From: <bl...@us...> - 2003-10-21 14:00:45
|
Update of /cvsroot/devil-linux/build/config/etc/init.d In directory sc8-pr-cvs1:/tmp/cvs-serv28543/build/config/etc/init.d Modified Files: firewall.rules.2nic firewall.rules.3nic Log Message: fixed typos in firewall script commented-out code Index: firewall.rules.2nic =================================================================== RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.2nic,v retrieving revision 1.9 retrieving revision 1.10 diff -u -d -r1.9 -r1.10 --- firewall.rules.2nic 11 Oct 2003 21:00:42 -0000 1.9 +++ firewall.rules.2nic 21 Oct 2003 13:55:10 -0000 1.10 @@ -70,9 +70,9 @@ ${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE # Uncomment/modify the next 4 lines to forward a service to an internal IP. -# SERVER=192.168.1.1 # Internal IP of server. +# SERVER_IP=192.168.1.1 # Internal IP of server. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT # Block invalid connections from the internet. Index: firewall.rules.3nic =================================================================== RCS file: /cvsroot/devil-linux/build/config/etc/init.d/firewall.rules.3nic,v retrieving revision 1.6 retrieving revision 1.7 diff -u -d -r1.6 -r1.7 --- firewall.rules.3nic 11 Oct 2003 21:00:42 -0000 1.6 +++ firewall.rules.3nic 21 Oct 2003 13:55:10 -0000 1.7 @@ -71,20 +71,20 @@ ${IPTABLES} -t nat -A POSTROUTING -o ${OUT_DEV} -j MASQUERADE # Uncomment/modify the next 3 lines to allow access to one port on one IP on internal host from DMZ: -# SERVER=192.168.1.1 # Internal IP. +# SERVER_IP=192.168.1.1 # Internal IP. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. # ${IPTABLES} -A FORWARD -p TCP -i ${DMZ_DEV} -o ${INT_DEV} -d ${SERVER_IP} --dport ${PORT} -j ACCEPT # Uncomment/modify the next 4 lines to forward a service to an IP on the internal network. -# SERVER=192.168.1.1 # Internal IP of server. +# SERVER_IP=192.168.1.1 # Internal IP of server. # PORT=22 # 22 = SSH. Change to 80 for web server, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${INT_DEV} -j ACCEPT # Uncomment/modify the next 4 lines to forward a service to an IP on the DMZ network. -# SERVER=192.168.9.1 # Internal IP of server. +# SERVER_IP=192.168.9.1 # Internal IP of server. # PORT=80 # 80 = web server, 25 = SMTP, etc. -# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER}:${PORT} +# ${IPTABLES} -A PREROUTING -i ${OUT_DEV} -t nat -p TCP --dport $PORT -j DNAT --to ${SERVER_IP}:${PORT} # ${IPTABLES} -A FORWARD -p TCP -d ${SERVER_IP} --dport $PORT -i ${OUT_DEV} -o ${DMZ_DEV} -j ACCEPT # Block invalid connections from the internet. |