/openbmc/openbmc/meta-openembedded/meta-networking/recipes-filter/arno-iptables-firewall/ |
H A D | arno-iptables-firewall_2.1.1.bb | 8 SRC_URI = "git://github.com/arno-iptables-firewall/aif;branch=master;protocol=https" 16 install -d ${D}${datadir}/arno-iptables-firewall ${D}${sysconfdir}/arno-iptables-firewall 17 cp -r ${S}${sysconfdir}/arno-iptables-firewall ${D}${sysconfdir}/ 18 install -m 0755 ${S}${sysconfdir}/init.d/arno-iptables-firewall ${D}${bindir} 19 install -m 0755 ${S}/bin/arno-iptables-firewall ${D}${sbindir} 21 cp -r ${S}/share/arno-iptables-firewall/* ${D}${datadir}/arno-iptables-firewall 22 cp -r ${S}/etc/arno-iptables-firewall/* ${D}${sysconfdir}/arno-iptables-firewall 25 sed -i -e 's%/usr/local/sbin%${sbindir}%g' ${D}${bindir}/arno-iptables-firewall 26 sed -i -e 's%/usr/local%${exec_prefix}%g' ${D}${sysconfdir}/arno-iptables-firewall/firewall.conf 32 SYSTEMD_SERVICE:${PN} = "arno-iptables-firewall.service" [all …]
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ufw/ufw/ |
H A D | 0002-add-an-option-to-specify-iptables-location.patch | 4 Subject: [PATCH] setup: add an option to specify iptables location 9 specify an alternate iptables directory. This is assumed to be a 11 version of iptables to be used. 36 -for e in ['iptables']: 38 - # /usr/sbin/iptables to /sbin/iptables. Debian bullseye moves iptables 43 - if e == "iptables": 62 +if "--iptables-dir" in sys.argv: 64 + iptables_exe = os.path.join(iptables_dir, "iptables") 68 + sys.argv.remove("--iptables-dir") 71 + for e in ['iptables']: [all …]
|
/openbmc/linux/tools/testing/selftests/netfilter/ |
H A D | rpath.sh | 8 if iptables-legacy --version >/dev/null 2>&1; then 9 iptables='iptables-legacy' 10 elif iptables --version >/dev/null 2>&1; then 11 iptables='iptables' 13 iptables='' 30 if [ -z "$iptables$ip6tables$nft" ]; then 65 [ -n "$iptables" ] && { 67 ip netns exec "$ns2" "$iptables" $common -m rpfilter 68 ip netns exec "$ns2" "$iptables" $common -m rpfilter --invert 116 [ -n "$iptables" ] && ip netns exec "$ns2" "$iptables" -t raw -Z [all …]
|
H A D | xt_string.sh | 8 if ! iptables --version >/dev/null 2>&1; then 37 iptables -A OUTPUT -o d0 -m string \ 41 ip netns exec "$ns" iptables -v -S OUTPUT | grep '^-A' 44 ip netns exec "$ns" iptables -Z OUTPUT
|
H A D | nf_nat_edemux.sh | 27 iptables --version > /dev/null 2>&1 71 ip netns exec $ns2 iptables -t nat -A OUTPUT -d 10.96.0.1/32 -p tcp --dport 443 -j DNAT --to-destin…
|
H A D | conntrack_sctp_collision.sh | 58 ip net exec $ROUTER_NS iptables -A FORWARD -m state --state INVALID,UNTRACKED -j DROP 59 ip net exec $ROUTER_NS iptables -A INPUT -p sctp -j DROP
|
/openbmc/openbmc/poky/meta/recipes-extended/iptables/iptables/ |
H A D | 0002-iptables-xshared.h-add-missing-sys.types.h-include.patch | 4 Subject: [PATCH] iptables/xshared.h: add missing sys.types.h include 8 | ../../../../../../../workspace/sources/iptables/iptables/xshared.h:83:56: error: unknown type nam… 17 iptables/xshared.h | 1 + 20 diff --git a/iptables/xshared.h b/iptables/xshared.h 22 --- a/iptables/xshared.h 23 +++ b/iptables/xshared.h
|
H A D | iptables.service | 8 ExecStart=@SBINDIR@/iptables-restore -w -- @RULESDIR@/iptables.rules 9 ExecReload=@SBINDIR@/iptables-restore -w -- @RULESDIR@/iptables.rules
|
H A D | 0004-configure.ac-only-check-conntrack-when-libnfnetlink-.patch | 7 Package libnetfilter-conntrack depends on package libnfnetlink. iptables 13 .../iptables/1.4.21-r0/iptables-1.4.21/extensions/libxt_connlabel.c:8:0:
|
/openbmc/openbmc/poky/meta/recipes-extended/iptables/ |
H A D | iptables_1.8.10.bb | 2 DESCRIPTION = "iptables is the userspace command line program used to configure and control network… 8 … file://iptables/iptables.c;beginline=13;endline=25;md5=c5cffd09974558cf27d0f763df2a12dc \ 11 SRC_URI = "http://netfilter.org/projects/iptables/files/iptables-${PV}.tar.xz \ 12 file://iptables.service \ 13 file://iptables.rules \ 17 file://0002-iptables-xshared.h-add-missing-sys.types.h-include.patch \ 23 iptables.service \ 55 install -m 0644 ${WORKDIR}/iptables.rules ${D}${IPTABLES_RULES_DIR} 58 install -m 0644 ${WORKDIR}/iptables.service ${D}${systemd_system_unitdir} 63 ${D}${systemd_system_unitdir}/iptables.service [all …]
|
/openbmc/openbmc/meta-quanta/meta-olympus-nuvoton/recipes-olympus-nuvoton/network/olympus-nuvoton-iptable-save/ |
H A D | phosphor-save-iptable-rules.service | 9 ExecStart=/bin/sh -c "iptables-save > /etc/iptables/iptables.rules"
|
/openbmc/linux/Documentation/networking/ |
H A D | tproxy.rst | 19 # iptables -t mangle -N DIVERT 20 # iptables -t mangle -A PREROUTING -p tcp -m socket -j DIVERT 21 # iptables -t mangle -A DIVERT -j MARK --set-mark 1 22 # iptables -t mangle -A DIVERT -j ACCEPT 59 usually done with the iptables REDIRECT target; however, there are serious 67 add rules like this to the iptables ruleset above:: 69 # iptables -t mangle -A PREROUTING -p tcp --dport 80 -j TPROXY \ 87 To use tproxy you'll need to have the following modules compiled for iptables: 105 the HTTP listener you redirect traffic to with the TPROXY iptables
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/ufw/ |
H A D | ufw_0.36.1.bb | 13 file://0002-add-an-option-to-specify-iptables-location.patch \ 24 iptables \ 73 SETUPTOOLS_BUILD_ARGS:append = " --iptables-dir /usr/sbin" 74 SETUPTOOLS_INSTALL_ARGS:append = " --iptables-dir /usr/sbin"
|
/openbmc/linux/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_sockopt.sh | 15 iptables="iptables" 30 for t in ${iptables} ${ip6tables}; do 101 if iptables-legacy -V &> /dev/null; then 102 iptables="iptables-legacy" 104 elif ! iptables -V &> /dev/null; then 117 local tables=${iptables}
|
/openbmc/linux/Documentation/admin-guide/cgroup-v1/ |
H A D | net_cls.rst | 10 Also, Netfilter (iptables) can use this tag to perform 42 configuring iptables, basic example:: 44 iptables -A OUTPUT -m cgroup ! --cgroup 0x100001 -j DROP
|
/openbmc/openbmc/poky/scripts/ |
H A D | runqemu-ifdown | 55 IPTABLES=`which iptables 2> /dev/null` 57 IPTABLES=/sbin/iptables
|
H A D | runqemu-ifup | 72 IPTABLES=`which iptables 2> /dev/null` 74 IPTABLES=/sbin/iptables
|
/openbmc/openbmc/poky/scripts/esdk-tools/ |
H A D | runqemu-ifdown | 55 IPTABLES=`which iptables 2> /dev/null` 57 IPTABLES=/sbin/iptables
|
H A D | runqemu-ifup | 72 IPTABLES=`which iptables 2> /dev/null` 74 IPTABLES=/sbin/iptables
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-connectivity/miniupnpd/files/ |
H A D | 0001-Add-OpenEmbedded-cross-compile-case.patch | 29 FW=iptables 34 + FW=iptables
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-support/fwknop/ |
H A D | fwknop_2.6.10.bb | 17 EXTRA_OECONF = " --with-iptables=${sbindir}/iptables"
|
/openbmc/linux/net/ipv4/netfilter/ |
H A D | Kconfig | 124 iptables is a general, extensible packet identification framework. 179 local output. See the man page for iptables(8). 210 tristate "iptables NAT support" 216 This enables the `nat' table in iptables. This allows masquerading, 256 This option adds a `mangle' table to iptables: see the man page for 257 iptables(8). This table is used for various packet alterations 267 This option adds a `ECN' target, which can be used in the iptables mangle 290 This option adds a `raw' table to iptables. This table is the very 303 This option adds a `security' table to iptables, for use
|
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | bpf_nf.c | 52 const char *iptables = "iptables-legacy -t raw %s PREROUTING -j CONNMARK --set-mark 42/0"; in test_bpf_nf_ct() local 71 snprintf(cmd, sizeof(cmd), iptables, "-A"); in test_bpf_nf_ct() 133 snprintf(cmd, sizeof(cmd), iptables, "-D"); in test_bpf_nf_ct()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/collectd/ |
H A D | collectd_5.12.0.bb | 34 PACKAGECONFIG[iptables] = "--enable-iptables,--disable-iptables,iptables"
|
/openbmc/openbmc/meta-openembedded/meta-networking/dynamic-layers/meta-python/recipes-connectivity/firewalld/ |
H A D | firewalld_1.3.2.bb | 41 # iptables, ip6tables, ebtables, and ipset *should* be unnecessary 43 # However we still need iptables and ip6tables to be available otherwise any 48 --with-iptables=${sbindir}/iptables \ 49 --with-iptables-restore=${sbindir}/iptables-restore \ 278 iptables \
|