Ajout d'une rgle pour autoriser inconditionnellement tout ce qui rentre
par l'interface tun-ovh. darcs-hash:20070319220142-68412-6e29cf15945f58a7773e498efb3a0a637c9dd0e7.gz
This commit is contained in:
parent
bb034fff2e
commit
1ae4bc4cd9
1 changed files with 1 additions and 0 deletions
|
@ -601,6 +601,7 @@ class firewall_komaz(firewall_crans) :
|
|||
|
||||
iptables("-t nat -P PREROUTING ACCEPT")
|
||||
iptables("-t nat -A PREROUTING -i lo -j ACCEPT")
|
||||
iptables("-t nat -A PREROUTING -i tun-ovh -j ACCEPT")
|
||||
iptables("-t nat -A PREROUTING -d 224.0.0.0/4 -j DROP")
|
||||
iptables("-t nat -A PREROUTING -s ! %s -j TEST_VIRUS_FLOOD" % self.zone_serveur)
|
||||
iptables("-t nat -A PREROUTING -j RESEAUX_NON_ROUTABLES_DST")
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue