From d771498ce165bdc02a636757b7c7f7cba8e2d7fe Mon Sep 17 00:00:00 2001 From: Valentin Samir Date: Sun, 25 Nov 2012 16:16:38 +0100 Subject: [PATCH] [firewall_new] dns menteur encore plus menteur sur le vlan accueil. Ignore-this: f7c21ada58035bb1bc1bb766c4328b72 darcs-hash:20121125151638-3a55a-391e22aad85cf43495f7af16ef2b3a5ed6f241b6.gz --- gestion/gen_confs/firewall_new.py | 3 +++ 1 file changed, 3 insertions(+) diff --git a/gestion/gen_confs/firewall_new.py b/gestion/gen_confs/firewall_new.py index e780b375..9a95e5ab 100755 --- a/gestion/gen_confs/firewall_new.py +++ b/gestion/gen_confs/firewall_new.py @@ -1604,6 +1604,9 @@ class firewall_routeur(firewall_crans): iptables("-t nat -i %s -A PREROUTING -p tcp --destination-port 443 -j ACCEPT" % interface) i+=1 + # dns menteur pour accueil + iptables("-t nat -A PREROUTING -p udp -s %s --dport 53 -j DNAT --to 10.51.0.10" % NETs['accueil'][0]) + iptables("-t nat -A PREROUTING -p tcp -s %s --dport 53 -j DNAT --to 10.51.0.10" % NETs['accueil'][0]) def post_start_hook(self) : self.anim = anim("\tMise en place du routage") warn = ''