1 |
nightmorph 06/11/01 07:06:55 |
2 |
|
3 |
Modified: shb-firewalls.xml |
4 |
Log: |
5 |
slightly tweaked icmp section of firewall script example per bug 148015 |
6 |
|
7 |
Revision Changes Path |
8 |
1.5 xml/htdocs/doc/en/security/shb-firewalls.xml |
9 |
|
10 |
file : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?rev=1.5&view=markup |
11 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?rev=1.5&content-type=text/plain |
12 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml?r1=1.4&r2=1.5 |
13 |
|
14 |
Index: shb-firewalls.xml |
15 |
=================================================================== |
16 |
RCS file: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v |
17 |
retrieving revision 1.4 |
18 |
retrieving revision 1.5 |
19 |
diff -u -r1.4 -r1.5 |
20 |
--- shb-firewalls.xml 18 Sep 2006 09:22:48 -0000 1.4 |
21 |
+++ shb-firewalls.xml 1 Nov 2006 07:06:54 -0000 1.5 |
22 |
@@ -1,5 +1,5 @@ |
23 |
<?xml version='1.0' encoding='UTF-8'?> |
24 |
-<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v 1.4 2006/09/18 09:22:48 neysx Exp $ --> |
25 |
+<!-- $Header: /var/cvsroot/gentoo/xml/htdocs/doc/en/security/shb-firewalls.xml,v 1.5 2006/11/01 07:06:54 nightmorph Exp $ --> |
26 |
<!DOCTYPE sections SYSTEM "/dtd/book.dtd"> |
27 |
|
28 |
<!-- The content of this document is licensed under the CC-BY-SA license --> |
29 |
@@ -7,8 +7,8 @@ |
30 |
|
31 |
<sections> |
32 |
|
33 |
-<version>1.1</version> |
34 |
-<date>2005-10-16</date> |
35 |
+<version>1.2</version> |
36 |
+<date>2006-10-31</date> |
37 |
|
38 |
<section> |
39 |
<title>A firewall</title> |
40 |
@@ -695,7 +695,7 @@ |
41 |
# Apply and add invalid states to the chains |
42 |
einfo "Applying chains to INPUT" |
43 |
$IPTABLES -A INPUT -m state --state INVALID -j DROP |
44 |
- $IPTABLES -A INPUT -j icmp_allowed |
45 |
+ $IPTABLES -A INPUT -p icmp -j icmp_allowed |
46 |
$IPTABLES -A INPUT -j check-flags |
47 |
$IPTABLES -A INPUT -i lo -j ACCEPT |
48 |
$IPTABLES -A INPUT -j allow-ssh-traffic-in |
49 |
@@ -703,7 +703,7 @@ |
50 |
|
51 |
einfo "Applying chains to FORWARD" |
52 |
$IPTABLES -A FORWARD -m state --state INVALID -j DROP |
53 |
- $IPTABLES -A FORWARD -j icmp_allowed |
54 |
+ $IPTABLES -A FORWARD -p icmp -j icmp_allowed |
55 |
$IPTABLES -A FORWARD -j check-flags |
56 |
$IPTABLES -A FORWARD -o lo -j ACCEPT |
57 |
$IPTABLES -A FORWARD -j allow-ssh-traffic-in |
58 |
@@ -712,7 +712,7 @@ |
59 |
|
60 |
einfo "Applying chains to OUTPUT" |
61 |
$IPTABLES -A OUTPUT -m state --state INVALID -j DROP |
62 |
- $IPTABLES -A OUTPUT -j icmp_allowed |
63 |
+ $IPTABLES -A OUTPUT -p icmp -j icmp_allowed |
64 |
$IPTABLES -A OUTPUT -j check-flags |
65 |
$IPTABLES -A OUTPUT -o lo -j ACCEPT |
66 |
$IPTABLES -A OUTPUT -j allow-ssh-traffic-out |
67 |
|
68 |
|
69 |
|
70 |
-- |
71 |
gentoo-doc-cvs@g.o mailing list |