forked from extern/shorewall_code
Compare commits
11 Commits
5.0.13-bas
...
4.6.4.2
Author | SHA1 | Date | |
---|---|---|---|
|
b5b0785440 | ||
|
299fd15984 | ||
|
a67debafb3 | ||
|
b528625329 | ||
|
49d1c64c00 | ||
|
f4e36a9ecf | ||
|
74c4980c91 | ||
|
56afdb6419 | ||
|
478e72451a | ||
|
54da615be0 | ||
|
2d948246c3 |
@@ -367,6 +367,17 @@ resolve_arptables() {
|
|||||||
esac
|
esac
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#
|
||||||
|
# Try to run the 'savesets' command
|
||||||
|
#
|
||||||
|
savesets() {
|
||||||
|
local supported
|
||||||
|
|
||||||
|
supported=$(run_it ${VARDIR}/firewall help | fgrep savesets )
|
||||||
|
|
||||||
|
[ -n "$supported" ] && run_it ${VARDIR}/firewall savesets ${g_restorepath}-ipsets
|
||||||
|
}
|
||||||
|
|
||||||
#
|
#
|
||||||
# Save currently running configuration
|
# Save currently running configuration
|
||||||
#
|
#
|
||||||
@@ -428,7 +439,7 @@ do_save() {
|
|||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
if ! run_it ${VARDIR}/firewall savesets ${g_restorepath}-ipsets; then
|
if ! savesets; then
|
||||||
case ${SAVE_IPSETS:=No} in
|
case ${SAVE_IPSETS:=No} in
|
||||||
[Yy]es)
|
[Yy]es)
|
||||||
case ${IPSET:=ipset} in
|
case ${IPSET:=ipset} in
|
||||||
|
@@ -336,7 +336,7 @@ if [ -n "$SYSTEMD" ]; then
|
|||||||
run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service
|
run_install $OWNERSHIP -m 644 $SERVICEFILE ${DESTDIR}${SYSTEMD}/$PRODUCT.service
|
||||||
[ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service
|
[ ${SBINDIR} != /sbin ] && eval sed -i \'s\|/sbin/\|${SBINDIR}/\|\' ${DESTDIR}${SYSTEMD}/$PRODUCT.service
|
||||||
echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service"
|
echo "Service file $SERVICEFILE installed as ${DESTDIR}${SYSTEMD}/$PRODUCT.service"
|
||||||
if [ -n "$DESTDIR" ]; then
|
if [ -n "$DESTDIR" -o $configure -eq 0 ]; then
|
||||||
mkdir -p ${DESTDIR}${SBINDIR}
|
mkdir -p ${DESTDIR}${SBINDIR}
|
||||||
chmod 755 ${DESTDIR}${SBINDIR}
|
chmod 755 ${DESTDIR}${SBINDIR}
|
||||||
fi
|
fi
|
||||||
|
@@ -5,8 +5,7 @@
|
|||||||
#
|
#
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Shorewall IPv4 firewall (bootup security)
|
Description=Shorewall IPv4 firewall (bootup security)
|
||||||
Before=network-pre.target
|
Before=network.target
|
||||||
Wants=network-pre.target
|
|
||||||
Conflicts=iptables.service firewalld.service
|
Conflicts=iptables.service firewalld.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
@@ -5,7 +5,7 @@
|
|||||||
#
|
#
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Shorewall IPv4 firewall (lite)
|
Description=Shorewall IPv4 firewall (lite)
|
||||||
After=network-online.target
|
After=network.target
|
||||||
Conflicts=iptables.service firewalld.service
|
Conflicts=iptables.service firewalld.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
@@ -11,4 +11,4 @@
|
|||||||
###############################################################################
|
###############################################################################
|
||||||
#ZONE INTERFACE OPTIONS
|
#ZONE INTERFACE OPTIONS
|
||||||
- lo ignore
|
- lo ignore
|
||||||
net all dhcp,physical=+,routeback,optional
|
net all dhcp,physical=+,routeback
|
||||||
|
@@ -60,6 +60,7 @@ loadmodule nf_nat_tftp
|
|||||||
#
|
#
|
||||||
# While not actually helpers, these are handy to have
|
# While not actually helpers, these are handy to have
|
||||||
#
|
#
|
||||||
|
loadmodule ipt_LOG
|
||||||
loadmodule xt_NFLOG
|
loadmodule xt_NFLOG
|
||||||
loadmodule xt_ULOG
|
loadmodule ipt_ULOG
|
||||||
loadmodule nfnetlink_log
|
loadmodule nfnetlink_log
|
||||||
|
@@ -5,7 +5,7 @@
|
|||||||
#
|
#
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Shorewall IPv4 firewall
|
Description=Shorewall IPv4 firewall
|
||||||
After=network-online.target
|
After=network.target
|
||||||
Conflicts=iptables.service firewalld.service
|
Conflicts=iptables.service firewalld.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
@@ -5,7 +5,7 @@
|
|||||||
#
|
#
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Shorewall IPv6 firewall (lite)
|
Description=Shorewall IPv6 firewall (lite)
|
||||||
After=network-online.target
|
After=network.target
|
||||||
Conflicts=ip6tables.service firewalld.service
|
Conflicts=ip6tables.service firewalld.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
@@ -25,6 +25,7 @@ AutoBLL noinline # Helper for AutoBL
|
|||||||
Broadcast noinline # Handles Broadcast/Multicast/Anycast
|
Broadcast noinline # Handles Broadcast/Multicast/Anycast
|
||||||
Drop # Default Action for DROP policy
|
Drop # Default Action for DROP policy
|
||||||
dropInvalid inline # Drops packets in the INVALID conntrack state
|
dropInvalid inline # Drops packets in the INVALID conntrack state
|
||||||
|
DropSmurfs noinline # Handles packets with a broadcast source address
|
||||||
Established inline # Handles packets in the ESTABLISHED state
|
Established inline # Handles packets in the ESTABLISHED state
|
||||||
IfEvent noinline # Perform an action based on an event
|
IfEvent noinline # Perform an action based on an event
|
||||||
Invalid inline # Handles packets in the INVALID conntrack state
|
Invalid inline # Handles packets in the INVALID conntrack state
|
||||||
|
@@ -37,5 +37,6 @@ loadmodule nf_conntrack_sane
|
|||||||
#
|
#
|
||||||
# While not actually helpers, these are handy to have
|
# While not actually helpers, these are handy to have
|
||||||
#
|
#
|
||||||
|
loadmodule ip6t_LOG
|
||||||
loadmodule xt_NFLOG
|
loadmodule xt_NFLOG
|
||||||
loadmodule nfnetlink_log
|
loadmodule nfnetlink_log
|
||||||
|
@@ -5,7 +5,7 @@
|
|||||||
#
|
#
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Shorewall IPv6 firewall
|
Description=Shorewall IPv6 firewall
|
||||||
After=network-online.target
|
After=network.target
|
||||||
Conflicts=ip6tables.service firewalld.service
|
Conflicts=ip6tables.service firewalld.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
|
Reference in New Issue
Block a user