Home
last modified time | relevance | path

Searched refs:iptables (Results 1 – 25 of 89) sorted by relevance

1234

/openbmc/openbmc/meta-openembedded/meta-networking/recipes-filter/arno-iptables-firewall/
H A Darno-iptables-firewall_2.1.1.bb8 SRC_URI = "git://github.com/arno-iptables-firewall/aif;branch=master;protocol=https"
16 install -d ${D}${datadir}/arno-iptables-firewall ${D}${sysconfdir}/arno-iptables-firewall
17 cp -r ${S}${sysconfdir}/arno-iptables-firewall ${D}${sysconfdir}/
18 install -m 0755 ${S}${sysconfdir}/init.d/arno-iptables-firewall ${D}${bindir}
19 install -m 0755 ${S}/bin/arno-iptables-firewall ${D}${sbindir}
21 cp -r ${S}/share/arno-iptables-firewall/* ${D}${datadir}/arno-iptables-firewall
22 cp -r ${S}/etc/arno-iptables-firewall/* ${D}${sysconfdir}/arno-iptables-firewall
25 sed -i -e 's%/usr/local/sbin%${sbindir}%g' ${D}${bindir}/arno-iptables-firewall
26 sed -i -e 's%/usr/local%${exec_prefix}%g' ${D}${sysconfdir}/arno-iptables-firewall/firewall.conf
32 SYSTEMD_SERVICE:${PN} = "arno-iptables-firewall.service"
[all …]
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ufw/ufw/
H A D0002-add-an-option-to-specify-iptables-location.patch4 Subject: [PATCH] setup: add an option to specify iptables location
9 specify an alternate iptables directory. This is assumed to be a
11 version of iptables to be used.
36 -for e in ['iptables']:
38 - # /usr/sbin/iptables to /sbin/iptables. Debian bullseye moves iptables
43 - if e == "iptables":
62 +if "--iptables-dir" in sys.argv:
64 + iptables_exe = os.path.join(iptables_dir, "iptables")
68 + sys.argv.remove("--iptables-dir")
71 + for e in ['iptables']:
[all …]
/openbmc/linux/tools/testing/selftests/netfilter/
H A Drpath.sh8 if iptables-legacy --version >/dev/null 2>&1; then
9 iptables='iptables-legacy'
10 elif iptables --version >/dev/null 2>&1; then
11 iptables='iptables'
13 iptables=''
30 if [ -z "$iptables$ip6tables$nft" ]; then
65 [ -n "$iptables" ] && {
67 ip netns exec "$ns2" "$iptables" $common -m rpfilter
68 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert
116 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z
[all …]
H A Dxt_string.sh8 if ! iptables --version >/dev/null 2>&1; then
37 iptables -A OUTPUT -o d0 -m string \
41 ip netns exec "$ns" iptables -v -S OUTPUT | grep '^-A'
44 ip netns exec "$ns" iptables -Z OUTPUT
H A Dnf_nat_edemux.sh27 iptables --version > /dev/null 2>&1
71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
H A Dconntrack_sctp_collision.sh58 ip net exec $ROUTER_NS iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP
59 ip net exec $ROUTER_NS iptables -A INPUT -p sctp -j DROP
/openbmc/openbmc/poky/meta/recipes-extended/iptables/iptables/
H A D0002-iptables-xshared.h-add-missing-sys.types.h-include.patch4 Subject: [PATCH] iptables/xshared.h: add missing sys.types.h include
8 | ../../../../../../../workspace/sources/iptables/iptables/xshared.h:83:56: error: unknown type nam…
17 iptables/xshared.h | 1 +
20 diff --git a/iptables/xshared.h b/iptables/xshared.h
22 --- a/iptables/xshared.h
23 +++ b/iptables/xshared.h
H A Diptables.service8 ExecStart=@SBINDIR@/iptables-restore -w -- @RULESDIR@/iptables.rules
9 ExecReload=@SBINDIR@/iptables-restore -w -- @RULESDIR@/iptables.rules
H A D0004-configure.ac-only-check-conntrack-when-libnfnetlink-.patch7 Package libnetfilter-conntrack depends on package libnfnetlink. iptables
13 .../iptables/1.4.21-r0/iptables-1.4.21/extensions/libxt_connlabel.c:8:0:
/openbmc/openbmc/poky/meta/recipes-extended/iptables/
H A Diptables_1.8.10.bb2 DESCRIPTION = "iptables is the userspace command line program used to configure and control network…
8 … file://iptables/iptables.c;beginline=13;endline=25;md5=c5cffd09974558cf27d0f763df2a12dc \
11 SRC_URI = "http://netfilter.org/projects/iptables/files/iptables-${PV}.tar.xz \
12 file://iptables.service \
13 file://iptables.rules \
17 file://0002-iptables-xshared.h-add-missing-sys.types.h-include.patch \
23 iptables.service \
55 install -m 0644 ${WORKDIR}/iptables.rules ${D}${IPTABLES_RULES_DIR}
58 install -m 0644 ${WORKDIR}/iptables.service ${D}${systemd_system_unitdir}
63 ${D}${systemd_system_unitdir}/iptables.service
[all …]
/openbmc/openbmc/meta-quanta/meta-olympus-nuvoton/recipes-olympus-nuvoton/network/olympus-nuvoton-iptable-save/
H A Dphosphor-save-iptable-rules.service9 ExecStart=/bin/sh -c "iptables-save > /etc/iptables/iptables.rules"
/openbmc/linux/Documentation/networking/
H A Dtproxy.rst19 # iptables -t mangle -N DIVERT
20 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT
21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1
22 # iptables -t mangle -A DIVERT -j ACCEPT
59 usually done with the iptables REDIRECT target; however, there are serious
67 add rules like this to the iptables ruleset above::
69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \
87 To use tproxy you'll need to have the following modules compiled for iptables:
105 the HTTP listener you redirect traffic to with the TPROXY iptables
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ufw/
H A Dufw_0.36.1.bb13 file://0002-add-an-option-to-specify-iptables-location.patch \
24 iptables \
73 SETUPTOOLS_BUILD_ARGS:append = " --iptables-dir /usr/sbin"
74 SETUPTOOLS_INSTALL_ARGS:append = " --iptables-dir /usr/sbin"
/openbmc/linux/tools/testing/selftests/net/mptcp/
H A Dmptcp_sockopt.sh15 iptables="iptables"
30 for t in ${iptables} ${ip6tables}; do
101 if iptables-legacy -V &> /dev/null; then
102 iptables="iptables-legacy"
104 elif ! iptables -V &> /dev/null; then
117 local tables=${iptables}
/openbmc/linux/Documentation/admin-guide/cgroup-v1/
H A Dnet_cls.rst10 Also, Netfilter (iptables) can use this tag to perform
42 configuring iptables, basic example::
44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
/openbmc/openbmc/poky/scripts/
H A Drunqemu-ifdown55 IPTABLES=`which iptables 2> /dev/null`
57 IPTABLES=/sbin/iptables
H A Drunqemu-ifup72 IPTABLES=`which iptables 2> /dev/null`
74 IPTABLES=/sbin/iptables
/openbmc/openbmc/poky/scripts/esdk-tools/
H A Drunqemu-ifdown55 IPTABLES=`which iptables 2> /dev/null`
57 IPTABLES=/sbin/iptables
H A Drunqemu-ifup72 IPTABLES=`which iptables 2> /dev/null`
74 IPTABLES=/sbin/iptables
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/miniupnpd/files/
H A D0001-Add-OpenEmbedded-cross-compile-case.patch29 FW=iptables
34 + FW=iptables
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/fwknop/
H A Dfwknop_2.6.10.bb17 EXTRA_OECONF = " --with-iptables=${sbindir}/iptables"
/openbmc/linux/net/ipv4/netfilter/
H A DKconfig124 iptables is a general, extensible packet identification framework.
179 local output. See the man page for iptables(8).
210 tristate "iptables NAT support"
216 This enables the `nat' table in iptables. This allows masquerading,
256 This option adds a `mangle' table to iptables: see the man page for
257 iptables(8). This table is used for various packet alterations
267 This option adds a `ECN' target, which can be used in the iptables mangle
290 This option adds a `raw' table to iptables. This table is the very
303 This option adds a `security' table to iptables, for use
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dbpf_nf.c52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local
71 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct()
133 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/collectd/
H A Dcollectd_5.12.0.bb34 PACKAGECONFIG[iptables] = "--enable-iptables,--disable-iptables,iptables"
/openbmc/openbmc/meta-openembedded/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/
H A Dfirewalld_1.3.2.bb41 # iptables, ip6tables, ebtables, and ipset *should* be unnecessary
43 # However we still need iptables and ip6tables to be available otherwise any
48 --with-iptables=${sbindir}/iptables \
49 --with-iptables-restore=${sbindir}/iptables-restore \
278 iptables \

1234