Mageia Bugzilla – Attachment 3732 Details for
Bug 9694
3_b4: User's shorewall rules removed during drakxtools updates
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
Log In
[x]
|
New Account
|
Forgot Password
rules before update
rules (text/plain), 2.23 KB, created by
Bit Twister
on 2013-04-11 05:10:41 CEST
(
hide
)
Description:
rules before update
Filename:
MIME Type:
Creator:
Bit Twister
Created:
2013-04-11 05:10:41 CEST
Size:
2.23 KB
patch
obsolete
># ># Shorewall version 4 - Rules File ># ># For information on the settings in this file, type "man shorewall-rules" ># ># The manpage is also online at ># http://www.shorewall.net/manpages/shorewall-rules.html ># >#################################################################################################################################################### >#ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ MARK CONNLIMIT TIME ># PORT PORT(S) DEST LIMIT GROUP >#SECTION ESTABLISHED >#SECTION RELATED ># ># SSHKnock:info net $FW tcp 22,5179,5180,5181 ># >ACCEPT net:$HDHOMERUN1_IP all all >ACCEPT net:$HDHOMERUN2_IP all all >ACCEPT net:$HDHOMERUN3_IP all all >ACCEPT net:$HDHOMERUN4_IP all all >ACCEPT net:$WB_IP all all >ACCEPT net:$MTV_IP all all >ACCEPT net:$PATS_IP all tcp ssh >ACCEPT net:$GUESTS_IP all tcp ssh >ACCEPT net:$LAN_RANGE all all > ># ekiga incomming SIP VoIP, Windows Messenger ports ># http://wiki.ekiga.org/index.php/Internet_ports_used_by_Ekiga ># If behind NAT router, http://wiki.ekiga.org/index.php/Ekiga_behind_a_NAT_router > ># Ekiga SIP signaling, listen port: 5060 and H.323 gatekeepers >ACCEPT $FW net udp 5000:5100 >ACCEPT net $FW udp 5000:5100 > ># ekiga Outgoing traffic to the STUN server >ACCEPT $FW net udp 3478:3479 >ACCEPT net $FW udp 3478:3479 > ># ekiga RTP Incoming traffic from the other end. Often 5004, 7070, 16382 >ACCEPT $FW net udp 7070,16382 >ACCEPT net $FW udp 7070,16382 > ># ekiga incomming H323 Listen port >ACCEPT $FW net tcp 1720 >ACCEPT net $FW tcp 1720 > ># ekiga H323 H.245 channel for old H.323 implementations (Netmeeting) >ACCEPT $FW net tcp 30000:30010 >ACCEPT net $FW tcp 30000:30010 > ># Allow webcam dns lookups >ACCEPT net:$WEB_CAM1_IP all UDP 53 >ACCEPT net:$WEB_CAM2_IP all UDP 53 >#LAST LINE -- DO NOT REMOVE
# # Shorewall version 4 - Rules File # # For information on the settings in this file, type "man shorewall-rules" # # The manpage is also online at # http://www.shorewall.net/manpages/shorewall-rules.html # #################################################################################################################################################### #ACTION SOURCE DEST PROTO DEST SOURCE ORIGINAL RATE USER/ MARK CONNLIMIT TIME # PORT PORT(S) DEST LIMIT GROUP #SECTION ESTABLISHED #SECTION RELATED # # SSHKnock:info net $FW tcp 22,5179,5180,5181 # ACCEPT net:$HDHOMERUN1_IP all all ACCEPT net:$HDHOMERUN2_IP all all ACCEPT net:$HDHOMERUN3_IP all all ACCEPT net:$HDHOMERUN4_IP all all ACCEPT net:$WB_IP all all ACCEPT net:$MTV_IP all all ACCEPT net:$PATS_IP all tcp ssh ACCEPT net:$GUESTS_IP all tcp ssh ACCEPT net:$LAN_RANGE all all # ekiga incomming SIP VoIP, Windows Messenger ports # http://wiki.ekiga.org/index.php/Internet_ports_used_by_Ekiga # If behind NAT router, http://wiki.ekiga.org/index.php/Ekiga_behind_a_NAT_router # Ekiga SIP signaling, listen port: 5060 and H.323 gatekeepers ACCEPT $FW net udp 5000:5100 ACCEPT net $FW udp 5000:5100 # ekiga Outgoing traffic to the STUN server ACCEPT $FW net udp 3478:3479 ACCEPT net $FW udp 3478:3479 # ekiga RTP Incoming traffic from the other end. Often 5004, 7070, 16382 ACCEPT $FW net udp 7070,16382 ACCEPT net $FW udp 7070,16382 # ekiga incomming H323 Listen port ACCEPT $FW net tcp 1720 ACCEPT net $FW tcp 1720 # ekiga H323 H.245 channel for old H.323 implementations (Netmeeting) ACCEPT $FW net tcp 30000:30010 ACCEPT net $FW tcp 30000:30010 # Allow webcam dns lookups ACCEPT net:$WEB_CAM1_IP all UDP 53 ACCEPT net:$WEB_CAM2_IP all UDP 53 #LAST LINE -- DO NOT REMOVE
View Attachment As Raw
Actions:
View
Attachments on
bug 9694
: 3732 |
3733