mirror of
https://gitlab.com/shorewall/code.git
synced 2024-11-25 17:13:11 +01:00
Merge branch 'master' of ssh://gitlab.com/shorewall/code
This commit is contained in:
commit
5af7dce96b
@ -1165,7 +1165,12 @@
|
|||||||
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). The
|
url="/manpages/shorewall.conf.html">shorewall.conf</ulink>(5). The
|
||||||
<replaceable>address</replaceable> along with any
|
<replaceable>address</replaceable> along with any
|
||||||
<replaceable>option</replaceable>s are passed to the <command>ipset
|
<replaceable>option</replaceable>s are passed to the <command>ipset
|
||||||
add</command> command.</para>
|
add</command> command. Probably the most useful
|
||||||
|
<replaceable>option</replaceable> is the <option>timeout</option>
|
||||||
|
option. For example, to permanently blacklist 192.0.2.22, the
|
||||||
|
command would be:</para>
|
||||||
|
|
||||||
|
<programlisting> shorewall blacklist 192.0.2.22 timeout 0</programlisting>
|
||||||
|
|
||||||
<para>If the <option>disconnect</option> option is specified in the
|
<para>If the <option>disconnect</option> option is specified in the
|
||||||
DYNAMIC_BLACKLISTING setting, then the effective VERBOSITY
|
DYNAMIC_BLACKLISTING setting, then the effective VERBOSITY
|
||||||
|
@ -9133,7 +9133,7 @@ sub create_load_ipsets() {
|
|||||||
emit( ' #',
|
emit( ' #',
|
||||||
' # Update the dynamic blacklisting ipset timeout value',
|
' # Update the dynamic blacklisting ipset timeout value',
|
||||||
' #',
|
' #',
|
||||||
qq( awk '/create $set/ { sub( /timeout [0-9]+/, "timeout $globals{DBL_TIMEOUT}" ) }; {print};' \${VARDIR}/ipsets.save > \${VARDIR}/ipsets.temp),
|
qq( awk '/create $set/ { sub( /timeout [0-9]+/, "timeout 0" ) }; {print};' \${VARDIR}/ipsets.save > \${VARDIR}/ipsets.temp),
|
||||||
' zap_ipsets',
|
' zap_ipsets',
|
||||||
' $IPSET restore < ${VARDIR}/ipsets.temp',
|
' $IPSET restore < ${VARDIR}/ipsets.temp',
|
||||||
' fi' );
|
' fi' );
|
||||||
|
Loading…
Reference in New Issue
Block a user