Private GIT

Skip to content
Snippets Groups Projects
Select Git revision
  • bc0c8319809bf09ba5f0c706427285cb93552197
  • master default protected
  • development
  • MonTest
  • gh-pages
  • ThePirateBay
  • Pistachitos
  • custom_naming
  • dataTables
  • libdirs
  • nzbs_org_transition
  • api
  • timezones
  • adel-0002
  • adel-0001
  • build-497
  • build-496
  • build-495
  • build-494
  • build-493
  • build-492
  • build-491
  • build-490
  • build-489
  • build-488
  • build-487
  • build-486
  • build-485
  • build-484
  • build-483
  • build-482
  • build-481
  • build-480
33 results

readme.md

Blame
  • config-new.boot 8.90 KiB
    firewall {
        all-ping enable
        broadcast-ping disable
        ipv6-receive-redirects disable
        ipv6-src-route disable
        ip-src-route disable
        log-martians enable
        name WAN_IN {
            default-action drop
            description "WAN to internal"
            enable-default-log
            rule 10 {
                action accept
                description "Allow established/related"
                log disable
                protocol all
                state {
                    established enable
                    invalid disable
                    new disable
                    related enable
                }
            }
            rule 20 {
                action drop
                description "Drop invalid state"
                log disable
                protocol all
                state {
                    established disable
                    invalid enable
                    new disable
                    related disable
                }
            }
        }
        name WAN_LOCAL {
            default-action drop
            description "WAN to router"
            rule 1 {
                action accept
                description "Allow established/related"
                state {
                    established enable
                    related enable
                }
            }
            rule 2 {
                action accept
                description "Allow Ping"
                destination {
                    group {
                        address-group ADDRv4_eth7
                    }
                }
                log enable
                protocol icmp
            }
            rule 3 {
                action drop
                description "Drop invalid state"
                log disable
                state {
                    invalid enable
                }
            }
        }
        options {
        }
        receive-redirects disable