim
#
# files: * firewall39.fw /etc/fw/firewall39.fw
#
@ -821,7 +821,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:01 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:05 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:05 2011 PST by vadim
# Generated Mon Nov 28 12:22:05 2011 PST by vadim
#
# files: * firewall4.fw /etc/fw/firewall4.fw
#
@ -734,7 +734,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:05 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:05 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:04 2011 PST by vadim
# Generated Mon Nov 28 12:22:09 2011 PST by vadim
#
# files: * firewall40-1.fw /etc/firewall40-1.fw
#
@ -463,7 +463,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:09 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:05 2011 PST by vadim
# Generated Mon Nov 28 12:22:11 2011 PST by vadim
#
# files: * firewall40-2.fw /etc/firewall40-2.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:05 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:04 2011 PST by vadim
# Generated Mon Nov 28 12:22:07 2011 PST by vadim
#
# files: * firewall40.fw /etc/firewall40.fw
#
@ -456,7 +456,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:04 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:07 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:09 2011 PST by vadim
# Generated Mon Nov 28 12:22:13 2011 PST by vadim
#
# files: * firewall41-1.fw /etc/firewall41-1.fw
#
@ -597,7 +597,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:09 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:13 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:09 2011 PST by vadim
# Generated Mon Nov 28 12:22:11 2011 PST by vadim
#
# files: * firewall41.fw /etc/firewall41.fw
#
@ -481,7 +481,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:09 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:11 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:09 2011 PST by vadim
# Generated Mon Nov 28 12:22:17 2011 PST by vadim
#
# files: * firewall42.fw /etc/fw/firewall42.fw
#
@ -406,7 +406,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:09 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:17 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:15 2011 PST by vadim
# Generated Mon Nov 28 12:22:18 2011 PST by vadim
#
# files: * firewall5.fw /etc/fw/firewall5.fw
#
@ -648,7 +648,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:18 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:14 2011 PST by vadim
# Generated Mon Nov 28 12:22:19 2011 PST by vadim
#
# files: * firewall50.fw /etc/fw/firewall50.fw
#
@ -440,7 +440,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:14 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:19 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:15 2011 PST by vadim
# Generated Mon Nov 28 12:22:21 2011 PST by vadim
#
# files: * firewall51.fw /etc/fw/firewall51.fw
#
@ -513,7 +513,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:21 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:15 2011 PST by vadim
# Generated Mon Nov 28 12:22:24 2011 PST by vadim
#
# files: * firewall6.fw /etc/fw/firewall6.fw
#
@ -535,7 +535,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:24 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:20 2011 PST by vadim
# Generated Mon Nov 28 12:22:24 2011 PST by vadim
#
# files: * firewall60.fw /etc/firewall60.fw
#
@ -441,7 +441,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:24 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:20 2011 PST by vadim
# Generated Mon Nov 28 12:22:25 2011 PST by vadim
#
# files: * firewall61-1.2.5.fw /etc/firewall61-1.2.5.fw
#
@ -521,7 +521,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:25 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:20 2011 PST by vadim
# Generated Mon Nov 28 12:22:26 2011 PST by vadim
#
# files: * firewall61-1.2.6.fw /etc/firewall61-1.2.6.fw
#
@ -527,7 +527,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:26 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:20 2011 PST by vadim
# Generated Mon Nov 28 12:22:30 2011 PST by vadim
#
# files: * firewall61-1.3.x.fw /etc/firewall61-1.3.x.fw
#
@ -514,7 +514,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:25 2011 PST by vadim
# Generated Mon Nov 28 12:22:30 2011 PST by vadim
#
# files: * firewall61-1.4.fw /etc/firewall61-1.4.fw
#
@ -515,7 +515,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:30 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:25 2011 PST by vadim
# Generated Mon Nov 28 12:22:31 2011 PST by vadim
#
# files: * firewall62.fw /etc/firewall62.fw
#
@ -591,7 +591,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:31 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:25 2011 PST by vadim
# Generated Mon Nov 28 12:22:32 2011 PST by vadim
#
# files: * firewall63.fw /etc/firewall63.fw
#
@ -411,7 +411,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:32 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:25 2011 PST by vadim
# Generated Mon Nov 28 12:22:36 2011 PST by vadim
#
# files: * firewall7.fw /etc/fw/firewall7.fw
#
@ -495,7 +495,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:36 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:29 2011 PST by vadim
# Generated Mon Nov 28 12:22:37 2011 PST by vadim
#
# files: * firewall70.fw iptables.sh
#
@ -434,7 +434,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:29 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:37 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:30 2011 PST by vadim
# Generated Mon Nov 28 12:22:37 2011 PST by vadim
#
# files: * firewall71.fw /etc/fw/firewall71.fw
#
@ -450,7 +450,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:30 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:37 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:30 2011 PST by vadim
# Generated Mon Nov 28 12:22:38 2011 PST by vadim
#
# files: * firewall72-1.3.x.fw /etc/fw/firewall72-1.3.x.fw
#
@ -582,7 +582,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:30 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:38 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:30 2011 PST by vadim
# Generated Mon Nov 28 12:22:42 2011 PST by vadim
#
# files: * firewall72-1.4.3.fw /etc/fw/firewall72-1.4.3.fw
#
@ -582,7 +582,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:30 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:42 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:34 2011 PST by vadim
# Generated Mon Nov 28 12:22:43 2011 PST by vadim
#
# files: * firewall73.fw /etc/fw/firewall73.fw
#
@ -545,7 +545,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:34 2011 PST by vadim
# Generated Mon Nov 28 12:22:43 2011 PST by vadim
#
# files: * firewall74.fw /etc/fw/firewall74.fw
#
@ -397,7 +397,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:34 2011 PST by vadim
# Generated Mon Nov 28 12:22:44 2011 PST by vadim
#
# files: * firewall8.fw /etc/fw/firewall8.fw
#
@ -382,7 +382,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:34 2011 PST by vadim
# Generated Mon Nov 28 12:22:48 2011 PST by vadim
#
# files: * firewall80.fw /etc/fw/firewall80.fw
#
@ -421,7 +421,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:34 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:48 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:38 2011 PST by vadim
# Generated Mon Nov 28 12:22:49 2011 PST by vadim
#
# files: * firewall81.fw /etc/fw/firewall81.fw
#
@ -442,7 +442,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:38 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:49 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:39 2011 PST by vadim
# Generated Mon Nov 28 12:22:49 2011 PST by vadim
#
# files: * firewall82.fw /etc/firewall82.fw
#
@ -435,7 +435,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:49 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:39 2011 PST by vadim
# Generated Mon Nov 28 12:22:50 2011 PST by vadim
#
# files: * firewall82_A.fw /etc/fw/firewall82_A.fw
#
@ -422,7 +422,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:50 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:39 2011 PST by vadim
# Generated Mon Nov 28 12:22:53 2011 PST by vadim
#
# files: * firewall82_B.fw /etc/fw/firewall82_B.fw
#
@ -385,7 +385,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:39 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:53 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:43 2011 PST by vadim
# Generated Mon Nov 28 12:22:56 2011 PST by vadim
#
# files: * firewall9.fw /etc/fw/firewall9.fw
#
@ -643,7 +643,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:43 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:43 2011 PST by vadim
# Generated Mon Nov 28 12:22:56 2011 PST by vadim
#
# files: * firewall90.fw /etc/fw/firewall90.fw
#
@ -405,7 +405,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:43 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:43 2011 PST by vadim
# Generated Mon Nov 28 12:22:56 2011 PST by vadim
#
# files: * firewall91.fw /etc/fw/firewall91.fw
#
@ -405,7 +405,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:43 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:56 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:44 2011 PST by vadim
# Generated Mon Nov 28 12:22:58 2011 PST by vadim
#
# files: * firewall92.fw /etc/fw/firewall92.fw
#
@ -441,7 +441,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:44 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:58 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:47 2011 PST by vadim
# Generated Mon Nov 28 12:23:02 2011 PST by vadim
#
# files: * firewall93.fw /etc/fw/firewall93.fw
#
@ -484,7 +484,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:47 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:48 2011 PST by vadim
# Generated Mon Nov 28 12:23:02 2011 PST by vadim
#
# files: * firewall94.fw /etc/fw/firewall94.fw
#
@ -536,7 +536,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:58:48 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Wed Nov 16 10:13:00 2011 PST by vadim
# Generated Mon Nov 28 12:23:02 2011 PST by vadim
#
# files: * firewall95.fw /etc/fw/firewall95.fw
#
@ -393,7 +393,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Wed Nov 16 10:13:00 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:02 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:15 2011 PST by vadim
# Generated Mon Nov 28 12:23:35 2011 PST by vadim
#
# files: * fw-A.fw /sw/FWbuilder/fw-A.fw
#
@ -746,7 +746,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:35 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:15 2011 PST by vadim
# Generated Mon Nov 28 12:23:35 2011 PST by vadim
#
# files: * fw1.fw /etc/fw1.fw
#
@ -547,7 +547,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:15 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:35 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:58:10 2011 PST by vadim
# Generated Mon Nov 28 12:22:15 2011 PST by vadim
#
# files: * fwbuilder.fw /etc/init.d/fwbuilder.fw
#
@ -505,7 +505,7 @@ status_action() {
}
start() {
log "Activating firewall script generated Thu Nov 10 11:58:10 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:22:15 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:22 2011 PST by vadim
# Generated Mon Nov 28 12:23:44 2011 PST by vadim
#
# files: * heartbeat_cluster_1_d_linux-1-d.fw firewall.sh
#
@ -748,7 +748,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:22 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:22 2011 PST by vadim
# Generated Mon Nov 28 12:23:44 2011 PST by vadim
#
# files: * heartbeat_cluster_1_d_linux-2-d.fw firewall.sh
#
@ -750,7 +750,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:22 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:44 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:21 2011 PST by vadim
# Generated Mon Nov 28 12:23:43 2011 PST by vadim
#
# files: * heartbeat_cluster_1_linux-1.fw /etc/heartbeat_cluster_1_linux-1.fw
#
@ -865,7 +865,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:21 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:22 2011 PST by vadim
# Generated Mon Nov 28 12:23:43 2011 PST by vadim
#
# files: * heartbeat_cluster_1_linux-2.fw /etc/heartbeat_cluster_1_linux-2.fw
#
@ -763,7 +763,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:22 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:43 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:23 2011 PST by vadim
# Generated Mon Nov 28 12:23:45 2011 PST by vadim
#
# files: * heartbeat_cluster_2_linux-1.fw /etc/heartbeat_cluster_2_linux-1.fw
#
@ -729,7 +729,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:23 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:45 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:23 2011 PST by vadim
# Generated Mon Nov 28 12:23:45 2011 PST by vadim
#
# files: * heartbeat_cluster_2_linux-2.fw /etc/heartbeat_cluster_2_linux-2.fw
#
@ -642,7 +642,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:23 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:45 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:19 2011 PST by vadim
# Generated Mon Nov 28 12:23:39 2011 PST by vadim
#
# files: * host.fw /etc/fw/host.fw
#
@ -444,7 +444,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:19 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:39 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE FWObjectDatabase SYSTEM "fwbuilder.dtd">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="22" lastModified="1321469139" id="root">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="22" lastModified="1322511504" id="root">
<Library id="syslib000" color="#d4f8ff" name="Standard" comment="Standard objects" ro="True">
<AnyNetwork id="sysid0" name="Any" comment="Any Network" ro="False" address="0.0.0.0" netmask="0.0.0.0"/>
<AnyIPService id="sysid1" protocol_num="0" name="Any" comment="Any IP Service" ro="False"/>
@ -4868,6 +4868,27 @@
<Option name="verify_interfaces">True</Option>
</FirewallOptions>
</Firewall>
<IPv4 id="id132459X16603" name="firewall23-2:br0:ip" comment="" ro="False" address="192.168.1.1" netmask="255.255.255.0"/>
<Interface id="id132463X16603" dedicated_failover="False" dyn="False" security_level="0" unnum="False" unprotected="False" name="eth3" comment="" ro="False">
<InterfaceOptions>
<Option name="type">ethernet</Option>
</InterfaceOptions>
</Interface>
<Interface id="id538306X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="br1" comment="" ro="False">
<InterfaceOptions>
<Option name="bonding_policy"></Option>
<Option name="bondng_driver_options"></Option>
<Option name="enable_stp">False</Option>
<Option name="type">bridge</Option>
<Option name="vlan_id">0</Option>
<Option name="xmit_hash_policy"></Option>
</InterfaceOptions>
<Interface id="id538311X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="vnet+" comment="" ro="False">
<InterfaceOptions>
<Option name="type">ethernet</Option>
</InterfaceOptions>
</Interface>
</Interface>
</Library>
<Library id="syslib001" color="#d2ffd0" name="User" comment="User defined objects" ro="False">
<ObjectGroup id="stdid01_1_clusters" name="Clusters" comment="" ro="False"/>
@ -65557,6 +65578,387 @@ echo '%FWBPROMPT%'; sh /tmp/%FWSCRIPT%
<Option name="verify_interfaces">True</Option>
</FirewallOptions>
</Firewall>
<Firewall id="id132439X16603" host_OS="linux24" inactive="False" lastCompiled="1272404372" lastInstalled="1142003872" lastModified="1322511491" platform="iptables" version="1.3.0" name="firewall23-2" comment="&#10;This is BRIDGING FIREWALL&#10;with two bridges and wildcard bridge port interfaces&#10;&#10;see SF bug #3439613&#10;" ro="False">
<NAT id="id133208X16603" name="NAT" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<RuleSetOptions/>
</NAT>
<Policy id="id132465X16603" name="Policy" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<PolicyRule id="id132467X16603" disabled="False" group="" log="False" position="0" action="Accept" direction="Inbound" comment="-i br0">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
<Dst neg="False">
<ObjectRef ref="id132439X16603"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id132461X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="pf_classify_str"></Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id133417X16603" disabled="False" group="" log="False" position="1" action="Accept" direction="Inbound" comment="-i br1">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
<Dst neg="False">
<ObjectRef ref="id132439X16603"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id133429X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="stateless">False</Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id403077X16603" disabled="False" group="" log="False" position="2" action="Accept" direction="Outbound" comment="-o br0">
<Src neg="False">
<ObjectRef ref="id132439X16603"/>
</Src>
<Dst neg="False">
<ObjectRef ref="sysid0"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id132461X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="pf_classify_str"></Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id403021X16603" disabled="False" group="" log="False" position="3" action="Accept" direction="Outbound" comment="-o br1">
<Src neg="False">
<ObjectRef ref="id132439X16603"/>
</Src>
<Dst neg="False">
<ObjectRef ref="sysid0"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id133429X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="stateless">False</Option>
</PolicyRuleOptions>
</PolicyRule>
<RuleSetOptions/>
</Policy>
<Routing id="id133211X16603" name="Routing" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<RuleSetOptions/>
</Routing>
<Interface id="id132447X16603" dedicated_failover="False" dyn="False" security_level="100" unnum="False" unprotected="False" name="lo" comment="" ro="False">
<IPv4 id="id132450X16603" name="firewall23-2:lo:ip" comment="" ro="False" address="127.0.0.1" netmask="255.0.0.0"/>
<InterfaceOptions/>
</Interface>
<Interface id="id132452X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="100" unnum="True" unprotected="False" name="br0" comment="" ro="False">
<InterfaceOptions>
<Option name="bonding_policy"></Option>
<Option name="bondng_driver_options"></Option>
<Option name="enable_stp">False</Option>
<Option name="type">bridge</Option>
<Option name="vlan_id">0</Option>
<Option name="xmit_hash_policy"></Option>
</InterfaceOptions>
<Interface id="id132461X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="vnet+" comment="" ro="False">
<InterfaceOptions>
<Option name="type">ethernet</Option>
</InterfaceOptions>
</Interface>
</Interface>
<Interface id="id133330X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="br1" comment="" ro="False">
<InterfaceOptions>
<Option name="bonding_policy"></Option>
<Option name="bondng_driver_options"></Option>
<Option name="enable_stp">False</Option>
<Option name="type">bridge</Option>
<Option name="vlan_id">0</Option>
<Option name="xmit_hash_policy"></Option>
</InterfaceOptions>
<Interface id="id133429X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="vnet+" comment="" ro="False">
<InterfaceOptions>
<Option name="type">ethernet</Option>
</InterfaceOptions>
</Interface>
</Interface>
<Management address="192.168.1.1">
<SNMPManagement enabled="False" snmp_read_community="public" snmp_write_community=""/>
<FWBDManagement enabled="True" identity="" port="9999"/>
<PolicyInstallScript arguments="" command="" enabled="False"/>
</Management>
<FirewallOptions>
<Option name="accept_established">True</Option>
<Option name="accept_new_tcp_with_no_syn">True</Option>
<Option name="action_on_reject">ICMP net unreachable</Option>
<Option name="activationCmd"></Option>
<Option name="admUser"></Option>
<Option name="altAddress"></Option>
<Option name="bridging_fw">True</Option>
<Option name="check_shading">False</Option>
<Option name="clamp_mss_to_mtu">True</Option>
<Option name="classify_mark_terminating">False</Option>
<Option name="cmdline"></Option>
<Option name="compiler"></Option>
<Option name="configure_interfaces">True</Option>
<Option name="debug">False</Option>
<Option name="drop_invalid">False</Option>
<Option name="dyn_addr">False</Option>
<Option name="enable_ipv6">False</Option>
<Option name="epilog_script"></Option>
<Option name="firewall_dir"></Option>
<Option name="firewall_is_part_of_any">True</Option>
<Option name="firewall_is_part_of_any_and_networks">True</Option>
<Option name="ignore_empty_groups">False</Option>
<Option name="inst_cmdline"></Option>
<Option name="inst_script"></Option>
<Option name="install_script"></Option>
<Option name="ipv4_6_order">ipv4_first</Option>
<Option name="limit_suffix">/day</Option>
<Option name="limit_value">0</Option>
<Option name="linux24_accept_redirects"></Option>
<Option name="linux24_accept_source_route"></Option>
<Option name="linux24_icmp_echo_ignore_all"></Option>
<Option name="linux24_icmp_echo_ignore_broadcasts"></Option>
<Option name="linux24_icmp_ignore_bogus_error_responses"></Option>
<Option name="linux24_ip_dynaddr"></Option>
<Option name="linux24_ip_forward"></Option>
<Option name="linux24_log_martians"></Option>
<Option name="linux24_path_ip"></Option>
<Option name="linux24_path_iptables"></Option>
<Option name="linux24_path_logger"></Option>
<Option name="linux24_path_lsmod"></Option>
<Option name="linux24_path_modprobe"></Option>
<Option name="linux24_rp_filter"></Option>
<Option name="linux24_tcp_ecn"></Option>
<Option name="linux24_tcp_fack"></Option>
<Option name="linux24_tcp_fin_timeout">30</Option>
<Option name="linux24_tcp_keepalive_interval">1800</Option>
<Option name="linux24_tcp_sack"></Option>
<Option name="linux24_tcp_syncookies"></Option>
<Option name="linux24_tcp_timestamps"></Option>
<Option name="linux24_tcp_window_scaling"></Option>
<Option name="load_modules">False</Option>
<Option name="local_nat">False</Option>
<Option name="log_all">False</Option>
<Option name="log_all_dropped">False</Option>
<Option name="log_invalid">False</Option>
<Option name="log_ip_opt">False</Option>
<Option name="log_level">debug</Option>
<Option name="log_limit_suffix">/second</Option>
<Option name="log_limit_value">0</Option>
<Option name="log_prefix"></Option>
<Option name="log_tcp_opt">False</Option>
<Option name="log_tcp_seq">False</Option>
<Option name="manage_virtual_addr">True</Option>
<Option name="mgmt_addr"></Option>
<Option name="mgmt_ssh">False</Option>
<Option name="no_iochains_for_any">False</Option>
<Option name="no_ipv6_default_policy">False</Option>
<Option name="no_optimisation">False</Option>
<Option name="output_file"></Option>
<Option name="platform">iptables</Option>
<Option name="prolog_place">top</Option>
<Option name="prolog_script"></Option>
<Option name="proxy_arp">False</Option>
<Option name="script_env_path"></Option>
<Option name="snmp_contact"></Option>
<Option name="snmp_description"></Option>
<Option name="snmp_location"></Option>
<Option name="sshArgs"></Option>
<Option name="ulog_cprange">0</Option>
<Option name="ulog_nlgroup">1</Option>
<Option name="ulog_qthreshold">1</Option>
<Option name="use_ULOG">False</Option>
<Option name="use_ip_tool">False</Option>
<Option name="use_iptables_restore">False</Option>
<Option name="use_numeric_log_levels">False</Option>
<Option name="verify_interfaces">False</Option>
</FirewallOptions>
</Firewall>
<Firewall id="id538286X16603" host_OS="linux24" inactive="False" lastCompiled="1272404372" lastInstalled="1142003872" lastModified="1322511555" platform="iptables" version="1.3.0" name="firewall23-3" comment="&#10;This is BRIDGING FIREWALL&#10;with one bridge and wildcard bridge port interfaces.&#10;Since there is only one bridge, there is no need to add -i br0 / -o br0&#10;&#10;see SF bug #3439613&#10;" ro="False">
<NAT id="id538428X16603" name="NAT" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<RuleSetOptions/>
</NAT>
<Policy id="id538313X16603" name="Policy" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<PolicyRule id="id538315X16603" disabled="False" group="" log="False" position="0" action="Accept" direction="Inbound" comment="">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
<Dst neg="False">
<ObjectRef ref="id538286X16603"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id538304X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="pf_classify_str"></Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id538371X16603" disabled="False" group="" log="False" position="1" action="Accept" direction="Outbound" comment="-o br0">
<Src neg="False">
<ObjectRef ref="id538286X16603"/>
</Src>
<Dst neg="False">
<ObjectRef ref="sysid0"/>
</Dst>
<Srv neg="False">
<ServiceRef ref="sysid1"/>
</Srv>
<Itf neg="False">
<ObjectRef ref="id538304X16603"/>
</Itf>
<When neg="False">
<IntervalRef ref="sysid2"/>
</When>
<PolicyRuleOptions>
<Option name="pf_classify_str"></Option>
</PolicyRuleOptions>
</PolicyRule>
<RuleSetOptions/>
</Policy>
<Routing id="id538431X16603" name="Routing" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<RuleSetOptions/>
</Routing>
<Interface id="id538294X16603" dedicated_failover="False" dyn="False" security_level="100" unnum="False" unprotected="False" name="lo" comment="" ro="False">
<IPv4 id="id538297X16603" name="firewall23-3:lo:ip" comment="" ro="False" address="127.0.0.1" netmask="255.0.0.0"/>
<InterfaceOptions/>
</Interface>
<Interface id="id538299X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="100" unnum="True" unprotected="False" name="br0" comment="" ro="False">
<InterfaceOptions>
<Option name="bonding_policy"></Option>
<Option name="bondng_driver_options"></Option>
<Option name="enable_stp">False</Option>
<Option name="type">bridge</Option>
<Option name="vlan_id">0</Option>
<Option name="xmit_hash_policy"></Option>
</InterfaceOptions>
<Interface id="id538304X16603" dedicated_failover="False" dyn="False" label="" mgmt="False" security_level="0" unnum="True" unprotected="False" name="vnet+" comment="" ro="False">
<InterfaceOptions>
<Option name="type">ethernet</Option>
</InterfaceOptions>
</Interface>
</Interface>
<Management address="192.168.1.1">
<SNMPManagement enabled="False" snmp_read_community="public" snmp_write_community=""/>
<FWBDManagement enabled="True" identity="" port="9999"/>
<PolicyInstallScript arguments="" command="" enabled="False"/>
</Management>
<FirewallOptions>
<Option name="accept_established">True</Option>
<Option name="accept_new_tcp_with_no_syn">True</Option>
<Option name="action_on_reject">ICMP net unreachable</Option>
<Option name="activationCmd"></Option>
<Option name="admUser"></Option>
<Option name="altAddress"></Option>
<Option name="bridging_fw">True</Option>
<Option name="check_shading">False</Option>
<Option name="clamp_mss_to_mtu">True</Option>
<Option name="classify_mark_terminating">False</Option>
<Option name="cmdline"></Option>
<Option name="compiler"></Option>
<Option name="configure_interfaces">True</Option>
<Option name="debug">False</Option>
<Option name="drop_invalid">False</Option>
<Option name="dyn_addr">False</Option>
<Option name="enable_ipv6">False</Option>
<Option name="epilog_script"></Option>
<Option name="firewall_dir"></Option>
<Option name="firewall_is_part_of_any">True</Option>
<Option name="firewall_is_part_of_any_and_networks">True</Option>
<Option name="ignore_empty_groups">False</Option>
<Option name="inst_cmdline"></Option>
<Option name="inst_script"></Option>
<Option name="install_script"></Option>
<Option name="ipv4_6_order">ipv4_first</Option>
<Option name="limit_suffix">/day</Option>
<Option name="limit_value">0</Option>
<Option name="linux24_accept_redirects"></Option>
<Option name="linux24_accept_source_route"></Option>
<Option name="linux24_icmp_echo_ignore_all"></Option>
<Option name="linux24_icmp_echo_ignore_broadcasts"></Option>
<Option name="linux24_icmp_ignore_bogus_error_responses"></Option>
<Option name="linux24_ip_dynaddr"></Option>
<Option name="linux24_ip_forward"></Option>
<Option name="linux24_log_martians"></Option>
<Option name="linux24_path_ip"></Option>
<Option name="linux24_path_iptables"></Option>
<Option name="linux24_path_logger"></Option>
<Option name="linux24_path_lsmod"></Option>
<Option name="linux24_path_modprobe"></Option>
<Option name="linux24_rp_filter"></Option>
<Option name="linux24_tcp_ecn"></Option>
<Option name="linux24_tcp_fack"></Option>
<Option name="linux24_tcp_fin_timeout">30</Option>
<Option name="linux24_tcp_keepalive_interval">1800</Option>
<Option name="linux24_tcp_sack"></Option>
<Option name="linux24_tcp_syncookies"></Option>
<Option name="linux24_tcp_timestamps"></Option>
<Option name="linux24_tcp_window_scaling"></Option>
<Option name="load_modules">False</Option>
<Option name="local_nat">False</Option>
<Option name="log_all">False</Option>
<Option name="log_all_dropped">False</Option>
<Option name="log_invalid">False</Option>
<Option name="log_ip_opt">False</Option>
<Option name="log_level">debug</Option>
<Option name="log_limit_suffix">/second</Option>
<Option name="log_limit_value">0</Option>
<Option name="log_prefix"></Option>
<Option name="log_tcp_opt">False</Option>
<Option name="log_tcp_seq">False</Option>
<Option name="manage_virtual_addr">True</Option>
<Option name="mgmt_addr"></Option>
<Option name="mgmt_ssh">False</Option>
<Option name="no_iochains_for_any">False</Option>
<Option name="no_ipv6_default_policy">False</Option>
<Option name="no_optimisation">False</Option>
<Option name="output_file"></Option>
<Option name="platform">iptables</Option>
<Option name="prolog_place">top</Option>
<Option name="prolog_script"></Option>
<Option name="proxy_arp">False</Option>
<Option name="script_env_path"></Option>
<Option name="snmp_contact"></Option>
<Option name="snmp_description"></Option>
<Option name="snmp_location"></Option>
<Option name="sshArgs"></Option>
<Option name="ulog_cprange">0</Option>
<Option name="ulog_nlgroup">1</Option>
<Option name="ulog_qthreshold">1</Option>
<Option name="use_ULOG">False</Option>
<Option name="use_ip_tool">False</Option>
<Option name="use_iptables_restore">False</Option>
<Option name="use_numeric_log_levels">False</Option>
<Option name="verify_interfaces">False</Option>
</FirewallOptions>
</Firewall>
</ObjectGroup>
<IntervalGroup id="stdid11_1" name="Time" comment="" ro="False">
<Interval id="id3D6864D0" days_of_week="0,1" from_day="-1" from_hour="1" from_minute="1" from_month="-1" from_weekday="0" from_year="-1" to_day="-1" to_hour="2" to_minute="2" to_month="-1" to_weekday="1" to_year="-1" name="test time 1" comment="" ro="False"/>

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:24 2011 PST by vadim
# Generated Mon Nov 28 12:23:46 2011 PST by vadim
#
# files: * openais_cluster_1_linux-1.fw /etc/openais_cluster_1_linux-1.fw
#
@ -729,7 +729,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:24 2011 PST by vadim
# Generated Mon Nov 28 12:23:46 2011 PST by vadim
#
# files: * openais_cluster_1_linux-2.fw /etc/openais_cluster_1_linux-2.fw
#
@ -633,7 +633,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:46 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Wed Nov 16 10:13:40 2011 PST by vadim
# Generated Mon Nov 28 12:23:41 2011 PST by vadim
#
# files: * rc.firewall.local /etc/rc.d//rc.firewall.local
#

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:20 2011 PST by vadim
# Generated Mon Nov 28 12:23:41 2011 PST by vadim
#
# files: * rh90.fw /etc/rh90.fw
#
@ -443,7 +443,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:24 2011 PST by vadim
# Generated Mon Nov 28 12:23:46 2011 PST by vadim
#
# files: * secuwall_cluster_1_secuwall-1.fw /etc/secuwall_cluster_1_secuwall-1.fw
#
@ -427,7 +427,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:46 2011 by vadim"
log "Database was cluster-tests.fwb"
check_tools
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * server-cluster-1_server-1.fw /etc/fw/server-cluster-1_server-1.fw
#
@ -422,7 +422,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * server-cluster-1_server-2.fw /etc/fw/server-cluster-1_server-2.fw
#
@ -419,7 +419,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:24 2011 PST by vadim
# Generated Mon Nov 28 12:23:45 2011 PST by vadim
#
# files: * test-shadowing-1.fw /etc/test-shadowing-1.fw
#
@ -493,7 +493,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:45 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:24 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * test-shadowing-2.fw /etc/test-shadowing-2.fw
#
@ -451,7 +451,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:24 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3588
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Mon Nov 21 11:52:38 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * test-shadowing-3.fw /etc/test-shadowing-3.fw
#
@ -552,7 +552,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Mon Nov 21 11:52:38 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:20 2011 PST by vadim
# Generated Mon Nov 28 12:23:41 2011 PST by vadim
#
# files: * test_fw.fw /etc/test_fw.fw
#
@ -592,7 +592,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:20 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:41 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * vrrp_cluster_1_linux-1.fw /etc/vrrp_cluster_1_linux-1.fw
#
@ -732,7 +732,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * vrrp_cluster_1_linux-2.fw /etc/vrrp_cluster_1_linux-2.fw
#
@ -637,7 +637,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-1.fw /etc/vrrp_cluster_2_linux-1.fw
#
@ -664,7 +664,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-2.fw /etc/vrrp_cluster_2_linux-2.fw
#
@ -569,7 +569,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files

View File

@ -2,9 +2,9 @@
#
# This is automatically generated file. DO NOT MODIFY !
#
# Firewall Builder fwb_ipt v5.0.1.3585
# Firewall Builder fwb_ipt v5.0.1.3590
#
# Generated Thu Nov 10 11:59:25 2011 PST by vadim
# Generated Mon Nov 28 12:23:47 2011 PST by vadim
#
# files: * vrrp_cluster_2_linux-3.fw /etc/vrrp_cluster_2_linux-3.fw
#
@ -545,7 +545,7 @@ test -z "$cmd" && {
case "$cmd" in
start)
log "Activating firewall script generated Thu Nov 10 11:59:25 2011 by vadim"
log "Activating firewall script generated Mon Nov 28 12:23:47 2011 by vadim"
check_tools
prolog_commands
check_run_time_address_table_files