1
0
mirror of https://github.com/fwbuilder/fwbuilder synced 2026-03-21 02:37:16 +01:00

fixes #2188 protocol "gre" could not be resolved to ip protocol number on Winbdows; implemented wrappers for getprotobyname() and getservbyname(), including protocol and tcp/udp service name resolution for cisco IOS and PIX; fixed unit tests for the importer

This commit is contained in:
Vadim Kurland 2011-03-06 12:47:20 -08:00
parent 9dbb444a51
commit cac6101e0f
17 changed files with 950 additions and 909 deletions

View File

@ -30,6 +30,8 @@
#include "IOSImporter.h"
#include "getProtoByName.h"
#include "getServByName.h"
#include <ios>
#include <iostream>
@ -92,83 +94,6 @@ IOSImporter::IOSImporter(FWObject *lib,
cisco_icmp_specs["information-reply"] = std::pair<int,int>(16, 0);
cisco_icmp_specs["mask-request"] = std::pair<int,int>(17, 0);
cisco_icmp_specs["mask-reply"] = std::pair<int,int>(18, 0);
cisco_proto_specs["ah"] = 51;
cisco_proto_specs["ahp"] = 51;
cisco_proto_specs["eigrp"] = 88;
cisco_proto_specs["esp"] = 50;
cisco_proto_specs["gre"] = 47;
cisco_proto_specs["igmp"] = 2;
cisco_proto_specs["igrp"] = 9;
cisco_proto_specs["ip"] = 0;
cisco_proto_specs["ipinip"] = 4;
cisco_proto_specs["nos"] = 94;
cisco_proto_specs["ospf"] = 89;
cisco_proto_specs["pim"] = 103;
cisco_proto_specs["pcp"] = 108;
cisco_proto_specs["snp"] = 109;
cisco_tcp_specs["bgp"] = 179;
cisco_tcp_specs["chargen"] = 19;
cisco_tcp_specs["cmd"] = 514;
cisco_tcp_specs["daytime"] = 13;
cisco_tcp_specs["discard"] = 9;
cisco_tcp_specs["domain"] = 53;
cisco_tcp_specs["echo"] = 7;
cisco_tcp_specs["exec"] = 512;
cisco_tcp_specs["finger"] = 79;
cisco_tcp_specs["ftp"] = 21;
cisco_tcp_specs["ftp-data"] = 20;
cisco_tcp_specs["gopher"] = 70;
cisco_tcp_specs["hostname"] = 101;
cisco_tcp_specs["ident"] = 113;
cisco_tcp_specs["irc"] = 194;
cisco_tcp_specs["klogin"] = 543;
cisco_tcp_specs["kshell"] = 544;
cisco_tcp_specs["login"] = 513;
cisco_tcp_specs["lpd"] = 515;
cisco_tcp_specs["nntp"] = 119;
cisco_tcp_specs["pop2"] = 109;
cisco_tcp_specs["pop3"] = 110;
cisco_tcp_specs["smtp"] = 25;
cisco_tcp_specs["sunrpc"] = 111;
cisco_tcp_specs["syslog"] = 514;
cisco_tcp_specs["tacacs"] = 49;
cisco_tcp_specs["tacacs-ds"] = 63;
cisco_tcp_specs["talk"] = 517;
cisco_tcp_specs["telnet"] = 23;
cisco_tcp_specs["time"] = 37;
cisco_tcp_specs["uucp"] = 540;
cisco_tcp_specs["whois"] = 43;
cisco_tcp_specs["www"] = 80;
cisco_udp_specs["biff"] = 512;
cisco_udp_specs["bootpc"] = 68;
cisco_udp_specs["bootps"] = 67;
cisco_udp_specs["discard"] = 9;
cisco_udp_specs["dnsix"] = 195;
cisco_udp_specs["domain"] = 53;
cisco_udp_specs["echo"] = 7;
cisco_udp_specs["isakmp"] = 500;
cisco_udp_specs["mobile-ip"] = 434;
cisco_udp_specs["nameserver"] = 42;
cisco_udp_specs["netbios-dgm"] = 138;
cisco_udp_specs["netbios-ns"] = 137;
cisco_udp_specs["netbios-ss"] = 139;
cisco_udp_specs["ntp"] = 123;
cisco_udp_specs["pim-auto-rp"] = 496;
cisco_udp_specs["rip"] = 520;
cisco_udp_specs["snmp"] = 161;
cisco_udp_specs["snmptrap"] = 162;
cisco_udp_specs["sunrpc"] = 111;
cisco_udp_specs["syslog"] = 514;
cisco_udp_specs["tacacs"] = 49;
cisco_udp_specs["talk"] = 517;
cisco_udp_specs["tftp"] = 69;
cisco_udp_specs["time"] = 37;
cisco_udp_specs["who"] = 513;
cisco_udp_specs["xdmcp"] = 177;
}
@ -239,18 +164,29 @@ FWObject* IOSImporter::createICMPService()
FWObject* IOSImporter::createIPService()
{
if (cisco_proto_specs.count(protocol)!=0)
int proto = GetProtoByName::getProtocolByName(protocol.c_str());
if (proto > -1)
{
std::ostringstream s;
s << cisco_proto_specs[protocol];
s << proto;
protocol = s.str();
}
return Importer::createIPService();
}
int IOSImporter::convertPort(const std::string &port_str,
std::map<std::string, int> &port_map)
const std::string &proto)
{
QString ps = QString(port_str.c_str()).trimmed();
int port = GetServByName::getPortByName(ps, proto.c_str());
if (port == -1)
{
markCurrentRuleBad(std::string("Port spec '") + port_str + "' unknown ");
port = 0;
}
return port;
/*
int port = 0;
std::string ps = strip(port_str);
if (port_map.count(ps)>0) port = port_map[ps];
@ -269,11 +205,12 @@ int IOSImporter::convertPort(const std::string &port_str,
}
}
return port;
*/
}
std::pair<int,int> IOSImporter::convertPortSpec(const std::string &port_op,
const std::string &port_spec,
std::map<std::string, int> &port_map)
const std::string &proto)
{
int range_start;
int range_end;
@ -297,8 +234,8 @@ std::pair<int,int> IOSImporter::convertPortSpec(const std::string &port_op,
s1 = portspec;
s2 = portspec;
}
range_start = convertPort(s1, port_map);
range_end = convertPort(s2, port_map);
range_start = convertPort(s1, proto);
range_end = convertPort(s2, proto);
if (portop=="lt") range_start = 0;
if (portop=="gt") range_end = 65535;
@ -326,11 +263,11 @@ FWObject* IOSImporter::createTCPService()
std::string name = "tcp " + src_port_spec + " " + dst_port_spec;
std::pair<int,int> pr =
convertPortSpec(src_port_op, src_port_spec, cisco_tcp_specs);
convertPortSpec(src_port_op, src_port_spec, "tcp");
int srs = pr.first;
int sre = pr.second;
pr = convertPortSpec(dst_port_op, dst_port_spec, cisco_tcp_specs);
pr = convertPortSpec(dst_port_op, dst_port_spec, "tcp");
int drs = pr.first;
int dre = pr.second;
@ -350,11 +287,11 @@ FWObject* IOSImporter::createUDPService()
std::string name = "udp " + src_port_spec + " " + dst_port_spec;
std::pair<int,int> pr =
convertPortSpec(src_port_op, src_port_spec, cisco_udp_specs);
convertPortSpec(src_port_op, src_port_spec, "udp");
int srs = pr.first;
int sre = pr.second;
pr = convertPortSpec(dst_port_op, dst_port_spec, cisco_udp_specs);
pr = convertPortSpec(dst_port_op, dst_port_spec, "udp");
int drs = pr.first;
int dre = pr.second;

View File

@ -42,9 +42,6 @@ class IOSImporter : public Importer
{
std::map<std::string, std::pair<int,int> > cisco_icmp_specs;
std::map<std::string, int> cisco_proto_specs;
std::map<std::string, int> cisco_tcp_specs;
std::map<std::string, int> cisco_udp_specs;
virtual libfwbuilder::FWObject* createAddress(const std::string &a,
const std::string &nm);
@ -53,12 +50,11 @@ class IOSImporter : public Importer
virtual libfwbuilder::FWObject* createTCPService();
virtual libfwbuilder::FWObject* createUDPService();
int convertPort(const std::string &port,
std::map<std::string, int> &port_map);
int convertPort(const std::string &port, const std::string &proto);
std::pair<int,int> convertPortSpec(const std::string &port_op,
const std::string &port_spec,
std::map<std::string, int> &port_map);
const std::string &proto);
public:

View File

@ -30,18 +30,20 @@
#include "IPTImporter.h"
#include "getProtoByName.h"
#include "getServByName.h"
#include <ios>
#include <iostream>
#include <algorithm>
#include <map>
#ifndef _WIN32
# include <netdb.h>
# include <netinet/in.h>
#else
# include <winsock2.h>
#endif
// #ifndef _WIN32
// # include <netdb.h>
// # include <netinet/in.h>
// #else
// # include <winsock2.h>
// #endif
#include "fwbuilder/FWObjectDatabase.h"
#include "fwbuilder/Resources.h"
@ -258,15 +260,25 @@ FWObject* IPTImporter::createICMPService()
FWObject* IPTImporter::createIPService()
{
struct protoent *pe = getprotobyname(protocol.c_str());
if (pe!=NULL)
int proto = GetProtoByName::getProtocolByName(protocol.c_str());
if (proto > -1)
{
std::ostringstream s;
s << pe->p_proto;
s << proto;
protocol = s.str();
//free(pe);
}
return Importer::createIPService();
// struct protoent *pe = getprotobyname(protocol.c_str());
// if (pe!=NULL)
// {
// std::ostringstream s;
// s << pe->p_proto;
// protocol = s.str();
// //free(pe);
// }
// return Importer::createIPService();
}
std::pair<int,int> IPTImporter::convertPortRange(str_tuple &range,
@ -280,11 +292,19 @@ int IPTImporter::convertPort(const std::string &port_spec,
const char *proto,
int default_port)
{
int port = 0;
std::string ps = strip(port_spec);
QString ps = QString(port_spec.c_str()).trimmed();
if (ps == "") return 0;
if (ps == ":") return default_port;
int port = GetServByName::getPortByName(ps, proto);
if (port == -1)
{
markCurrentRuleBad(std::string("Port spec '") + port_spec + "' unknown ");
port = 0;
}
return port;
/*
struct servent *se = getservbyname(ps.c_str(), proto);
if (se!=NULL)
{
@ -304,6 +324,7 @@ int IPTImporter::convertPort(const std::string &port_spec,
"' unknown. Error " + ex.what());
}
return port;
*/
}
FWObject* IPTImporter::createTCPUDPService(str_tuple &src_range,

View File

@ -0,0 +1,122 @@
/*
Firewall Builder
Copyright (C) 2011 NetCitadel, LLC
Author: Vadim Kurland vadim@fwbuilder.org
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "../../config.h"
#include "getProtoByName.h"
#ifndef _WIN32
# include <netdb.h>
# include <netinet/in.h>
#else
# include <winsock2.h>
#endif
QMap<QString, int> GetProtoByName::protocols;
int GetProtoByName::getProtocolByName(const QString &name)
{
if (protocols.size() == 0)
{
protocols["icmp"] = 1;
protocols["igmp"] = 2;
protocols["ggp"] = 3;
protocols["ipencap"] = 4;
protocols["st"] = 5;
protocols["tcp"] = 6;
protocols["egp"] = 8;
protocols["igp"] = 9;
protocols["pup"] = 12;
protocols["udp"] = 17;
protocols["hmp"] = 20;
protocols["xns-idp"] = 22;
protocols["rdp"] = 27;
protocols["iso-tp4"] = 29;
protocols["xtp"] = 36;
protocols["ddp"] = 37;
protocols["idpr-cmtp"] = 38;
protocols["ipv6"] = 41;
protocols["ipv6-route"] = 43;
protocols["ipv6-frag"]= 44;
protocols["idrp"] = 45;
protocols["rsvp"] = 46;
protocols["gre"] = 47;
protocols["esp"] = 50;
protocols["ah"] = 51;
protocols["skip"] = 57;
protocols["ipv6-icmp"] = 58;
protocols["ipv6-nonxt"] = 59;
protocols["ipv6-opts"] = 60;
protocols["rspf"] = 73;
protocols["vmtp"] = 81;
protocols["eigrp"] = 88;
protocols["ospf"] = 89;
protocols["ax.25"] = 93;
protocols["ipip"] = 94;
protocols["etherip"] = 97;
protocols["encap"] = 98;
protocols["pim"] = 103;
protocols["ipcomp"] = 108;
protocols["vrrp"] = 112;
protocols["l2tp"] = 115;
protocols["isis"] = 124;
protocols["sctp"] = 132;
protocols["fc"] = 133;
protocols["udplite"] = 136;
protocols["mpls-in-ip"] = 137;
protocols["manet"] = 138;
protocols["hip"] = 139;
// these are found in Cisco configs. Some of these names duplicate
// protocols listed above but a few are extras.
protocols["ah"] = 51;
protocols["ahp"] = 51;
protocols["eigrp"] = 88;
protocols["esp"] = 50;
protocols["gre"] = 47;
protocols["igmp"] = 2;
protocols["igrp"] = 9;
protocols["ip"] = 0;
protocols["ipinip"] = 4;
protocols["nos"] = 94;
protocols["ospf"] = 89;
protocols["pim"] = 103;
protocols["pcp"] = 108;
protocols["snp"] = 109;
}
bool ok = false;
int protocol = name.toInt(&ok);
if (ok) return protocol;
if (protocols.contains(name)) return protocols[name];
struct protoent *pe = getprotobyname(name.toAscii().constData());
if (pe!=NULL)
return pe->p_proto;
return -1;
}

View File

@ -0,0 +1,46 @@
/*
Firewall Builder
Copyright (C) 2011 NetCitadel, LLC
Author: Vadim Kurland vadim@fwbuilder.org
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifndef _GETPROTOBYNAME_H_
#define _GETPROTOBYNAME_H_
#include <QMap>
#include <QString>
/*
* Simple wrapper class for getprotobyname() function to make sure we
* get useful results even when this function does not work quite
* right. For example, protocol "gre" does not resolve on Windows but
* resolves to ip protocol 47 on Linux.
*/
class GetProtoByName
{
static QMap<QString, int> protocols;
public:
GetProtoByName() {};
static int getProtocolByName(const QString &name);
};
#endif

View File

@ -0,0 +1,635 @@
/*
Firewall Builder
Copyright (C) 2011 NetCitadel, LLC
Author: Vadim Kurland vadim@fwbuilder.org
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "../../config.h"
#include "getServByName.h"
#ifndef _WIN32
# include <netdb.h>
# include <netinet/in.h>
#else
# include <winsock2.h>
#endif
QMap<QString, QMap<QString,int> > GetServByName::ports;
int GetServByName::getPortByName(const QString &name, const QString &proto)
{
if (ports.size() == 0)
{
ports["tcp"]["tcpmux"] = 1;
ports["tcp"]["echo"] = 7;
ports["tcp"]["discard"] = 9;
ports["tcp"]["systat"] = 11;
ports["tcp"]["daytime"] = 13;
ports["tcp"]["netstat"] = 15;
ports["tcp"]["qotd"] = 17;
ports["tcp"]["msp"] = 18;
ports["tcp"]["chargen"] = 19;
ports["tcp"]["ftp-data"] = 20;
ports["tcp"]["ftp"] = 21;
ports["tcp"]["ssh"] = 22;
ports["tcp"]["telnet"] = 23;
ports["tcp"]["smtp"] = 25;
ports["tcp"]["time"] = 37;
ports["tcp"]["nameserver"] = 42;
ports["tcp"]["whois"] = 43;
ports["tcp"]["tacacs"] = 49;
ports["tcp"]["re-mail-ck"] = 50;
ports["tcp"]["domain"] = 53;
ports["tcp"]["mtp"] = 57;
ports["tcp"]["tacacs-ds"] = 65;
ports["tcp"]["bootps"] = 67;
ports["tcp"]["bootpc"] = 68;
ports["tcp"]["gopher"] = 70;
ports["tcp"]["rje"] = 77;
ports["tcp"]["finger"] = 79;
ports["tcp"]["www"] = 80;
ports["tcp"]["link"] = 87;
ports["tcp"]["kerberos"] = 88;
ports["tcp"]["supdup"] = 95;
ports["tcp"]["hostnames"] = 101;
ports["tcp"]["iso-tsap"] = 102;
ports["tcp"]["acr-nema"] = 104;
ports["tcp"]["csnet-ns"] = 105;
ports["tcp"]["rtelnet"] = 107;
ports["tcp"]["pop2"] = 109;
ports["tcp"]["pop3"] = 110;
ports["tcp"]["sunrpc"] = 111;
ports["tcp"]["auth"] = 113;
ports["tcp"]["sftp"] = 115;
ports["tcp"]["uucp-path"] = 117;
ports["tcp"]["nntp"] = 119;
ports["tcp"]["ntp"] = 123;
ports["tcp"]["pwdgen"] = 129;
ports["tcp"]["loc-srv"] = 135;
ports["tcp"]["netbios-ns"] = 137;
ports["tcp"]["netbios-dgm"] = 138;
ports["tcp"]["netbios-ssn"] = 139;
ports["tcp"]["imap2"] = 143;
ports["tcp"]["snmp"] = 161;
ports["tcp"]["snmp-trap"] = 162;
ports["tcp"]["cmip-man"] = 163;
ports["tcp"]["cmip-agent"] = 164;
ports["tcp"]["mailq"] = 174;
ports["tcp"]["xdmcp"] = 177;
ports["tcp"]["nextstep"] = 178;
ports["tcp"]["bgp"] = 179;
ports["tcp"]["prospero"] = 191;
ports["tcp"]["irc"] = 194;
ports["tcp"]["smux"] = 199;
ports["tcp"]["at-rtmp"] = 201;
ports["tcp"]["at-nbp"] = 202;
ports["tcp"]["at-echo"] = 204;
ports["tcp"]["at-zis"] = 206;
ports["tcp"]["qmtp"] = 209;
ports["tcp"]["z3950"] = 210;
ports["tcp"]["ipx"] = 213;
ports["tcp"]["imap3"] = 220;
ports["tcp"]["pawserv"] = 345;
ports["tcp"]["zserv"] = 346;
ports["tcp"]["fatserv"] = 347;
ports["tcp"]["rpc2portmap"] = 369;
ports["tcp"]["codaauth2"] = 370;
ports["tcp"]["clearcase"] = 371;
ports["tcp"]["ulistserv"] = 372;
ports["tcp"]["ldap"] = 389;
ports["tcp"]["imsp"] = 406;
ports["tcp"]["https"] = 443;
ports["tcp"]["snpp"] = 444;
ports["tcp"]["microsoft-ds"] = 445;
ports["tcp"]["kpasswd"] = 464;
ports["tcp"]["saft"] = 487;
ports["tcp"]["isakmp"] = 500;
ports["tcp"]["rtsp"] = 554;
ports["tcp"]["nqs"] = 607;
ports["tcp"]["npmp-local"] = 610;
ports["tcp"]["npmp-gui"] = 611;
ports["tcp"]["hmmp-ind"] = 612;
ports["tcp"]["qmqp"] = 628;
ports["tcp"]["ipp"] = 631;
ports["tcp"]["exec"] = 512;
ports["tcp"]["login"] = 513;
ports["tcp"]["shell"] = 514;
ports["tcp"]["printer"] = 515;
ports["tcp"]["tempo"] = 526;
ports["tcp"]["courier"] = 530;
ports["tcp"]["conference"] = 531;
ports["tcp"]["netnews"] = 532;
ports["tcp"]["gdomap"] = 538;
ports["tcp"]["uucp"] = 540;
ports["tcp"]["klogin"] = 543;
ports["tcp"]["kshell"] = 544;
ports["tcp"]["afpovertcp"] = 548;
ports["tcp"]["remotefs"] = 556;
ports["tcp"]["nntps"] = 563;
ports["tcp"]["submission"] = 587;
ports["tcp"]["ldaps"] = 636;
ports["tcp"]["tinc"] = 655;
ports["tcp"]["silc"] = 706;
ports["tcp"]["kerberos-adm"] = 749;
ports["tcp"]["webster"] = 765;
ports["tcp"]["rsync"] = 873;
ports["tcp"]["ftps-data"] = 989;
ports["tcp"]["ftps"] = 990;
ports["tcp"]["telnets"] = 992;
ports["tcp"]["imaps"] = 993;
ports["tcp"]["ircs"] = 994;
ports["tcp"]["pop3s"] = 995;
ports["tcp"]["socks"] = 1080;
ports["tcp"]["proofd"] = 1093;
ports["tcp"]["rootd"] = 1094;
ports["tcp"]["openvpn"] = 1194;
ports["tcp"]["rmiregistry"] = 1099;
ports["tcp"]["kazaa"] = 1214;
ports["tcp"]["nessus"] = 1241;
ports["tcp"]["lotusnote"] = 1352;
ports["tcp"]["ms-sql-s"] = 1433;
ports["tcp"]["ms-sql-m"] = 1434;
ports["tcp"]["ingreslock"] = 1524;
ports["tcp"]["prospero-np"] = 1525;
ports["tcp"]["datametrics"] = 1645;
ports["tcp"]["sa-msg-port"] = 1646;
ports["tcp"]["kermit"] = 1649;
ports["tcp"]["l2f"] = 1701;
ports["tcp"]["radius"] = 1812;
ports["tcp"]["radius-acct"] = 1813;
ports["tcp"]["msnp"] = 1863;
ports["tcp"]["unix-status"] = 1957;
ports["tcp"]["log-server"] = 1958;
ports["tcp"]["remoteping"] = 1959;
ports["tcp"]["cisco-sccp"] = 2000;
ports["tcp"]["search"] = 2010;
ports["tcp"]["pipe_server"] = 2010;
ports["tcp"]["nfs"] = 2049;
ports["tcp"]["gnunet"] = 2086;
ports["tcp"]["rtcm-sc104"] = 2101;
ports["tcp"]["cvspserver"] = 2401;
ports["tcp"]["venus"] = 2430;
ports["tcp"]["venus-se"] = 2431;
ports["tcp"]["codasrv"] = 2432;
ports["tcp"]["codasrv-se"] = 2433;
ports["tcp"]["mon"] = 2583;
ports["tcp"]["dict"] = 2628;
ports["tcp"]["gpsd"] = 2947;
ports["tcp"]["gds_db"] = 3050;
ports["tcp"]["icpv2"] = 3130;
ports["tcp"]["mysql"] = 3306;
ports["tcp"]["nut"] = 3493;
ports["tcp"]["distcc"] = 3632;
ports["tcp"]["daap"] = 3689;
ports["tcp"]["svn"] = 3690;
ports["tcp"]["suucp"] = 4031;
ports["tcp"]["sysrqd"] = 4094;
ports["tcp"]["remctl"] = 4373;
ports["tcp"]["iax"] = 4569;
ports["tcp"]["radmin-port"] = 4899;
ports["tcp"]["rfe"] = 5002;
ports["tcp"]["mmcc"] = 5050;
ports["tcp"]["sip"] = 5060;
ports["tcp"]["sip-tls"] = 5061;
ports["tcp"]["aol"] = 5190;
ports["tcp"]["xmpp-client"] = 5222;
ports["tcp"]["xmpp-server"] = 5269;
ports["tcp"]["cfengine"] = 5308;
ports["tcp"]["mdns"] = 5353;
ports["tcp"]["postgresql"] = 5432;
ports["tcp"]["freeciv"] = 5556;
ports["tcp"]["ggz"] = 5688;
ports["tcp"]["x11"] = 6000;
ports["tcp"]["x11-1"] = 6001;
ports["tcp"]["x11-2"] = 6002;
ports["tcp"]["x11-3"] = 6003;
ports["tcp"]["x11-4"] = 6004;
ports["tcp"]["x11-5"] = 6005;
ports["tcp"]["x11-6"] = 6006;
ports["tcp"]["x11-7"] = 6007;
ports["tcp"]["gnutella-svc"] = 6346;
ports["tcp"]["gnutella-rtr"] = 6347;
ports["tcp"]["sge_qmaster"] = 6444;
ports["tcp"]["sge_execd"] = 6445;
ports["tcp"]["afs3-fileserver"] = 7000;
ports["tcp"]["afs3-callback"] = 7001;
ports["tcp"]["afs3-prserver"] = 7002;
ports["tcp"]["afs3-vlserver"] = 7003;
ports["tcp"]["afs3-kaserver"] = 7004;
ports["tcp"]["afs3-volser"] = 7005;
ports["tcp"]["afs3-errors"] = 7006;
ports["tcp"]["afs3-bos"] = 7007;
ports["tcp"]["afs3-update"] = 7008;
ports["tcp"]["afs3-rmtsys"] = 7009;
ports["tcp"]["font-service"] = 7100;
ports["tcp"]["http-alt"] = 8080;
ports["tcp"]["bacula-dir"] = 9101;
ports["tcp"]["bacula-fd"] = 9102;
ports["tcp"]["bacula-sd"] = 9103;
ports["tcp"]["amanda"] = 10080;
ports["tcp"]["hkp"] = 11371;
ports["tcp"]["bprd"] = 13720;
ports["tcp"]["bpdbm"] = 13721;
ports["tcp"]["bpjava-msvc"] = 13722;
ports["tcp"]["vnetd"] = 13724;
ports["tcp"]["bpcd"] = 13782;
ports["tcp"]["vopied"] = 13783;
ports["tcp"]["wnn6"] = 22273;
ports["tcp"]["kerberos4"] = 750;
ports["tcp"]["kerberos_master"] = 751;
ports["tcp"]["krb_prop"] = 754;
ports["tcp"]["krbupdate"] = 760;
ports["tcp"]["swat"] = 901;
ports["tcp"]["kpop"] = 1109;
ports["tcp"]["knetd"] = 2053;
ports["tcp"]["eklogin"] = 2105;
ports["tcp"]["kx"] = 2111;
ports["tcp"]["iprop"] = 2121;
ports["tcp"]["supfilesrv"] = 871;
ports["tcp"]["supfiledbg"] = 1127;
ports["tcp"]["linuxconf"] = 98;
ports["tcp"]["poppassd"] = 106;
ports["tcp"]["ssmtp"] = 465;
ports["tcp"]["moira_db"] = 775;
ports["tcp"]["moira_update"] = 777;
ports["tcp"]["spamd"] = 783;
ports["tcp"]["omirr"] = 808;
ports["tcp"]["customs"] = 1001;
ports["tcp"]["skkserv"] = 1178;
ports["tcp"]["rmtcfg"] = 1236;
ports["tcp"]["wipld"] = 1300;
ports["tcp"]["xtel"] = 1313;
ports["tcp"]["xtelw"] = 1314;
ports["tcp"]["support"] = 1529;
ports["tcp"]["cfinger"] = 2003;
ports["tcp"]["frox"] = 2121;
ports["tcp"]["ninstall"] = 2150;
ports["tcp"]["zebrasrv"] = 2600;
ports["tcp"]["zebra"] = 2601;
ports["tcp"]["ripd"] = 2602;
ports["tcp"]["ripngd"] = 2603;
ports["tcp"]["ospfd"] = 2604;
ports["tcp"]["bgpd"] = 2605;
ports["tcp"]["ospf6d"] = 2606;
ports["tcp"]["ospfapi"] = 2607;
ports["tcp"]["isisd"] = 2608;
ports["tcp"]["afbackup"] = 2988;
ports["tcp"]["afmbackup"] = 2989;
ports["tcp"]["xtell"] = 4224;
ports["tcp"]["fax"] = 4557;
ports["tcp"]["hylafax"] = 4559;
ports["tcp"]["distmp3"] = 4600;
ports["tcp"]["munin"] = 4949;
ports["tcp"]["enbd-cstatd"] = 5051;
ports["tcp"]["enbd-sstatd"] = 5052;
ports["tcp"]["pcrd"] = 5151;
ports["tcp"]["noclog"] = 5354;
ports["tcp"]["hostmon"] = 5355;
ports["tcp"]["nsca"] = 5667;
ports["tcp"]["mrtd"] = 5674;
ports["tcp"]["bgpsim"] = 5675;
ports["tcp"]["canna"] = 5680;
ports["tcp"]["sane-port"] = 6566;
ports["tcp"]["ircd"] = 6667;
ports["tcp"]["zope-ftp"] = 8021;
ports["tcp"]["tproxy"] = 8081;
ports["tcp"]["omniorb"] = 8088;
ports["tcp"]["clc-build-daemon"] = 8990;
ports["tcp"]["xinetd"] = 9098;
ports["tcp"]["git"] = 9418;
ports["tcp"]["zope"] = 9673;
ports["tcp"]["webmin"] = 10000;
ports["tcp"]["kamanda"] = 10081;
ports["tcp"]["amandaidx"] = 10082;
ports["tcp"]["amidxtape"] = 10083;
ports["tcp"]["smsqp"] = 11201;
ports["tcp"]["xpilot"] = 15345;
ports["tcp"]["sgi-cad"] = 17004;
ports["tcp"]["isdnlog"] = 20011;
ports["tcp"]["vboxd"] = 20012;
ports["tcp"]["binkp"] = 24554;
ports["tcp"]["asp"] = 27374;
ports["tcp"]["csync2"] = 30865;
ports["tcp"]["dircproxy"] = 57000;
ports["tcp"]["tfido"] = 60177;
ports["tcp"]["fido"] = 60179;
ports["udp"]["echo"] = 7;
ports["udp"]["discard"] = 9;
ports["udp"]["daytime"] = 13;
ports["udp"]["msp"] = 18;
ports["udp"]["chargen"] = 19;
ports["udp"]["fsp"] = 21;
ports["udp"]["ssh"] = 22;
ports["udp"]["time"] = 37;
ports["udp"]["rlp"] = 39;
ports["udp"]["tacacs"] = 49;
ports["udp"]["re-mail-ck"] = 50;
ports["udp"]["domain"] = 53;
ports["udp"]["tacacs-ds"] = 65;
ports["udp"]["bootps"] = 67;
ports["udp"]["bootpc"] = 68;
ports["udp"]["tftp"] = 69;
ports["udp"]["gopher"] = 70;
ports["udp"]["www"] = 80;
ports["udp"]["kerberos"] = 88;
ports["udp"]["acr-nema"] = 104;
ports["udp"]["csnet-ns"] = 105;
ports["udp"]["rtelnet"] = 107;
ports["udp"]["pop2"] = 109;
ports["udp"]["pop3"] = 110;
ports["udp"]["sunrpc"] = 111;
ports["udp"]["ntp"] = 123;
ports["udp"]["pwdgen"] = 129;
ports["udp"]["loc-srv"] = 135;
ports["udp"]["netbios-ns"] = 137;
ports["udp"]["netbios-dgm"] = 138;
ports["udp"]["netbios-ssn"] = 139;
ports["udp"]["imap2"] = 143;
ports["udp"]["snmp"] = 161;
ports["udp"]["snmp-trap"] = 162;
ports["udp"]["cmip-man"] = 163;
ports["udp"]["cmip-agent"] = 164;
ports["udp"]["mailq"] = 174;
ports["udp"]["xdmcp"] = 177;
ports["udp"]["nextstep"] = 178;
ports["udp"]["bgp"] = 179;
ports["udp"]["prospero"] = 191;
ports["udp"]["irc"] = 194;
ports["udp"]["smux"] = 199;
ports["udp"]["at-rtmp"] = 201;
ports["udp"]["at-nbp"] = 202;
ports["udp"]["at-echo"] = 204;
ports["udp"]["at-zis"] = 206;
ports["udp"]["qmtp"] = 209;
ports["udp"]["z3950"] = 210;
ports["udp"]["ipx"] = 213;
ports["udp"]["imap3"] = 220;
ports["udp"]["pawserv"] = 345;
ports["udp"]["zserv"] = 346;
ports["udp"]["fatserv"] = 347;
ports["udp"]["rpc2portmap"] = 369;
ports["udp"]["codaauth2"] = 370;
ports["udp"]["clearcase"] = 371;
ports["udp"]["ulistserv"] = 372;
ports["udp"]["ldap"] = 389;
ports["udp"]["imsp"] = 406;
ports["udp"]["https"] = 443;
ports["udp"]["snpp"] = 444;
ports["udp"]["microsoft-ds"] = 445;
ports["udp"]["kpasswd"] = 464;
ports["udp"]["saft"] = 487;
ports["udp"]["isakmp"] = 500;
ports["udp"]["rtsp"] = 554;
ports["udp"]["nqs"] = 607;
ports["udp"]["npmp-local"] = 610;
ports["udp"]["npmp-gui"] = 611;
ports["udp"]["hmmp-ind"] = 612;
ports["udp"]["qmqp"] = 628;
ports["udp"]["ipp"] = 631;
ports["udp"]["biff"] = 512;
ports["udp"]["who"] = 513;
ports["udp"]["syslog"] = 514;
ports["udp"]["talk"] = 517;
ports["udp"]["ntalk"] = 518;
ports["udp"]["route"] = 520;
ports["udp"]["timed"] = 525;
ports["udp"]["netwall"] = 533;
ports["udp"]["gdomap"] = 538;
ports["udp"]["afpovertcp"] = 548;
ports["udp"]["nntps"] = 563;
ports["udp"]["submission"] = 587;
ports["udp"]["ldaps"] = 636;
ports["udp"]["tinc"] = 655;
ports["udp"]["silc"] = 706;
ports["udp"]["webster"] = 765;
ports["udp"]["rsync"] = 873;
ports["udp"]["telnets"] = 992;
ports["udp"]["imaps"] = 993;
ports["udp"]["ircs"] = 994;
ports["udp"]["pop3s"] = 995;
ports["udp"]["socks"] = 1080;
ports["udp"]["proofd"] = 1093;
ports["udp"]["rootd"] = 1094;
ports["udp"]["openvpn"] = 1194;
ports["udp"]["rmiregistry"] = 1099;
ports["udp"]["kazaa"] = 1214;
ports["udp"]["nessus"] = 1241;
ports["udp"]["lotusnote"] = 1352;
ports["udp"]["ms-sql-s"] = 1433;
ports["udp"]["ms-sql-m"] = 1434;
ports["udp"]["ingreslock"] = 1524;
ports["udp"]["prospero-np"] = 1525;
ports["udp"]["datametrics"] = 1645;
ports["udp"]["sa-msg-port"] = 1646;
ports["udp"]["kermit"] = 1649;
ports["udp"]["l2f"] = 1701;
ports["udp"]["radius"] = 1812;
ports["udp"]["radius-acct"] = 1813;
ports["udp"]["msnp"] = 1863;
ports["udp"]["cisco-sccp"] = 2000;
ports["udp"]["nfs"] = 2049;
ports["udp"]["gnunet"] = 2086;
ports["udp"]["rtcm-sc104"] = 2101;
ports["udp"]["cvspserver"] = 2401;
ports["udp"]["venus"] = 2430;
ports["udp"]["venus-se"] = 2431;
ports["udp"]["codasrv"] = 2432;
ports["udp"]["codasrv-se"] = 2433;
ports["udp"]["mon"] = 2583;
ports["udp"]["dict"] = 2628;
ports["udp"]["gpsd"] = 2947;
ports["udp"]["gds_db"] = 3050;
ports["udp"]["icpv2"] = 3130;
ports["udp"]["mysql"] = 3306;
ports["udp"]["nut"] = 3493;
ports["udp"]["distcc"] = 3632;
ports["udp"]["daap"] = 3689;
ports["udp"]["svn"] = 3690;
ports["udp"]["suucp"] = 4031;
ports["udp"]["sysrqd"] = 4094;
ports["udp"]["remctl"] = 4373;
ports["udp"]["iax"] = 4569;
ports["udp"]["radmin-port"] = 4899;
ports["udp"]["rfe"] = 5002;
ports["udp"]["mmcc"] = 5050;
ports["udp"]["sip"] = 5060;
ports["udp"]["sip-tls"] = 5061;
ports["udp"]["aol"] = 5190;
ports["udp"]["xmpp-client"] = 5222;
ports["udp"]["xmpp-server"] = 5269;
ports["udp"]["cfengine"] = 5308;
ports["udp"]["mdns"] = 5353;
ports["udp"]["postgresql"] = 5432;
ports["udp"]["freeciv"] = 5556;
ports["udp"]["ggz"] = 5688;
ports["udp"]["x11"] = 6000;
ports["udp"]["x11-1"] = 6001;
ports["udp"]["x11-2"] = 6002;
ports["udp"]["x11-3"] = 6003;
ports["udp"]["x11-4"] = 6004;
ports["udp"]["x11-5"] = 6005;
ports["udp"]["x11-6"] = 6006;
ports["udp"]["x11-7"] = 6007;
ports["udp"]["gnutella-svc"] = 6346;
ports["udp"]["gnutella-rtr"] = 6347;
ports["udp"]["sge_qmaster"] = 6444;
ports["udp"]["sge_execd"] = 6445;
ports["udp"]["afs3-fileserver"] = 7000;
ports["udp"]["afs3-callback"] = 7001;
ports["udp"]["afs3-prserver"] = 7002;
ports["udp"]["afs3-vlserver"] = 7003;
ports["udp"]["afs3-kaserver"] = 7004;
ports["udp"]["afs3-volser"] = 7005;
ports["udp"]["afs3-errors"] = 7006;
ports["udp"]["afs3-bos"] = 7007;
ports["udp"]["afs3-update"] = 7008;
ports["udp"]["afs3-rmtsys"] = 7009;
ports["udp"]["font-service"] = 7100;
ports["udp"]["http-alt"] = 8080;
ports["udp"]["bacula-dir"] = 9101;
ports["udp"]["bacula-fd"] = 9102;
ports["udp"]["bacula-sd"] = 9103;
ports["udp"]["amanda"] = 10080;
ports["udp"]["hkp"] = 11371;
ports["udp"]["bprd"] = 13720;
ports["udp"]["bpdbm"] = 13721;
ports["udp"]["bpjava-msvc"] = 13722;
ports["udp"]["vnetd"] = 13724;
ports["udp"]["bpcd"] = 13782;
ports["udp"]["vopied"] = 13783;
ports["udp"]["wnn6"] = 22273;
ports["udp"]["kerberos4"] = 750;
ports["udp"]["kerberos_master"] = 751;
ports["udp"]["passwd_server"] = 752;
ports["udp"]["zephyr-srv"] = 2102;
ports["udp"]["zephyr-clt"] = 2103;
ports["udp"]["zephyr-hm"] = 2104;
ports["udp"]["poppassd"] = 106;
ports["udp"]["moira_ureg"] = 779;
ports["udp"]["omirr"] = 808;
ports["udp"]["customs"] = 1001;
ports["udp"]["predict"] = 1210;
ports["udp"]["ninstall"] = 2150;
ports["udp"]["afbackup"] = 2988;
ports["udp"]["afmbackup"] = 2989;
ports["udp"]["noclog"] = 5354;
ports["udp"]["hostmon"] = 5355;
ports["udp"]["rplay"] = 5555;
ports["udp"]["omniorb"] = 8088;
ports["udp"]["mandelspawn"] = 9359;
ports["udp"]["kamanda"] = 10081;
ports["udp"]["smsqp"] = 11201;
ports["udp"]["xpilot"] = 15345;
ports["udp"]["sgi-cmsd"] = 17001;
ports["udp"]["sgi-crsd"] = 17002;
ports["udp"]["sgi-gcd"] = 17003;
ports["udp"]["isdnlog"] = 20011;
ports["udp"]["vboxd"] = 20012;
ports["udp"]["asp"] = 27374;
// these are found in Cisco configs. Some of these names duplicate
// protocols listed above but a few are extras.
ports["tcp"]["bgp"] = 179;
ports["tcp"]["chargen"] = 19;
ports["tcp"]["cmd"] = 514;
ports["tcp"]["daytime"] = 13;
ports["tcp"]["discard"] = 9;
ports["tcp"]["domain"] = 53;
ports["tcp"]["echo"] = 7;
ports["tcp"]["exec"] = 512;
ports["tcp"]["finger"] = 79;
ports["tcp"]["ftp"] = 21;
ports["tcp"]["ftp-data"] = 20;
ports["tcp"]["gopher"] = 70;
ports["tcp"]["hostname"] = 101;
ports["tcp"]["ident"] = 113;
ports["tcp"]["irc"] = 194;
ports["tcp"]["klogin"] = 543;
ports["tcp"]["kshell"] = 544;
ports["tcp"]["login"] = 513;
ports["tcp"]["lpd"] = 515;
ports["tcp"]["nntp"] = 119;
ports["tcp"]["pop2"] = 109;
ports["tcp"]["pop3"] = 110;
ports["tcp"]["smtp"] = 25;
ports["tcp"]["sunrpc"] = 111;
ports["tcp"]["syslog"] = 514;
ports["tcp"]["tacacs"] = 49;
ports["tcp"]["tacacs-ds"] = 63;
ports["tcp"]["talk"] = 517;
ports["tcp"]["telnet"] = 23;
ports["tcp"]["time"] = 37;
ports["tcp"]["uucp"] = 540;
ports["tcp"]["whois"] = 43;
ports["tcp"]["www"] = 80;
ports["udp"]["biff"] = 512;
ports["udp"]["bootpc"] = 68;
ports["udp"]["bootps"] = 67;
ports["udp"]["discard"] = 9;
ports["udp"]["dnsix"] = 195;
ports["udp"]["domain"] = 53;
ports["udp"]["echo"] = 7;
ports["udp"]["isakmp"] = 500;
ports["udp"]["mobile-ip"] = 434;
ports["udp"]["nameserver"] = 42;
ports["udp"]["netbios-dgm"] = 138;
ports["udp"]["netbios-ns"] = 137;
ports["udp"]["netbios-ss"] = 139;
ports["udp"]["ntp"] = 123;
ports["udp"]["pim-auto-rp"] = 496;
ports["udp"]["rip"] = 520;
ports["udp"]["snmp"] = 161;
ports["udp"]["snmptrap"] = 162;
ports["udp"]["sunrpc"] = 111;
ports["udp"]["syslog"] = 514;
ports["udp"]["tacacs"] = 49;
ports["udp"]["talk"] = 517;
ports["udp"]["tftp"] = 69;
ports["udp"]["time"] = 37;
ports["udp"]["who"] = 513;
ports["udp"]["xdmcp"] = 177;
}
bool ok = false;
int port = name.toInt(&ok);
if (ok) return port;
if (ports.contains(proto) && ports[proto].contains(name))
return ports[proto][name];
struct servent *se = getservbyname(name.toAscii().constData(),
proto.toAscii().constData());
if (se!=NULL)
{
int port = ntohs(se->s_port);
//free(se);
return port;
}
return -1;
}

View File

@ -0,0 +1,45 @@
/*
Firewall Builder
Copyright (C) 2011 NetCitadel, LLC
Author: Vadim Kurland vadim@fwbuilder.org
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifndef _GETSERVBYNAME_H_
#define _GETSERVBYNAME_H_
#include <QMap>
#include <QString>
/*
* Simple wrapper class for getservbyname() function to make sure we
* get useful results even when this function does not work quite
* right.
*/
class GetServByName
{
static QMap<QString, QMap<QString,int> > ports;
public:
GetServByName() {};
static int getPortByName(const QString &name, const QString &proto);
};
#endif

View File

@ -55,7 +55,7 @@ void IC_FirewallNamePage::initializePage()
qDebug() << "platform=" << platform;
if (platform == "pix" || platform == "fwsm" || platform == "ios_acl")
if (platform == "pix" || platform == "fwsm" || platform == "iosacl")
{
QRegExp cisco_re("^hostname\\s+(\\S+)");

View File

@ -30,6 +30,8 @@ HEADERS += ../../config.h \
TextEditWidget.h \
utils.h \
utils_no_qt.h \
getProtoByName.h \
getServByName.h \
Importer.h \
IOSImporter.h \
IPTImporter.h \
@ -241,6 +243,8 @@ SOURCES += ProjectPanel.cpp \
ssh_wrappers.cpp \
utils.cpp \
utils_no_qt.cpp \
getProtoByName.cpp \
getServByName.cpp \
Importer.cpp \
IOSImporter.cpp \
IOSImporterRun.cpp \

View File

@ -1,153 +0,0 @@
/*
Firewall Builder
Copyright (C) 2010 NetCitadel, LLC
Author: Roman Bovsunivskiy a2k0001@gmail.com
$Id: DiscoveryDruidTest.cpp 2786 2010-04-01 14:05:36Z a2k $
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "DiscoveryDruidTest.h"
#include "unistd.h"
#include <QApplication>
#include <QCoreApplication>
#include <QDebug>
#include <QDir>
#include <QFile>
#include <QFileInfo>
#include <QMenuBar>
#include <QTextBrowser>
#include "FWObjectClipboard.h"
#include "FWBApplication.h"
#include "DiscoveryDruid.h"
using namespace std;
using namespace QTest;
using namespace libfwbuilder;
void DiscoveryDruidTest::initTestCase()
{
mw = new FWWindow();
mw->show();
mw->startupLoad();
new FWObjectClipboard();
}
void DiscoveryDruidTest::cleanupTestCase()
{
if (QFileInfo("result.fwb").exists())
QVERIFY(QFile::remove("result.fwb"));
}
void DiscoveryDruidTest::compareFwbFiles(QString expected_result_file_name,
QString obtained_result_file_name)
{
QStringList obtained_result;
QFile rr(obtained_result_file_name);
rr.open(QFile::ReadOnly);
QString result_file = rr.readAll();
rr.close();
obtained_result = result_file.split("\n");
QFile er(expected_result_file_name);
er.open(QFile::ReadOnly);
result_file = er.readAll();
er.close();
QStringList expected_result = result_file.split("\n");
// find all lastModified attributes and replace them with identical values
// because they are always going to be different
Q_ASSERT_X(expected_result.size() == obtained_result.size(), "result comparison",
"Sizes of the generated .fwb and test files are different");
QRegExp last_mod_re("lastModified=\"\\d+\"");
QRegExp id_re("id=\"\\w+\"");
int max_idx = max(expected_result.size(), obtained_result.size());
for (int i=0; i < max_idx; ++i)
{
QString os = obtained_result[i];
obtained_result[i] = os.replace(last_mod_re, "lastModified=\"0000000000\"")
.remove(id_re);
QString es = expected_result[i];
expected_result[i] = es.replace(last_mod_re, "lastModified=\"0000000000\"")
.remove(id_re);
}
for (int i=0; i < max_idx; ++i)
{
QString err = QString("Line %1:\nExpected: '%2'\nResult: '%3'\n")
.arg(i).arg(expected_result[i]).arg(obtained_result[i]);
Q_ASSERT_X(expected_result[i] == obtained_result[i], "result comparison", err.toUtf8().constData());
}
}
void DiscoveryDruidTest::testHostsImportDialog()
{
DiscoveryDruid *dlg = dynamic_cast<DiscoveryDruid*>(app->activeModalWidget());
QVERIFY(dlg!=NULL);
QPushButton *next = dlg->findChild<QPushButton*>("nextButton");
QPushButton *finish = dlg->findChild<QPushButton*>("finishButton");
// Selecting "Read file in hosts format" radio button
QTest::mouseClick(dlg->findChild<QRadioButton*>("dm_fromfile"), Qt::LeftButton, 0, QPoint(5,5));
QTest::mouseClick(next, Qt::LeftButton);
dlg->findChild<QLineEdit*>("filename")->setText("test.hosts");
QTest::mouseClick(next, Qt::LeftButton);
// Waiting for parsing to wait. We are using small and simple hosts
// file, so it should not take more than 1 second
QTest::qWait(1000);
QVERIFY(next->isEnabled());
QTest::mouseClick(next, Qt::LeftButton);
QListWidget *unused = dlg->findChild<QListWidget*>("objectresultlist");
QVERIFY(unused->count() == 3);
unused->selectAll();
QTest::mouseClick(dlg->findChild<QPushButton*>("addObjButton"), Qt::LeftButton);
QVERIFY(dlg->findChild<QListWidget*>("objectlist")->count() == 3);
QTest::mouseClick(next, Qt::LeftButton);
QTest::mouseClick(next, Qt::LeftButton); // using default library ("User")
QVERIFY(finish->isEnabled()); // it should be enabled if everything is ok
QTest::mouseClick(finish, Qt::LeftButton);
// hosts should be imported to "User" database now and dialog is closed
}
void DiscoveryDruidTest::testHostsImport()
{
// Dialog is modal, so we have to test it in another thread
QTimer::singleShot(100, this, SLOT(testHostsImportDialog()));
mw->findChild<QAction*>("DiscoveryDruidAction")->trigger();
// this is running after import dialog is closed
mw->activeProject()->setFileName("result.fwb");
mw->activeProject()->db()->setPredictableIds();
mw->activeProject()->save();
compareFwbFiles("output.fwb", "result.fwb");
}

View File

@ -1,58 +0,0 @@
/*
Firewall Builder
Copyright (C) 2010 NetCitadel, LLC
Author: Roman Bovsunivskiy a2k0001@gmail.com
$Id: DiscoveryDruidTest.h 2786 2010-04-01 14:05:36Z a2k $
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#ifndef INSTDIALOGTEST_H
#define INSTDIALOGTEST_H
#include <QTest>
#include "FWBTree.h"
#include "FWWindow.h"
#include "ObjectManipulator.h"
#include "ObjectTreeView.h"
#include "ObjectTreeViewItem.h"
#include "events.h"
#include "fwbuilder/Firewall.h"
#include "fwbuilder/Library.h"
#include "fwbuilder/Policy.h"
#include "instDialog.h"
#include "newClusterDialog.h"
#include "upgradePredicate.h"
class DiscoveryDruidTest : public QObject
{
Q_OBJECT;
void compareFwbFiles(QString expected_result_file_name,
QString obtained_result_file_name);
private slots:
void initTestCase();
void cleanupTestCase();
void testHostsImport();
public slots:
void testHostsImportDialog();
};
#endif // INSTDIALOGTEST_H

View File

@ -1,11 +0,0 @@
include(../tests_common.pri)
QT += testlib network gui
TARGET = DiscoveryDruidTest
CONFIG += console
CONFIG -= app_bundle
TEMPLATE = app
SOURCES += main_DiscoveryDruidTest.cpp \
DiscoveryDruidTest.cpp
HEADERS += DiscoveryDruidTest.h

View File

@ -1,67 +0,0 @@
/*
Firewall Builder
Copyright (C) 2010 NetCitadel, LLC
Author: Roman Bovsunivskiy a2k0001@gmail.com
$Id: main_DiscoveryDruidTest.cpp 2707 2010-03-10 18:22:19Z a2k $
This program is free software which we release under the GNU General Public
License. You may redistribute and/or modify this program under the terms
of that license as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
To get a copy of the GNU General Public License, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "DiscoveryDruidTest.h"
#include <QTest>
#include <QFile>
#include "FWWindow.h"
#include "FWBSettings.h"
#include "FWBApplication.h"
#include "UserWorkflow.h"
using namespace std;
using namespace libfwbuilder;
int fwbdebug = 0;
FWWindow *mw = NULL;
FWBSettings *st = NULL;
FWBApplication *app = NULL;
UserWorkflow *wfl;
int sig = FWB_SIG;
extern void build_app(int argc, char** argv,
FWBApplication** app,
FWBSettings** st,
UserWorkflow** wfl);
int main(int argc, char** argv)
{
app = new FWBApplication(argc, argv);
app->setOrganizationName(QLatin1String("NetCitadel"));
app->setApplicationName(QLatin1String("Firewall Builder"));
build_app(argc, argv, &app, &st, &wfl);
QTest::qExec(new DiscoveryDruidTest());
if (QFile::exists("test_work.fwb"))
QFile::remove("test_work.fwb");
}

View File

@ -1,460 +0,0 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE FWObjectDatabase SYSTEM "fwbuilder.dtd">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="18" lastModified="1298421065" id="root">
<Library id="syslib000" color="#d4f8ff" name="Standard" comment="Standard objects" ro="True">
<AnyNetwork id="sysid0" name="Any" comment="Any Network" ro="False" address="0.0.0.0" netmask="0.0.0.0"/>
<AnyIPService id="sysid1" protocol_num="0" name="Any" comment="Any IP Service" ro="False"/>
<AnyInterval id="sysid2" days_of_week="0,1,2,3,4,5,6" from_day="-1" from_hour="-1" from_minute="-1" from_month="-1" from_weekday="-1" from_year="-1" to_day="-1" to_hour="-1" to_minute="-1" to_month="-1" to_weekday="-1" to_year="-1" name="Any" comment="Any Interval" ro="False"/>
<ObjectGroup id="stdid01" name="Objects" comment="" ro="False">
<ObjectGroup id="stdid16" name="Addresses" comment="" ro="False">
<IPv4 id="id2001X88798" name="all-hosts" comment="" ro="False" address="224.0.0.1" netmask="0.0.0.0"/>
<IPv4 id="id2002X88798" name="all-routers" comment="" ro="False" address="224.0.0.2" netmask="0.0.0.0"/>
<IPv4 id="id2003X88798" name="all DVMRP" comment="" ro="False" address="224.0.0.4" netmask="0.0.0.0"/>
<IPv4 id="id2117X88798" name="OSPF (all routers)" comment="RFC2328" ro="False" address="224.0.0.5" netmask="0.0.0.0"/>
<IPv4 id="id2128X88798" name="OSPF (designated routers)" comment="RFC2328" ro="False" address="224.0.0.6" netmask="0.0.0.0"/>
<IPv4 id="id2430X88798" name="RIP" comment="RFC1723" ro="False" address="224.0.0.9" netmask="0.0.0.0"/>
<IPv4 id="id2439X88798" name="EIGRP" comment="" ro="False" address="224.0.0.10" netmask="0.0.0.0"/>
<IPv4 id="id2446X88798" name="DHCP server, relay agent" comment="RFC 1884" ro="False" address="224.0.0.12" netmask="0.0.0.0"/>
<IPv4 id="id2455X88798" name="PIM" comment="" ro="False" address="224.0.0.13" netmask="0.0.0.0"/>
<IPv4 id="id2462X88798" name="RSVP" comment="" ro="False" address="224.0.0.14" netmask="0.0.0.0"/>
<IPv4 id="id2469X88798" name="VRRP" comment="RFC3768" ro="False" address="224.0.0.18" netmask="0.0.0.0"/>
<IPv4 id="id2777X88798" name="IGMP" comment="" ro="False" address="224.0.0.22" netmask="0.0.0.0"/>
<IPv4 id="id2784X88798" name="OSPFIGP-TE" comment="RFC4973" ro="False" address="224.0.0.24" netmask="0.0.0.0"/>
<IPv4 id="id3094X88798" name="HSRP" comment="" ro="False" address="224.0.0.102" netmask="0.0.0.0"/>
<IPv4 id="id3403X88798" name="mDNS" comment="" ro="False" address="224.0.0.251" netmask="0.0.0.0"/>
<IPv4 id="id3410X88798" name="LLMNR" comment="Link-Local Multicast Name Resolution, RFC4795" ro="False" address="224.0.0.252" netmask="0.0.0.0"/>
<IPv4 id="id3411X88798" name="Teredo" comment="" ro="False" address="224.0.0.253" netmask="0.0.0.0"/>
</ObjectGroup>
<ObjectGroup id="stdid17" name="DNS Names" comment="" ro="False"/>
<ObjectGroup id="stdid18" name="Address Tables" comment="" ro="False"/>
<ObjectGroup id="stdid04" name="Groups" comment="" ro="False">
<ObjectGroup id="id3DC75CE8" name="rfc1918-nets" comment="" ro="False">
<ObjectRef ref="id3DC75CE5"/>
<ObjectRef ref="id3DC75CE6"/>
<ObjectRef ref="id3DC75CE7"/>
</ObjectGroup>
<ObjectGroup id="id3292X75851" name="ipv6 private" comment="These are various ipv6 networks that should not be routed on the Internet&#10;" ro="False">
<ObjectRef ref="id2088X75851"/>
<ObjectRef ref="id2986X75851"/>
<ObjectRef ref="id2383X75851"/>
</ObjectGroup>
</ObjectGroup>
<ObjectGroup id="stdid02" name="Hosts" comment="" ro="False">
<Host id="id3D84EECE" name="internal server" comment="This host is used in examples and template objects" ro="False">
<Interface id="id3D84EED2" dedicated_failover="False" dyn="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
<IPv4 id="id3D84EED3" name="ip" comment="" ro="False" address="192.168.1.10" netmask="255.255.255.0"/>
<InterfaceOptions/>
</Interface>
<Management address="192.168.1.10">
<SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
<FWBDManagement enabled="False" identity="" port="-1"/>
<PolicyInstallScript arguments="" command="" enabled="False"/>
</Management>
<HostOptions>
<Option name="snmp_contact"></Option>
<Option name="snmp_description"></Option>
<Option name="snmp_location"></Option>
<Option name="use_mac_addr">false</Option>
<Option name="use_mac_addr_filter">False</Option>
</HostOptions>
</Host>
<Host id="id3D84EECF" name="server on dmz" comment="This host is used in examples and template objects" ro="False">
<Interface id="id3D84EEE3" dedicated_failover="False" dyn="False" security_level="0" unnum="False" unprotected="False" name="eth0" comment="" ro="False">
<IPv4 id="id3D84EEE4" name="ip" comment="" ro="False" address="192.168.2.10" netmask="255.255.255.0"/>
<InterfaceOptions/>
</Interface>
<Management address="192.168.2.10">
<SNMPManagement enabled="False" snmp_read_community="" snmp_write_community=""/>
<FWBDManagement enabled="False" identity="" port="-1"/>
<PolicyInstallScript arguments="" command="" enabled="False"/>
</Management>
<HostOptions>
<Option name="snmp_contact"></Option>
<Option name="snmp_description"></Option>
<Option name="snmp_location"></Option>
<Option name="use_mac_addr">false</Option>
<Option name="use_mac_addr_filter">False</Option>
</HostOptions>
</Host>
</ObjectGroup>
<ObjectGroup id="stdid03" name="Networks" comment="" ro="False">
<Network id="id3DC75CEC" name="all multicasts" comment="224.0.0.0/4 - This block, formerly known as the Class D address&#10;space, is allocated for use in IPv4 multicast address assignments.&#10;The IANA guidelines for assignments from this space are described in&#10;[RFC3171].&#10;" ro="False" address="224.0.0.0" netmask="240.0.0.0"/>
<Network id="id3F4ECE3E" name="link-local" comment="169.254.0.0/16 - This is the &quot;link local&quot; block. It is allocated for&#10;communication between hosts on a single link. Hosts obtain these&#10;addresses by auto-configuration, such as when a DHCP server may not&#10;be found.&#10;" ro="False" address="169.254.0.0" netmask="255.255.0.0"/>
<Network id="id3F4ECE3D" name="loopback-net" comment="127.0.0.0/8 - This block is assigned for use as the Internet host&#10;loopback address. A datagram sent by a higher level protocol to an&#10;address anywhere within this block should loop back inside the host.&#10;This is ordinarily implemented using only 127.0.0.1/32 for loopback,&#10;but no addresses within this block should ever appear on any network&#10;anywhere [RFC1700, page 5].&#10;" ro="False" address="127.0.0.0" netmask="255.0.0.0"/>
<Network id="id3DC75CE5" name="net-10.0.0.0" comment="10.0.0.0/8 - This block is set aside for use in private networks.&#10;Its intended use is documented in [RFC1918]. Addresses within this&#10;block should not appear on the public Internet." ro="False" address="10.0.0.0" netmask="255.0.0.0"/>
<Network id="id3DC75CE7" name="net-172.16.0.0" comment="172.16.0.0/12 - This block is set aside for use in private networks.&#10;Its intended use is documented in [RFC1918]. Addresses within this&#10;block should not appear on the public Internet.&#10;" ro="False" address="172.16.0.0" netmask="255.240.0.0"/>
<Network id="id3DC75CE6" name="net-192.168.0.0" comment="192.168.0.0/16 - This block is set aside for use in private networks.&#10;Its intended use is documented in [RFC1918]. Addresses within this&#10;block should not appear on the public Internet.&#10;" ro="False" address="192.168.0.0" netmask="255.255.0.0"/>
<Network id="id3F4ECE3F" name="test-net" comment="192.0.2.0/24 - This block is assigned as &quot;TEST-NET&quot; for use in&#10;documentation and example code. It is often used in conjunction with&#10;domain names example.com or example.net in vendor and protocol&#10;documentation. Addresses within this block should not appear on the&#10;public Internet.&#10;" ro="False" address="192.0.2.0" netmask="255.255.255.0"/>
<Network id="id3F4ECE40" name="this-net" comment="0.0.0.0/8 - Addresses in this block refer to source hosts on &quot;this&quot;&#10;network. Address 0.0.0.0/32 may be used as a source address for this&#10;host on this network; other addresses within 0.0.0.0/8 may be used to&#10;refer to specified hosts on this network [RFC1700, page 4]." ro="False" address="0.0.0.0" netmask="255.0.0.0"/>
<Network id="id3DC75CE7-1" name="net-192.168.1.0" comment="192.168.1.0/24 - Address often used for home and small office networks.&#10;" ro="False" address="192.168.1.0" netmask="255.255.255.0"/>
<Network id="id3DC75CE7-2" name="net-192.168.2.0" comment="192.168.2.0/24 - Address often used for home and small office networks.&#10;" ro="False" address="192.168.2.0" netmask="255.255.255.0"/>
<NetworkIPv6 id="id2088X75851" name="documentation net" comment="RFC3849" ro="False" address="2001:db8::" netmask="32"/>
<NetworkIPv6 id="id2383X75851" name="link-local ipv6" comment="RFC4291 Link-local unicast net" ro="False" address="fe80::" netmask="10"/>
<NetworkIPv6 id="id2685X75851" name="multicast ipv6" comment="RFC4291 ipv6 multicast addresses" ro="False" address="ff00::" netmask="8"/>
<NetworkIPv6 id="id2986X75851" name="experimental ipv6" comment="RFC2928, RFC4773 &#10;&#10;&quot;The block of Sub-TLA IDs assigned to the IANA&#10;(i.e., 2001:0000::/29 - 2001:01F8::/29) is for&#10;assignment for testing and experimental usage to&#10;support activities such as the 6bone, and&#10;for new approaches like exchanges.&quot; [RFC2928]&#10;&#10;" ro="False" address="2001::" netmask="23"/>
</ObjectGroup>
<ObjectGroup id="stdid15" name="Address Ranges" comment="" ro="False">
<AddressRange id="id3F6D115C" name="broadcast" comment="" ro="False" start_address="255.255.255.255" end_address="255.255.255.255"/>
<AddressRange id="id3F6D115D" name="old-broadcast" comment="" ro="False" start_address="0.0.0.0" end_address="0.0.0.0"/>
</ObjectGroup>
</ObjectGroup>
<ServiceGroup id="stdid05" name="Services" comment="" ro="False">
<CustomService id="stdid14_1" name="ESTABLISHED" comment="This service matches all packets which are part of network connections established through the firewall, or connections 'related' to those established through the firewall. Term 'established' refers to the state tracking mechanism which exists inside iptables and other stateful firewalls and does not mean any particular combination of packet header options. Packet is considered to correspond to the state 'ESTABLISHED' if it belongs to the network session, for which proper initiation has been seen by the firewall, so its stateful inspection module made appropriate record in the state table. Usually stateful firewalls keep track of network connections using not only tcp protocol, but also udp and sometimes even icmp protocols. 'RELATED' describes packet belonging to a separate network connection, related to the session firewall is keeping track of. One example is FTP command and FTP data sessions." ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="iosacl">established</CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw">established</CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m state --state ESTABLISHED,RELATED</CustomServiceCommand>
<CustomServiceCommand platform="procurve_acl">established</CustomServiceCommand>
</CustomService>
<CustomService id="stdid14_2" name="ESTABLISHED ipv6" comment="This service matches all packets which are part of network connections established through the firewall, or connections 'related' to those established through the firewall. Term 'established' refers to the state tracking mechanism which exists inside iptables and other stateful firewalls and does not mean any particular combination of packet header options. Packet is considered to correspond to the state 'ESTABLISHED' if it belongs to the network session, for which proper initiation has been seen by the firewall, so its stateful inspection module made appropriate record in the state table. Usually stateful firewalls keep track of network connections using not only tcp protocol, but also udp and sometimes even icmp protocols. 'RELATED' describes packet belonging to a separate network connection, related to the session firewall is keeping track of. One example is FTP command and FTP data sessions." ro="False" protocol="any" address_family="ipv6">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="iosacl">established</CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw">established</CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m state --state ESTABLISHED,RELATED</CustomServiceCommand>
<CustomServiceCommand platform="procurve_acl">established</CustomServiceCommand>
</CustomService>
<ServiceGroup id="stdid10" name="Groups" comment="" ro="False">
<ServiceGroup id="sg-DHCP" name="DHCP" comment="" ro="False">
<ServiceRef ref="udp-bootpc"/>
<ServiceRef ref="udp-bootps"/>
</ServiceGroup>
<ServiceGroup id="id3F530CC8" name="DNS" comment="" ro="False">
<ServiceRef ref="udp-DNS"/>
<ServiceRef ref="tcp-DNS"/>
</ServiceGroup>
<ServiceGroup id="id3CB1279B" name="IPSEC" comment="" ro="False">
<ServiceRef ref="id3CB12797"/>
<ServiceRef ref="ip-IPSEC"/>
</ServiceGroup>
<ServiceGroup id="sg-NETBIOS" name="NETBIOS" comment="" ro="False">
<ServiceRef ref="udp-netbios-dgm"/>
<ServiceRef ref="udp-netbios-ns"/>
<ServiceRef ref="id3E755609"/>
</ServiceGroup>
<ServiceGroup id="id3CB131CC" name="PCAnywhere" comment="" ro="False">
<ServiceRef ref="id3CB131CA"/>
<ServiceRef ref="id3CB131C8"/>
</ServiceGroup>
<ServiceGroup id="sg-Useful_ICMP" name="Useful_ICMP" comment="" ro="False">
<ServiceRef ref="icmp-Time_exceeded"/>
<ServiceRef ref="icmp-Time_exceeded_in_transit"/>
<ServiceRef ref="icmp-ping_reply"/>
<ServiceRef ref="icmp-Unreachables"/>
</ServiceGroup>
<ServiceGroup id="id1569X4889" name="Ipv6 unreachable messages" comment="" ro="False">
<ServiceRef ref="idE0D27650"/>
<ServiceRef ref="idCFE27650"/>
<ServiceRef ref="idE0B27650"/>
<ServiceRef ref="id1519Z388"/>
</ServiceGroup>
<ServiceGroup id="id3B4FEDD9" name="kerberos" comment="" ro="False">
<ServiceRef ref="id3B4FEDA5"/>
<ServiceRef ref="id3B4FEDA9"/>
<ServiceRef ref="id3B4FEDA7"/>
<ServiceRef ref="id3B4FEDAB"/>
<ServiceRef ref="id3B4FEDA3"/>
<ServiceRef ref="id3B4FEE21"/>
<ServiceRef ref="id3B4FEE23"/>
<ServiceRef ref="id3E7E3EA2"/>
</ServiceGroup>
<ServiceGroup id="id3B4FF35E" name="nfs" comment="" ro="False">
<ServiceRef ref="id3B4FEE7A"/>
<ServiceRef ref="id3B4FEE78"/>
</ServiceGroup>
<ServiceGroup id="id3B4FEFFA" name="quake" comment="" ro="False">
<ServiceRef ref="id3B4FEF7C"/>
<ServiceRef ref="id3B4FEF7E"/>
</ServiceGroup>
<ServiceGroup id="id3D703C9A" name="Real Player" comment="" ro="False">
<ServiceRef ref="id3D703C99"/>
<ServiceRef ref="id3D703C8B"/>
</ServiceGroup>
<ServiceGroup id="id3E7E3E95" name="WinNT" comment="" ro="False">
<ServiceRef ref="sg-NETBIOS"/>
<ServiceRef ref="id3DC8C8BB"/>
<ServiceRef ref="id3E7E3D58"/>
</ServiceGroup>
<ServiceGroup id="id3E7E3E9A" name="Win2000" comment="" ro="False">
<ServiceRef ref="id3E7E3E95"/>
<ServiceRef ref="udp-DNS"/>
<ServiceRef ref="id3DC8C8BC"/>
<ServiceRef ref="id3E7E3EA2"/>
<ServiceRef ref="id3AECF778"/>
<ServiceRef ref="id3D703C90"/>
<ServiceRef ref="id3E7E4039"/>
<ServiceRef ref="id3E7E403A"/>
<ServiceRef ref="id3B4FEDA5"/>
<ServiceRef ref="tcp-DNS"/>
</ServiceGroup>
<ServiceGroup id="id41291786" name="UPnP" comment="" ro="False">
<ServiceRef ref="id41291784"/>
<ServiceRef ref="id41291785"/>
<ServiceRef ref="id41291783"/>
<ServiceRef ref="id412Z18A9"/>
</ServiceGroup>
</ServiceGroup>
<ServiceGroup id="stdid07" name="ICMP" comment="" ro="False">
<ICMPService id="icmp-Unreachables" code="-1" type="3" name="all ICMP unreachables" comment="" ro="False"/>
<ICMPService id="id3C20EEB5" code="-1" type="-1" name="any ICMP" comment="" ro="False"/>
<ICMPService id="icmp-Host_unreach" code="1" type="3" name="host_unreach" comment="" ro="False"/>
<ICMPService id="icmp-ping_reply" code="0" type="0" name="ping reply" comment="" ro="False"/>
<ICMPService id="icmp-ping_request" code="0" type="8" name="ping request" comment="" ro="False"/>
<ICMPService id="icmp-Port_unreach" code="3" type="3" name="port unreach" comment="Port unreachable" ro="False"/>
<ICMPService id="icmp-Time_exceeded" code="0" type="11" name="time exceeded" comment="ICMP messages of this type are needed for traceroute" ro="False"/>
<ICMPService id="icmp-Time_exceeded_in_transit" code="1" type="11" name="time exceeded in transit" comment="" ro="False"/>
<ICMP6Service id="ipv6-icmp-ping_request" code="0" type="128" name="ipv6 ping request" comment="IPv6 ping request" ro="False"/>
<ICMP6Service id="ipv6-icmp-ping_reply" code="0" type="129" name="ipv6 ping reply" comment="IPv6 ping reply" ro="False"/>
<ICMP6Service id="ipv6-icmp-routersol" code="0" type="133" name="ipv6 routersol" comment="IPv6 router solicitation" ro="False"/>
<ICMP6Service id="ipv6-icmp-routeradv" code="0" type="134" name="ipv6 routeradv" comment="IPv6 router advertisement" ro="False"/>
<ICMP6Service id="ipv6-icmp-neighbrsol" code="0" type="135" name="ipv6 neighbrsol" comment="IPv6 neighbor solicitation" ro="False"/>
<ICMP6Service id="ipv6-icmp-neighbradv" code="0" type="136" name="ipv6 neighbradv" comment="IPv6 neighbor advertisement" ro="False"/>
<ICMP6Service id="ipv6-icmp-redir" code="0" type="137" name="ipv6 redir" comment="IPv6 redirect: shorter route exists" ro="False"/>
<ICMP6Service id="id1519Z388" code="-1" type="4" name="ipv6 parameter problem" comment="IPv6 Parameter Problem: RFC4443" ro="False"/>
<ICMP6Service id="idCFE27650" code="0" type="3" name="ipv6 time exceeded" comment="Time exceeded in transit" ro="False"/>
<ICMP6Service id="idCFF27650" code="1" type="3" name="ipv6 time exceeded in reassembly" comment="Time exceeded in reassembly" ro="False"/>
<ICMP6Service id="idE0B27650" code="-1" type="2" name="ipv6 packet too big" comment="" ro="False"/>
<ICMP6Service id="idE0D27650" code="-1" type="1" name="ipv6 all dest unreachable" comment="All icmpv6 codes for type &quot;destination unreachable&quot;&#10;" ro="False"/>
<ICMP6Service id="idCFE27660" code="-1" type="-1" name="ipv6 any ICMP6" comment="any ICMPv6" ro="False"/>
</ServiceGroup>
<ServiceGroup id="stdid06" name="IP" comment="" ro="False">
<IPService id="id3CB12797" fragm="False" lsrr="False" protocol_num="51" rr="False" short_fragm="False" ssrr="False" ts="False" name="AH" comment="IPSEC Authentication Header Protocol" ro="False"/>
<IPService id="ip-IPSEC" fragm="False" lsrr="False" protocol_num="50" rr="False" short_fragm="False" ssrr="False" ts="False" name="ESP" comment="IPSEC Encapsulating Security Payload Protocol" ro="False"/>
<IPService id="ip-RR" fragm="False" lsrr="False" protocol_num="0" rr="True" short_fragm="False" ssrr="False" ts="False" name="RR" comment="Route recording packets" ro="False"/>
<IPService id="ip-SRR" fragm="False" lsrr="True" protocol_num="0" rr="False" short_fragm="False" ssrr="True" ts="False" name="SRR" comment="All sorts of Source Routing Packets" ro="False"/>
<IPService id="ip-IP_Fragments" fragm="False" lsrr="False" protocol_num="0" rr="False" short_fragm="True" ssrr="False" ts="False" name="ip_fragments" comment="'Short' fragments" ro="False"/>
<IPService id="id3D703C8E" fragm="False" lsrr="False" protocol_num="57" rr="False" short_fragm="False" ssrr="False" ts="False" name="SKIP" comment="IPSEC Simple Key Management for Internet Protocols" ro="False"/>
<IPService id="id3D703C8F" fragm="False" lsrr="False" protocol_num="47" rr="False" short_fragm="False" ssrr="False" ts="False" name="GRE" comment="Generic Routing Encapsulation&#10;" ro="False"/>
<IPService id="id3D703C95" fragm="False" lsrr="False" protocol_num="112" rr="False" short_fragm="False" ssrr="False" ts="False" name="vrrp" comment="Virtual Router Redundancy Protocol" ro="False"/>
<IPService id="ip-IGMP" fragm="False" lsrr="False" protocol_num="2" rr="False" rtralt="True" rtralt_value="0" short_fragm="False" ssrr="False" ts="False" name="IGMP" comment="Internet Group Management Protocol, Version 3, RFC 3376" ro="False"/>
<IPService id="ip-PIM" fragm="False" lsrr="False" protocol_num="103" rr="False" rtralt="False" rtralt_value="0" short_fragm="False" ssrr="False" ts="False" name="PIM" comment="Protocol Independent Multicast - Dense Mode (PIM-DM), RFC 3973, or Protocol Independent Multicast-Sparse Mode (PIM-SM) RFC 2362" ro="False"/>
</ServiceGroup>
<ServiceGroup id="stdid09" name="TCP" comment="" ro="False">
<TCPService id="tcp-ALL_TCP_Masqueraded" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ALL TCP Masqueraded" comment="ipchains used to use this range of port numbers for masquerading. " ro="False" src_range_start="61000" src_range_end="65095" dst_range_start="0" dst_range_end="0"/>
<TCPService id="id3D703C94" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="AOL" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5190" dst_range_end="5190"/>
<TCPService id="tcp-All_TCP" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="All TCP" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<TCPService id="id3CB131C4" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="Citrix-ICA" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1494" dst_range_end="1494"/>
<TCPService id="id3D703C91" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="Entrust-Admin" comment="Entrust CA Administration Service" ro="False" src_range_start="0" src_range_end="0" dst_range_start="709" dst_range_end="709"/>
<TCPService id="id3D703C92" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="Entrust-KeyMgmt" comment="Entrust CA Key Management Service" ro="False" src_range_start="0" src_range_end="0" dst_range_start="710" dst_range_end="710"/>
<TCPService id="id3AEDBEAC" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="H323" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1720" dst_range_end="1720"/>
<TCPService id="id412Z18A9" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="icslap" comment="Sometimes this protocol is called icslap, but Microsoft does not call it that and just says that DSPP uses port 2869 in Windows XP SP2" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2869" dst_range_end="2869"/>
<TCPService id="id3E7E4039" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="LDAP GC" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3268" dst_range_end="3268"/>
<TCPService id="id3E7E403A" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="LDAP GC SSL" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3269" dst_range_end="3269"/>
<TCPService id="id3D703C83" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="OpenWindows" comment="Open Windows" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2000" dst_range_end="2000"/>
<TCPService id="id3CB131C8" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="PCAnywhere-data" comment="data channel for PCAnywhere v7.52 and later " ro="False" src_range_start="0" src_range_end="0" dst_range_start="5631" dst_range_end="5631"/>
<TCPService id="id3D703C8B" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="Real-Audio" comment="RealNetworks PNA Protocol" ro="False" src_range_start="0" src_range_end="0" dst_range_start="7070" dst_range_end="7070"/>
<TCPService id="id3D703C93" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="RealSecure" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2998" dst_range_end="2998"/>
<TCPService id="id3DC8C8BC" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="SMB" comment="SMB over TCP (without NETBIOS)&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="445" dst_range_end="445"/>
<TCPService id="id3D703C8D" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="TACACSplus" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="49" dst_range_end="49"/>
<TCPService id="id3D703C84" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="TCP high ports" comment="TCP high ports" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1024" dst_range_end="65535"/>
<TCPService id="id3E7E3D58" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="WINS replication" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="42" dst_range_end="42"/>
<TCPService id="id3D703C82" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="X11" comment="X Window System" ro="False" src_range_start="0" src_range_end="0" dst_range_start="6000" dst_range_end="6063"/>
<TCPService id="tcp-Auth" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="auth" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="113" dst_range_end="113"/>
<TCPService id="id3AEDBE6E" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="daytime" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="13" dst_range_end="13"/>
<TCPService id="tcp-DNS" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="domain" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="53" dst_range_end="53"/>
<TCPService id="id3B4FEDA3" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="eklogin" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2105" dst_range_end="2105"/>
<TCPService id="id3AECF774" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="finger" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="79" dst_range_end="79"/>
<TCPService id="tcp-FTP" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ftp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="21" dst_range_end="21"/>
<TCPService id="tcp-FTP_data" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ftp data" comment="FTP data channel.&#10; Note: FTP protocol does not really require server to use source port 20 for the data channel, &#10; but many ftp server implementations do so." ro="False" src_range_start="20" src_range_end="20" dst_range_start="1024" dst_range_end="65535"/>
<TCPService id="id3E7553BC" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ftp data passive" comment="FTP data channel for passive mode transfers&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="20" dst_range_end="20"/>
<TCPService id="tcp-HTTP" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="http" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="80" dst_range_end="80"/>
<TCPService id="id3B4FED69" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="https" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="443" dst_range_end="443"/>
<TCPService id="id3AECF776" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="imap" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="143" dst_range_end="143"/>
<TCPService id="id3B4FED9F" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="imaps" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="993" dst_range_end="993"/>
<TCPService id="id3B4FF13C" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="irc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="6667" dst_range_end="6667"/>
<TCPService id="id3E7E3EA2" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="kerberos" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="88" dst_range_end="88"/>
<TCPService id="id3B4FEE21" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="klogin" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="543" dst_range_end="543"/>
<TCPService id="id3B4FEE23" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ksh" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="544" dst_range_end="544"/>
<TCPService id="id3AECF778" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ldap" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="389" dst_range_end="389"/>
<TCPService id="id3D703C90" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ldaps" comment="Lightweight Directory Access Protocol over TLS/SSL" ro="False" src_range_start="0" src_range_end="0" dst_range_start="636" dst_range_end="636"/>
<TCPService id="id3B4FF000" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="linuxconf" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="98" dst_range_end="98"/>
<TCPService id="id3D703C97" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="lpr" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="515" dst_range_end="515"/>
<TCPService id="id3DC8C8BB" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="microsoft-rpc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="135" dst_range_end="135"/>
<TCPService id="id3D703C98" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ms-sql" comment="Microsoft SQL Server" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1433" dst_range_end="1433"/>
<TCPService id="id3B4FEEEE" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="mysql" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3306" dst_range_end="3306"/>
<TCPService id="id3E755609" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="netbios-ssn" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="139" dst_range_end="139"/>
<TCPService id="id3B4FEE7A" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="nfs" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2049" dst_range_end="2049"/>
<TCPService id="tcp-NNTP" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="nntp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="119" dst_range_end="119"/>
<TCPService id="id3E7553BB" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="nntps" comment="NNTP over SSL" ro="False" src_range_start="0" src_range_end="0" dst_range_start="563" dst_range_end="563"/>
<TCPService id="id3B4FEE1D" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="pop3" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="110" dst_range_end="110"/>
<TCPService id="id3E7553BA" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="pop3s" comment="POP-3 over SSL" ro="False" src_range_start="0" src_range_end="0" dst_range_start="995" dst_range_end="995"/>
<TCPService id="id3B4FF0EA" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="postgres" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5432" dst_range_end="5432"/>
<TCPService id="id3AECF782" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="printer" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="515" dst_range_end="515"/>
<TCPService id="id3B4FEF7C" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="quake" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="26000" dst_range_end="26000"/>
<TCPService id="id3AECF77A" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rexec" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="512" dst_range_end="512"/>
<TCPService id="id3AECF77C" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rlogin" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="513" dst_range_end="513"/>
<TCPService id="id3AECF77E" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rshell" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="514" dst_range_end="514"/>
<TCPService id="id3D703C99" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rtsp" comment="Real Time Streaming Protocol" ro="False" src_range_start="0" src_range_end="0" dst_range_start="554" dst_range_end="554"/>
<TCPService id="id3B4FEF34" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rwhois" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="4321" dst_range_end="4321"/>
<TCPService id="id3D703C89" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="securidprop" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5510" dst_range_end="5510"/>
<TCPService id="tcp-SMTP" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="smtp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="25" dst_range_end="25"/>
<TCPService id="id3B4FF04C" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="smtps" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="465" dst_range_end="465"/>
<TCPService id="id3B4FEE76" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="socks" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1080" dst_range_end="1080"/>
<TCPService id="id3D703C87" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="sqlnet1" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1521" dst_range_end="1521"/>
<TCPService id="id3B4FF09A" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="squid" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3128" dst_range_end="3128"/>
<TCPService id="tcp-SSH" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="ssh" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="22" dst_range_end="22"/>
<TCPService id="id3AEDBE00" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="sunrpc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="111" dst_range_end="111"/>
<TCPService id="tcp-TCP-SYN" ack_flag="False" ack_flag_mask="True" fin_flag="False" fin_flag_mask="True" psh_flag="False" psh_flag_mask="True" rst_flag="False" rst_flag_mask="True" syn_flag="True" syn_flag_mask="True" urg_flag="False" urg_flag_mask="True" name="tcp-syn" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<TCPService id="tcp-Telnet" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="telnet" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="23" dst_range_end="23"/>
<TCPService id="tcp-uucp" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="uucp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="540" dst_range_end="540"/>
<TCPService id="id3CB131C6" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="winterm" comment="Windows Terminal Services" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3389" dst_range_end="3389"/>
<TCPService id="id3B4FF1B8" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="xfs" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="7100" dst_range_end="7100"/>
<TCPService id="id3C685B2B" ack_flag="True" ack_flag_mask="True" fin_flag="True" fin_flag_mask="True" psh_flag="True" psh_flag_mask="True" rst_flag="True" rst_flag_mask="True" syn_flag="True" syn_flag_mask="True" urg_flag="True" urg_flag_mask="True" name="xmas scan - full" comment="This service object matches TCP packet with all six flags set." ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<TCPService id="id4127E949" ack_flag="False" ack_flag_mask="True" fin_flag="True" fin_flag_mask="True" psh_flag="True" psh_flag_mask="True" rst_flag="False" rst_flag_mask="True" syn_flag="False" syn_flag_mask="True" urg_flag="True" urg_flag_mask="True" name="xmas scan" comment="This service object matches TCP packet with flags FIN, PSH and URG set and other flags cleared. This is a &quot;christmas scan&quot; as defined in snort rules. Nmap can generate this scan, too." ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<TCPService id="id4127EA72" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rsync" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="873" dst_range_end="873"/>
<TCPService id="id4127EBAC" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="distcc" comment="distributed compiler" ro="False" src_range_start="0" src_range_end="0" dst_range_start="3632" dst_range_end="3632"/>
<TCPService id="id4127ECF1" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="cvspserver" comment="CVS client/server operations" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2401" dst_range_end="2401"/>
<TCPService id="id4127ECF2" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="cvsup" comment="CVSup file transfer/John Polstra/FreeBSD" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5999" dst_range_end="5999"/>
<TCPService id="id4127ED5E" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="afp" comment="AFP (Apple file sharing) over TCP" ro="False" src_range_start="0" src_range_end="0" dst_range_start="548" dst_range_end="548"/>
<TCPService id="id4127EDF6" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="whois" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="43" dst_range_end="43"/>
<TCPService id="id4127F04F" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="bgp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="179" dst_range_end="179"/>
<TCPService id="id4127F146" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="radius" comment="Radius protocol" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1812" dst_range_end="1812"/>
<TCPService id="id4127F147" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="radius acct" comment="Radius Accounting" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1813" dst_range_end="1813"/>
<TCPService id="id41291784" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="upnp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5000" dst_range_end="5000"/>
<TCPService id="id41291785" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="upnp-5431" comment="Although UPnP specification say it should use TCP port 5000, Linksys running Sveasoft firmware listens on port 5431" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5431" dst_range_end="5431"/>
<TCPService id="id41291787" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="vnc-java-0" comment="Java VNC viewer, display 0" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5800" dst_range_end="5800"/>
<TCPService id="id41291788" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="vnc-0" comment="Regular VNC viewer, display 0" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5900" dst_range_end="5900"/>
<TCPService id="id41291887" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="vnc-java-1" comment="Java VNC viewer, display 1" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5801" dst_range_end="5801"/>
<TCPService id="id41291888" ack_flag="False" ack_flag_mask="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="vnc-1" comment="Regular VNC viewer, display 1" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5901" dst_range_end="5901"/>
<TCPService id="id463FE5FE11008" ack_flag="False" ack_flag_mask="False" established="True" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="All TCP established" comment="Some firewall platforms can match TCP packets with flags ACK or RST set; the option is usually called &quot;established&quot;.&#10;&#10;Note that you can use this object only in the policy rules of the firewall that supports this option.&#10;&#10;If you need to match reply packets for a specific TCP service and wish to use option &quot;established&quot;, make a copy of this object and set source port range to match the service.&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<TCPService id="id1577X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="rtmp" comment="Real Time Messaging Protocol" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1935" dst_range_end="1935"/>
<TCPService id="id1590X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="xmpp-client" comment="Extensible Messaging and Presence Protocol (XMPP) RFC3920&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5222" dst_range_end="5222"/>
<TCPService id="id1609X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="xmpp-server" comment="Extensible Messaging and Presence Protocol (XMPP) RFC3920&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5269" dst_range_end="5269"/>
<TCPService id="id1622X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="xmpp-client-ssl" comment="Extensible Messaging and Presence Protocol (XMPP) RFC3920&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5223" dst_range_end="5223"/>
<TCPService id="id1631X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="xmpp-server-ssl" comment="Extensible Messaging and Presence Protocol (XMPP) RFC3920&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5270" dst_range_end="5270"/>
<TCPService id="id1644X28030" ack_flag="False" ack_flag_mask="False" established="False" fin_flag="False" fin_flag_mask="False" psh_flag="False" psh_flag_mask="False" rst_flag="False" rst_flag_mask="False" syn_flag="False" syn_flag_mask="False" urg_flag="False" urg_flag_mask="False" name="nrpe" comment="NRPE add-on for Nagios http://www.nagios.org/&#10;" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5666" dst_range_end="5666"/>
</ServiceGroup>
<ServiceGroup id="stdid08" name="UDP" comment="" ro="False">
<UDPService id="udp-ALL_UDP_Masqueraded" name="ALL UDP Masqueraded" comment="ipchains used to use this port range for masqueraded packets" ro="False" src_range_start="61000" src_range_end="65095" dst_range_start="0" dst_range_end="0"/>
<UDPService id="udp-All_UDP" name="All UDP" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="0" dst_range_end="0"/>
<UDPService id="id3D703C96" name="ICQ" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="4000" dst_range_end="4000"/>
<UDPService id="id3CB129D2" name="IKE" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="500" dst_range_end="500"/>
<UDPService id="id3CB131CA" name="PCAnywhere-status" comment="status channel for PCAnywhere v7.52 and later" ro="False" src_range_start="0" src_range_end="0" dst_range_start="5632" dst_range_end="5632"/>
<UDPService id="id3AED0D6B" name="RIP" comment="routing protocol RIP" ro="False" src_range_start="0" src_range_end="0" dst_range_start="520" dst_range_end="520"/>
<UDPService id="id3D703C8C" name="Radius" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1645" dst_range_end="1645"/>
<UDPService id="id3D703C85" name="UDP high ports" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1024" dst_range_end="65535"/>
<UDPService id="id3D703C86" name="Who" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="513" dst_range_end="513"/>
<UDPService id="id3B4FEDA1" name="afs" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="7000" dst_range_end="7009"/>
<UDPService id="udp-bootpc" name="bootpc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="68" dst_range_end="68"/>
<UDPService id="udp-bootps" name="bootps" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="67" dst_range_end="67"/>
<UDPService id="id3AEDBE70" name="daytime" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="13" dst_range_end="13"/>
<UDPService id="udp-DNS" name="domain" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="53" dst_range_end="53"/>
<UDPService id="id3D703C8A" name="interphone" comment="VocalTec Internet Phone" ro="False" src_range_start="0" src_range_end="0" dst_range_start="22555" dst_range_end="22555"/>
<UDPService id="id3B4FEDA5" name="kerberos" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="88" dst_range_end="88"/>
<UDPService id="id3B4FEDA9" name="kerberos-adm" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="749" dst_range_end="750"/>
<UDPService id="id3B4FEDA7" name="kpasswd" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="464" dst_range_end="464"/>
<UDPService id="id3B4FEDAB" name="krb524" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="4444" dst_range_end="4444"/>
<UDPService id="id3F865B0D" name="microsoft-rpc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="135" dst_range_end="135"/>
<UDPService id="udp-netbios-dgm" name="netbios-dgm" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="138" dst_range_end="138"/>
<UDPService id="udp-netbios-ns" name="netbios-ns" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="137" dst_range_end="137"/>
<UDPService id="udp-netbios-ssn" name="netbios-ssn" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="139" dst_range_end="139"/>
<UDPService id="id3B4FEE78" name="nfs" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="2049" dst_range_end="2049"/>
<UDPService id="udp-ntp" name="ntp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="123" dst_range_end="123"/>
<UDPService id="id3B4FEF7E" name="quake" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="26000" dst_range_end="26000"/>
<UDPService id="id3D703C88" name="secureid-udp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1024" dst_range_end="1024"/>
<UDPService id="udp-SNMP" name="snmp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="161" dst_range_end="161"/>
<UDPService id="id3AED0D69" name="snmp-trap" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="162" dst_range_end="162"/>
<UDPService id="id3AEDBE19" name="sunrpc" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="111" dst_range_end="111"/>
<UDPService id="id3AECF780" name="syslog" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="514" dst_range_end="514"/>
<UDPService id="id3AED0D67" name="tftp" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="69" dst_range_end="69"/>
<UDPService id="id3AED0D8C" name="traceroute" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="33434" dst_range_end="33524"/>
<UDPService id="id4127EA73" name="rsync" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="873" dst_range_end="873"/>
<UDPService id="id41291783" name="SSDP" comment="Simple Service Discovery Protocol (used for UPnP)" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1900" dst_range_end="1900"/>
<UDPService id="id41291883" name="OpenVPN" comment="" ro="False" src_range_start="0" src_range_end="0" dst_range_start="1194" dst_range_end="1194"/>
</ServiceGroup>
<ServiceGroup id="stdid13" name="Custom" comment="" ro="False">
<CustomService id="id3B64EEA8" name="rpc" comment="works in iptables and requires patch-o-matic.&#10;For more information look for patch-o-matic on http://www.netfilter.org/" ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="ipf"></CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw"></CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m record_rpc</CustomServiceCommand>
<CustomServiceCommand platform="pf"></CustomServiceCommand>
<CustomServiceCommand platform="pix"></CustomServiceCommand>
<CustomServiceCommand platform="unknown"></CustomServiceCommand>
</CustomService>
<CustomService id="id3B64EF4E" name="irc-conn" comment="IRC connection tracker, supports DCC.&#10;Works on iptables and requires patch-o-matic.&#10;For more information look for patch-o-matic on http://www.netfilter.org/&#10;" ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="ipf"></CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw"></CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m irc</CustomServiceCommand>
<CustomServiceCommand platform="pf"></CustomServiceCommand>
<CustomServiceCommand platform="pix"></CustomServiceCommand>
<CustomServiceCommand platform="unknown"></CustomServiceCommand>
</CustomService>
<CustomService id="id3B64EF50" name="psd" comment="Port scan detector, works only on iptables and requires patch-o-matic &#10;For more information look for patch-o-matic on http://www.netfilter.org/" ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="ipf"></CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw"></CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m psd --psd-weight-threshold 5 --psd-delay-threshold 10000</CustomServiceCommand>
<CustomServiceCommand platform="pf"></CustomServiceCommand>
<CustomServiceCommand platform="pix"></CustomServiceCommand>
<CustomServiceCommand platform="unknown"></CustomServiceCommand>
</CustomService>
<CustomService id="id3B64EF52" name="string" comment="Matches a string in a whole packet, works in iptables and requires patch-o-matic.&#10;For more information look for patch-o-matic on http://www.netfilter.org/" ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="ipf"></CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw"></CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m string --string test_pattern</CustomServiceCommand>
<CustomServiceCommand platform="pf"></CustomServiceCommand>
<CustomServiceCommand platform="pix"></CustomServiceCommand>
<CustomServiceCommand platform="unknown"></CustomServiceCommand>
</CustomService>
<CustomService id="id3B64EF54" name="talk" comment="Talk protocol support. Works in iptables and requires patch-o-matic.&#10;For more information look for patch-o-matic on http://www.netfilter.org/" ro="False" protocol="any" address_family="ipv4">
<CustomServiceCommand platform="Undefined"></CustomServiceCommand>
<CustomServiceCommand platform="ipf"></CustomServiceCommand>
<CustomServiceCommand platform="ipfilter"></CustomServiceCommand>
<CustomServiceCommand platform="ipfw"></CustomServiceCommand>
<CustomServiceCommand platform="iptables">-m talk</CustomServiceCommand>
<CustomServiceCommand platform="pf"></CustomServiceCommand>
<CustomServiceCommand platform="pix"></CustomServiceCommand>
<CustomServiceCommand platform="unknown"></CustomServiceCommand>
</CustomService>
</ServiceGroup>
<ServiceGroup id="stdid19" name="TagServices" comment="" ro="False"/>
<ServiceGroup id="stdid20" name="UserServices" comment="" ro="False"/>
</ServiceGroup>
<ObjectGroup id="stdid12" name="Firewalls" comment="" ro="False"/>
<ObjectGroup id="stdid21" name="Clusters" comment="" ro="False"/>
<IntervalGroup id="stdid11" name="Time" comment="" ro="False">
<Interval id="int-workhours" days_of_week="1,2,3,4,5" from_day="-1" from_hour="9" from_minute="0" from_month="-1" from_weekday="1" from_year="-1" to_day="-1" to_hour="17" to_minute="0" to_month="-1" to_weekday="5" to_year="-1" name="workhours" comment="any day, 9:00am through 5:00pm" ro="False"/>
<Interval id="int-weekends" days_of_week="6,0" from_day="-1" from_hour="0" from_minute="0" from_month="-1" from_weekday="6" from_year="-1" to_day="-1" to_hour="23" to_minute="59" to_month="-1" to_weekday="0" to_year="-1" name="weekends" comment="weekends: Saturday 0:00 through Sunday 23:59 " ro="False"/>
<Interval id="int-afterhours" days_of_week="0,1,2,3,4,5,6" from_day="-1" from_hour="18" from_minute="0" from_month="-1" from_weekday="-1" from_year="-1" to_day="-1" to_hour="23" to_minute="59" to_month="-1" to_weekday="-1" to_year="-1" name="afterhours" comment="any day 6:00pm - 12:00am" ro="False"/>
<Interval id="id3C63479C" days_of_week="6" from_day="-1" from_hour="0" from_minute="0" from_month="-1" from_weekday="6" from_year="-1" to_day="-1" to_hour="23" to_minute="59" to_month="-1" to_weekday="6" to_year="-1" name="Sat" comment="" ro="False"/>
<Interval id="id3C63479E" days_of_week="0" from_day="-1" from_hour="0" from_minute="0" from_month="-1" from_weekday="0" from_year="-1" to_day="-1" to_hour="23" to_minute="59" to_month="-1" to_weekday="0" to_year="-1" name="Sun" comment="" ro="False"/>
</IntervalGroup>
</Library>
<Library id="sysid99" name="Deleted Objects" comment="" ro="False"/>
<Library id="id0" color="#d2ffd0" name="User" comment="" ro="False">
<ObjectGroup id="id1" name="Objects" comment="" ro="False">
<ObjectGroup id="id2" name="Addresses" comment="" ro="False">
<IPv4 id="id3" name="host1" comment="" ro="False" address="192.168.1.1" netmask="255.255.255.255"/>
<IPv4 id="id4" name="host2" comment="" ro="False" address="192.168.1.2" netmask="255.255.255.255"/>
<IPv4 id="id5" name="host3" comment="" ro="False" address="192.168.1.3" netmask="255.255.255.255"/>
</ObjectGroup>
<ObjectGroup id="id6" name="DNS Names" comment="" ro="False"/>
<ObjectGroup id="id7" name="Address Tables" comment="" ro="False"/>
<ObjectGroup id="id8" name="Groups" comment="" ro="False"/>
<ObjectGroup id="id9" name="Hosts" comment="" ro="False"/>
<ObjectGroup id="id10" name="Networks" comment="" ro="False"/>
<ObjectGroup id="id11" name="Address Ranges" comment="" ro="False"/>
</ObjectGroup>
<ServiceGroup id="id12" name="Services" comment="" ro="False">
<ServiceGroup id="id13" name="Groups" comment="" ro="False"/>
<ServiceGroup id="id14" name="ICMP" comment="" ro="False"/>
<ServiceGroup id="id15" name="IP" comment="" ro="False"/>
<ServiceGroup id="id16" name="TCP" comment="" ro="False"/>
<ServiceGroup id="id17" name="UDP" comment="" ro="False"/>
<ServiceGroup id="id18" name="Users" comment="" ro="False"/>
<ServiceGroup id="id19" name="Custom" comment="" ro="False"/>
<ServiceGroup id="id20" name="TagServices" comment="" ro="False"/>
</ServiceGroup>
<ObjectGroup id="id21" name="Firewalls" comment="" ro="False"/>
<ObjectGroup id="id22" name="Clusters" comment="" ro="False"/>
<IntervalGroup id="id23" name="Time" comment="" ro="False"/>
</Library>
</FWObjectDatabase>

View File

@ -1,5 +0,0 @@
192.168.1.1 host1
192.168.1.2 host2
# comment
192.168.1.3 host3

View File

@ -1,6 +1,6 @@
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE FWObjectDatabase SYSTEM "fwbuilder.dtd">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="18" lastModified="1298422069" id="root">
<FWObjectDatabase xmlns="http://www.fwbuilder.org/1.0/" version="18" lastModified="1299444111" id="root">
<Library id="syslib000" color="#d4f8ff" name="Standard" comment="Standard objects" ro="True">
<AnyNetwork id="sysid0" name="Any" comment="Any Network" ro="False" address="0.0.0.0" netmask="0.0.0.0"/>
<AnyIPService id="sysid1" protocol_num="0" name="Any" comment="Any IP Service" ro="False"/>
@ -1664,7 +1664,7 @@
<Option name="stateless">True</Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id456" disabled="False" group="" log="False" position="25" action="Reject" direction="Both" comment="Unknown parameter of target REJECT: icmp-foo-prohibited. Chain INPUT. ">
<PolicyRule id="id456" disabled="False" group="" log="False" position="25" action="Reject" direction="Both" comment="Warning: Unknown parameter of target REJECT: icmp-foo-prohibited.&#10;Chain INPUT. ">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
@ -1686,7 +1686,7 @@
<Option name="stateless">True</Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id468" disabled="False" group="" log="False" position="26" action="Reject" direction="Both" comment="Unknown parameter of target REJECT: foo-prohib. Chain INPUT. ">
<PolicyRule id="id468" disabled="False" group="" log="False" position="26" action="Reject" direction="Both" comment="Warning: Unknown parameter of target REJECT: foo-prohib.&#10;Chain INPUT. ">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
@ -2501,7 +2501,7 @@
<Option name="stateless">False</Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id1285" disabled="False" group="" log="False" position="22" action="Accept" direction="Both" comment="Port spec 'foo' unknown. Error basic_ios::clear&#10;Port spec 'foo' unknown. Error basic_ios::clearChain user_chain. ">
<PolicyRule id="id1285" disabled="False" group="" log="False" position="22" action="Accept" direction="Both" comment="Port spec 'foo' unknown &#10;Port spec 'foo' unknown Chain user_chain. ">
<Src neg="False">
<ObjectRef ref="id24"/>
</Src>
@ -3724,7 +3724,7 @@
<RuleSetOptions/>
</Policy>
<Policy id="id1976" name="Mangle" comment="" ro="False" ipv4_rule_set="False" ipv6_rule_set="False" top_rule_set="True">
<PolicyRule id="id1978" disabled="False" group="" log="False" position="0" action="Accept" direction="Both" comment="Can not reproduce default action in table 'mangle' chain 'FORWARD'.">
<PolicyRule id="id1978" disabled="False" group="" log="False" position="0" action="Accept" direction="Both" comment="Warning: Can not reproduce default action in table 'mangle' chain 'FORWARD'.&#10;">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>
@ -3745,7 +3745,7 @@
<Option name="stateless">True</Option>
</PolicyRuleOptions>
</PolicyRule>
<PolicyRule id="id1990" disabled="False" group="" log="False" position="1" action="Accept" direction="Inbound" comment="Can not reproduce default action in table 'mangle' chain 'INPUT'.">
<PolicyRule id="id1990" disabled="False" group="" log="False" position="1" action="Accept" direction="Inbound" comment="Warning: Can not reproduce default action in table 'mangle' chain 'INPUT'.&#10;">
<Src neg="False">
<ObjectRef ref="sysid0"/>
</Src>

View File

@ -6,29 +6,29 @@ Ruleset: filter / OUTPUT
Default action: Accept
Ruleset: filter / user_chain
Default action: Deny
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Address object: h-21.21.21.21
TCP Service object: tcp 22-22:
Created branch OUTPUT_established_0
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
TCP Service object: tcp 23-23
Created branch OUTPUT_established_1
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Using automatic rule controlled by option 'Drop packet that do not match any known connection' to match state INVALID
Using automatic rule controlled by option 'Drop packet that do not match any known connection' to match state INVALID
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Using automatic rule controlled by option 'Drop packet that do not match any known connection' to match state INVALID
Warning: Using automatic rule controlled by option 'Drop packet that do not match any known connection' to match state INVALID
New interface: lo
UDP Service object: udp 1604-1604
Created branch Policy_eth1
New interface: eth1
New interface: eth0
Creating branch ruleset 'Policy_eth1' to match inbound and outbound interfaces -i eth0 -o eth1
Warning: Creating branch ruleset 'Policy_eth1' to match inbound and outbound interfaces -i eth0 -o eth1
TCP Service object: tcp 0-8000
UDP Service object: udp 0-8000
Unknown parameter of target REJECT: icmp-foo-prohibited.
Unknown parameter of target REJECT: foo-prohib.
Warning: Unknown parameter of target REJECT: icmp-foo-prohibited.
Warning: Unknown parameter of target REJECT: foo-prohib.
AddressRange object: range-10.212.66.2-10.212.66.3
AddressRange object: range-192.11.1.11-192.11.1.63
Address object: h-10.212.66.2
@ -39,7 +39,7 @@ ICMP Service object: icmp -1/-1
Address object: h-192.168.1.1
IP Service object: ip-47
Network object: net-1.1.0.0/16
Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Warning: Rule matches states 'RELATED,ESTABLISHED'. Consider using automatic rule controlled by the checkbox in the firewall settings dialog. Automatic rule matches in all standard chains which may be different from the original imported configuration. This requires manual checking.
Network object: net-192.168.19.0/24
TCP Service object: tcp 5432-5432
Address object: h-192.168.16.125
@ -66,10 +66,8 @@ TCP Service object: tcp fsrpau/f
TCP Service object: tcp sr/sr
TCP Service object: tcp fs/fs
TCP Service object: tcp fsrpau/N
Parser error:
Port spec 'foo' unknown. Error basic_ios::clear
Parser error:
Port spec 'foo' unknown. Error basic_ios::clear
Parser error: Port spec 'foo' unknown
Parser error: Port spec 'foo' unknown
TCP Service object: tcp
TCP Service object: tcp 427-427
UDP Service object: udp 427-427
@ -104,14 +102,12 @@ Tag Service object: tag-0x4
Created branch user_chain_47_mod_match
TCP Service object: tcp 53-53:
Created branch user_chain_48_mod_match
Parser error:
Original rule combines match of tcp/udp/icmp
Parser error: Original rule combines match of tcp/udp/icmp
protocols with two or more module matches, such as
module 'mark', 'recent' or 'length'. Use additional
branches to implement this complex match.
Created branch user_chain_49_mod_match
Parser error:
Original rule combines match of tcp/udp/icmp
Parser error: Original rule combines match of tcp/udp/icmp
protocols with two or more module matches, such as
module 'mark', 'recent' or 'length'. Use additional
branches to implement this complex match.
@ -130,9 +126,9 @@ Tag Service object: tag-16
TCP Service object: tcp 25-25
Tag Service object: tag-0xa
Tag Service object: tag-0xB
Skip command with '-j CONNMARK --restore-mark' This rule is generated automatically.
Warning: Skip command with '-j CONNMARK --restore-mark' This rule is generated automatically.
TCP Service object: tcp 25-25:
Turned option on in previous rule with action Mark for '-j CONNMARK --save-mark'
Warning: Turned option on in previous rule with action Mark for '-j CONNMARK --save-mark'
Tag Service object: tag-1
New interface: eth2
Tag Service object: tag-2
@ -144,28 +140,22 @@ Ruleset: nat / OUTPUT
Default action: Accept
Network object: net-192.168.1.0/24
Address object: h-222.222.222.222
Parser error:
Original rule defines outbound interface 'eth1'.
Parser error: Original rule defines outbound interface 'eth1'.
Replace address in TSrc with matching interface of the firewall.
Parser error:
Original rule defines outbound interface 'eth0'.
Parser error: Original rule defines outbound interface 'eth0'.
Replace address in TSrc with matching interface of the firewall.
Network object: net-192.168.1.32/27
Address object: h-222.222.222.100
Parser error:
Original rule defines outbound interface 'eth+'.
Parser error: Original rule defines outbound interface 'eth+'.
Replace address in TSrc with matching interface of the firewall.
Address object: h-192.168.1.20
Parser error:
Original rule defines outbound interface 'eth+'.
Parser error: Original rule defines outbound interface 'eth+'.
Replace address in TSrc with matching interface of the firewall.
Address object: h-192.168.1.10
Parser error:
Original rule defines outbound interface 'eth+'.
Parser error: Original rule defines outbound interface 'eth+'.
Replace address in TSrc with matching interface of the firewall.
TCP Service object: tcp 1000-1010:
Parser error:
Original rule defines outbound interface 'eth1'.
Parser error: Original rule defines outbound interface 'eth1'.
Replace address in TSrc with matching interface of the firewall.
Network object: net-222.222.222.0/24
TCP Service object: tcp 25-50
@ -183,19 +173,18 @@ TCP Service object: tcp 13-13
TCP Service object: tcp 2105-2105
Address object: h-192.168.3.145
Address object: h-1.1.1.1
Parser error:
Original rule defines inbound interface 'eth0'.
Parser error: Original rule defines inbound interface 'eth0'.
Replace address in ODst with matching interface of the firewall.
Network object: net-192.168.2.0/24
Address object: h-192.168.1.22
Address object: h-192.168.2.10
Address object: h-22.22.22.23
ICMP Service object: icmp 11/0
Added rule to reproduce default policy ACCEPT in filter/OUTPUT
Can not reproduce default action in table 'mangle' chain 'FORWARD'.
Added rule to reproduce default policy ACCEPT in mangle/FORWARD
Can not reproduce default action in table 'mangle' chain 'INPUT'.
Added rule to reproduce default policy ACCEPT in mangle/INPUT
Added rule to reproduce default policy ACCEPT in mangle/OUTPUT
Added rule to reproduce default policy ACCEPT in mangle/POSTROUTING
Added rule to reproduce default policy ACCEPT in mangle/PREROUTING
Warning: Added rule to reproduce default policy ACCEPT in filter/OUTPUT
Warning: Can not reproduce default action in table 'mangle' chain 'FORWARD'.
Warning: Added rule to reproduce default policy ACCEPT in mangle/FORWARD
Warning: Can not reproduce default action in table 'mangle' chain 'INPUT'.
Warning: Added rule to reproduce default policy ACCEPT in mangle/INPUT
Warning: Added rule to reproduce default policy ACCEPT in mangle/OUTPUT
Warning: Added rule to reproduce default policy ACCEPT in mangle/POSTROUTING
Warning: Added rule to reproduce default policy ACCEPT in mangle/PREROUTING