From: <bl...@us...> - 2003-10-21 13:57:42
|
Update of /cvsroot/devil-linux/build/config/etc/init.d In directory sc8-pr-cvs1:/tmp/cvs-serv28222/build/config/etc/init.d Modified Files: Tag: rel-1-0-patches firewall.rules.2nic firewall.rules.3nic Log Message: fixed typos in firewall scripts commented-out code. Index: firewall.rules.2nic =================================================================== RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.2nic,v retrieving revision 1.8.2.1 retrieving revision 1.8.2.2 diff -u -d -r1.8.2.1 -r1.8.2.2 --- firewall.rules.2nic 11 Oct 2003 21:02:02 -0000 1.8.2.1 +++ firewall.rules.2nic 21 Oct 2003 13:53:56 -0000 1.8.2.2 @@ -70,9 +70,9 @@ ${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE # Uncomment/modify the next 4 lines to forward a service to an internal IP. -# SERVER=192.168.1.1 # Internal IP of server. +# SERVER_IP=192.168.1.1 # Internal IP of server. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT # Block invalid connections from the internet. Index: firewall.rules.3nic =================================================================== RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.3nic,v retrieving revision 1.5.2.1 retrieving revision 1.5.2.2 diff -u -d -r1.5.2.1 -r1.5.2.2 --- firewall.rules.3nic 11 Oct 2003 21:02:02 -0000 1.5.2.1 +++ firewall.rules.3nic 21 Oct 2003 13:53:56 -0000 1.5.2.2 @@ -71,20 +71,20 @@ ${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE # Uncomment/modify the next 3 lines to allow access to one port on one IP on internal host from DMZ: -# SERVER=192.168.1.1 # Internal IP. +# SERVER_IP=192.168.1.1 # Internal IP. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. # ${IPTABLES} -A FORWARD -p TCP -i ${DMZ_DEV} -o ${INT_DEV} -d ${SERVER_IP} --dport ${PORT} -j ACCEPT # Uncomment/modify the next 4 lines to forward a service to an IP on the internal network. -# SERVER=192.168.1.1 # Internal IP of server. +# SERVER_IP=192.168.1.1 # Internal IP of server. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT # Uncomment/modify the next 4 lines to forward a service to an IP on the DMZ network. -# SERVER=192.168.9.1 # Internal IP of server. +# SERVER_IP=192.168.9.1 # Internal IP of server. # PORT=80 # 80 = web server, 25 = SMTP, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${DMZ_DEV} -j ACCEPT # Block invalid connections from the internet. |