1 |
shindo 08/08/24 13:58:08 |
2 |
|
3 |
Modified: shb-firewalls.xml |
4 |
Log: |
5 |
sync to 1.7. Thanks to Masuda. |
6 |
|
7 |
Revision Changes Path |
8 |
1.6 xml/htdocs/doc/ja/security/shb-firewalls.xml |
9 |
|
10 |
file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml?rev=1.6&view=markup |
11 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml?rev=1.6&content-type=text/plain |
12 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml?r1=1.5&r2=1.6 |
13 |
|
14 |
Index: shb-firewalls.xml |
15 |
=================================================================== |
16 |
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml,v |
17 |
retrieving revision 1.5 |
18 |
retrieving revision 1.6 |
19 |
diff -u -r1.5 -r1.6 |
20 |
--- shb-firewalls.xml 9 May 2006 15:48:47 -0000 1.5 |
21 |
+++ shb-firewalls.xml 24 Aug 2008 13:58:07 -0000 1.6 |
22 |
@@ -1,5 +1,5 @@ |
23 |
<?xml version='1.0' encoding='UTF-8'?> |
24 |
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml,v 1.5 2006/05/09 15:48:47 idani Exp $ --> |
25 |
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/ja/security/shb-firewalls.xml,v 1.6 2008/08/24 13:58:07 shindo Exp $ --> |
26 |
<!DOCTYPE sections SYSTEM "/dtd/book.dtd"> |
27 |
|
28 |
<!-- The content of this document is licensed under the CC-BY-SA license --> |
29 |
@@ -7,9 +7,9 @@ |
30 |
|
31 |
<sections> |
32 |
|
33 |
-<version>1.1</version> |
34 |
-<date>2005-10-16</date> |
35 |
-<!-- Original revision: 1.3 --> |
36 |
+<version>1.4</version> |
37 |
+<date>2007-02-11</date> |
38 |
+<!-- Original revision: 1.7 --> |
39 |
|
40 |
<section> |
41 |
<title>ファイアーウォール</title> |
42 |
@@ -216,7 +216,7 @@ |
43 |
</body> |
44 |
</section> |
45 |
<section> |
46 |
-<title>iptables</title> |
47 |
+<title>Iptables</title> |
48 |
<body> |
49 |
|
50 |
<p> |
51 |
@@ -662,7 +662,7 @@ |
52 |
# 無効な状態をチェインに追加、適用 |
53 |
einfo "Applying chains to INPUT" |
54 |
$IPTABLES -A INPUT -m state --state INVALID -j DROP |
55 |
- $IPTABLES -A INPUT -j icmp_allowed |
56 |
+ $IPTABLES -A INPUT -p icmp -j icmp_allowed |
57 |
$IPTABLES -A INPUT -j check-flags |
58 |
$IPTABLES -A INPUT -i lo -j ACCEPT |
59 |
$IPTABLES -A INPUT -j allow-ssh-traffic-in |
60 |
@@ -670,7 +670,7 @@ |
61 |
|
62 |
einfo "Applying chains to FORWARD" |
63 |
$IPTABLES -A FORWARD -m state --state INVALID -j DROP |
64 |
- $IPTABLES -A FORWARD -j icmp_allowed |
65 |
+ $IPTABLES -A FORWARD -p icmp -j icmp_allowed |
66 |
$IPTABLES -A FORWARD -j check-flags |
67 |
$IPTABLES -A FORWARD -o lo -j ACCEPT |
68 |
$IPTABLES -A FORWARD -j allow-ssh-traffic-in |
69 |
@@ -679,7 +679,7 @@ |
70 |
|
71 |
einfo "Applying chains to OUTPUT" |
72 |
$IPTABLES -A OUTPUT -m state --state INVALID -j DROP |
73 |
- $IPTABLES -A OUTPUT -j icmp_allowed |
74 |
+ $IPTABLES -A OUTPUT -p icmp -j icmp_allowed |
75 |
$IPTABLES -A OUTPUT -j check-flags |
76 |
$IPTABLES -A OUTPUT -o lo -j ACCEPT |
77 |
$IPTABLES -A OUTPUT -j allow-ssh-traffic-out |
78 |
@@ -688,7 +688,7 @@ |
79 |
$IPTABLES -A OUTPUT -j allowed-connection |
80 |
|
81 |
#クライアントにNAT(アドレス変換)を介した通信を許可 |
82 |
- $IPTABLES -t nat -A POSTROUTING -o $IINTERFACE -j MASQUERADE |
83 |
+ $IPTABLES -t nat -A POSTROUTING -o $OINTERFACE -j MASQUERADE |
84 |
eend $? |
85 |
} |
86 |
|
87 |
@@ -998,7 +998,7 @@ |
88 |
</p> |
89 |
|
90 |
<note> |
91 |
-MozillaではEdit->Preferences->Advanced->Proxiesで設定を行います。 |
92 |
+Mozilla Firefoxでは 編集->設定->詳細->ネットワーク で設定を行います。 |
93 |
</note> |
94 |
|
95 |
<p> |