Displaying 4 results from an estimated 4 matches for "iniface".
2013 Dec 12
3
Puppetlabs-firewall and Logging
...#39;, proto => ''all'', state => [''RELATED'', ''ESTABLISHED''], action => 
''accept'' }
*This works for new inbound SSH connections:*
  firewall { ''007 fwd to ssh_in'': chain => ''INPUT'', iniface => ''eth0'', 
source => ''10.x8.xx1.0/24'', proto => ''tcp'', state => ''NEW'', port => ''22'', 
action => ''accept'' }
*This works for inbound SSH connections:*  firewallchain { 
...
2003 Dec 26
2
[Bug 84] Unaligned access in ip_tables.c:ip_packet_match
...0000000 +0200
@@ -151,11 +151,11 @@ ip_packet_match(const struct iphdr *ip,
 	}
 
 	/* Look for ifname matches; this should unroll nicely. */
- 	for (i = 0, ret = 0; i < IFNAMSIZ/sizeof(unsigned long); i++) {
- 		ret |= (((const unsigned long *)indev)[i]
- 			^ ((const unsigned long *)ipinfo->iniface)[i])
- 			& ((const unsigned long *)ipinfo->iniface_mask)[i];
- 	}
+	for (i = 0, ret = 0; i < IFNAMSIZ; i++) {
+		ret |= (indev[i]
+			^ ipinfo->iniface[i])
+			& ipinfo->iniface_mask[i];
+	}
 
 	if (FWINV(ret != 0, IPT_INV_VIA_IN)) {
 		dprintf("VIA in mismatch (%s vs %s)....
2013 Jun 27
2
IPTables Firewall modules Question
...e {
  Firewall { require => undef, }
  firewall { ''000 accept all icmp'':
    proto => ''icmp'',
    action => ''accept'',
  }->
  firewall { ''001 accept all to lo interface'':
    proto => ''all'',
    iniface => ''lo'',
    action => ''accept'',
  }->
  firewall { ''002 accept related established rules'':
    proto => ''all'',
    state => [''ESTABLISHED'' , ''RELATED''],
    action => '...
2012 Feb 15
21
puppetlabs-firewall stages and persistence
Hi all,
I''m attempting to use the puppetlabs-firewall module. In testing,
rules are enabled in a random order, so it seems necessary to utilize
puppet stages to guarantee proper ordering.
I created a module to organize my firewalling. It consists of
localfw::pre to open the INPUT chain for established and related
connections, localfw::default for most normal rules, and localfw::post
to