Update of /cvsroot/devil-linux/build/config/etc/init.d
In directory sc8-pr-cvs1:/tmp/cvs-serv28222/build/config/etc/init.d
Modified Files:
Tag: rel-1-0-patches
firewall.rules.2nic firewall.rules.3nic
Log Message:
fixed typos in firewall scripts commented-out code.
Index: firewall.rules.2nic
===================================================================
RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.2nic,v
retrieving revision 1.8.2.1
retrieving revision 1.8.2.2
diff -u -d -r1.8.2.1 -r1.8.2.2
--- firewall.rules.2nic 11 Oct 2003 21:02:02 -0000 1.8.2.1
+++ firewall.rules.2nic 21 Oct 2003 13:53:56 -0000 1.8.2.2
@@ -70,9 +70,9 @@
${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE
# Uncomment/modify the next 4 lines to forward a service to an internal IP.
-# SERVER=192.168.1.1 # Internal IP of server.
+# SERVER_IP=192.168.1.1 # Internal IP of server.
# PORT=22 # 22 = SSH. Change to 80 for web server, etc.
-# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT}
+# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT}
# ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT
# Block invalid connections from the internet.
Index: firewall.rules.3nic
===================================================================
RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.3nic,v
retrieving revision 1.5.2.1
retrieving revision 1.5.2.2
diff -u -d -r1.5.2.1 -r1.5.2.2
--- firewall.rules.3nic 11 Oct 2003 21:02:02 -0000 1.5.2.1
+++ firewall.rules.3nic 21 Oct 2003 13:53:56 -0000 1.5.2.2
@@ -71,20 +71,20 @@
${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE
# Uncomment/modify the next 3 lines to allow access to one port on one IP on internal host from DMZ:
-# SERVER=192.168.1.1 # Internal IP.
+# SERVER_IP=192.168.1.1 # Internal IP.
# PORT=22 # 22 = SSH. Change to 80 for web server, etc.
# ${IPTABLES} -A FORWARD -p TCP -i ${DMZ_DEV} -o ${INT_DEV} -d ${SERVER_IP} --dport ${PORT} -j ACCEPT
# Uncomment/modify the next 4 lines to forward a service to an IP on the internal network.
-# SERVER=192.168.1.1 # Internal IP of server.
+# SERVER_IP=192.168.1.1 # Internal IP of server.
# PORT=22 # 22 = SSH. Change to 80 for web server, etc.
-# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT}
+# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT}
# ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT
# Uncomment/modify the next 4 lines to forward a service to an IP on the DMZ network.
-# SERVER=192.168.9.1 # Internal IP of server.
+# SERVER_IP=192.168.9.1 # Internal IP of server.
# PORT=80 # 80 = web server, 25 = SMTP, etc.
-# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT}
+# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT}
# ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${DMZ_DEV} -j ACCEPT
# Block invalid connections from the internet.
|