Home
last modified time | relevance | path

Searched refs:FORWARD (Results 1 – 25 of 268) sorted by relevance

1234567891011

/external/iptables/iptables/tests/shell/testcases/ipt-restore/
D0003-restore-ordering_017 -A FORWARD -m comment --comment "rule 4" -j ACCEPT
18 -I FORWARD 1 -m comment --comment "rule 1" -j ACCEPT
19 -I FORWARD 2 -m comment --comment "rule 2" -j ACCEPT
20 -I FORWARD 3 -m comment --comment "rule 3" -j ACCEPT
35 -A FORWARD -m comment --comment "rule 5" -j ACCEPT
36 -I FORWARD 1 -m comment --comment "rule 0.5" -j ACCEPT
37 -I FORWARD 3 -m comment --comment "rule 1.5" -j ACCEPT
38 -I FORWARD 5 -m comment --comment "rule 2.5" -j ACCEPT
39 -I FORWARD 7 -m comment --comment "rule 3.5" -j ACCEPT
40 -I FORWARD 9 -m comment --comment "rule 4.5" -j ACCEPT
[all …]
/external/icu/icu4c/source/data/translit/
Droot.txt24 direction {"FORWARD"}
34 direction {"FORWARD"}
53 direction {"FORWARD"}
75 direction {"FORWARD"}
100 direction {"FORWARD"}
113 direction {"FORWARD"}
126 direction {"FORWARD"}
139 direction {"FORWARD"}
152 direction {"FORWARD"}
165 direction {"FORWARD"}
[all …]
/external/iptables/extensions/
Dlibebt_ip6.txlate1 ebtables-translate -A FORWARD -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT
2 nft add rule bridge filter FORWARD ip6 saddr != dead::/64 counter accept
4 ebtables-translate -A FORWARD -p ip6 ! --ip6-dst dead:beef::/64 -j ACCEPT
5 nft add rule bridge filter FORWARD ip6 daddr != dead:beef::/64 counter accept
7 ebtables-translate -I FORWARD -p ip6 --ip6-dst f00:ba::
8 nft insert rule bridge filter FORWARD ip6 daddr f00:ba:: counter
13 ebtables-translate -A FORWARD -p ip6 --ip6-proto tcp --ip6-dport 22
14 nft add rule bridge filter FORWARD ether type ip6 tcp dport 22 counter
16 ebtables-translate -A FORWARD -p ip6 --ip6-proto udp --ip6-sport 1024:65535
17 nft add rule bridge filter FORWARD ether type ip6 udp sport 1024-65535 counter
[all …]
Dlibebt_ip.txlate1 ebtables-translate -A FORWARD -p ip --ip-src ! 192.168.0.0/24 -j ACCEPT
2 nft add rule bridge filter FORWARD ip saddr != 192.168.0.0/24 counter accept
4 ebtables-translate -I FORWARD -p ip --ip-dst 10.0.0.1
5 nft insert rule bridge filter FORWARD ip daddr 10.0.0.1 counter
10 ebtables-translate -A FORWARD -p ip --ip-proto tcp --ip-dport 22
11 nft add rule bridge filter FORWARD tcp dport 22 counter
13 ebtables-translate -A FORWARD -p ip --ip-proto udp --ip-sport 1024:65535
14 nft add rule bridge filter FORWARD udp sport 1024-65535 counter
16 ebtables-translate -A FORWARD -p ip --ip-proto 253
17 nft add rule bridge filter FORWARD ip protocol 253 counter
[all …]
Dlibxt_devgroup.txlate1 iptables-translate -A FORWARD -m devgroup --src-group 0x2 -j ACCEPT
2 nft add rule ip filter FORWARD iifgroup 0x2 counter accept
4 iptables-translate -A FORWARD -m devgroup --dst-group 0xc/0xc -j ACCEPT
5 nft add rule ip filter FORWARD oifgroup and 0xc == 0xc counter accept
10 iptables-translate -A FORWARD -m devgroup ! --dst-group 0xc/0xc -j ACCEPT
11 nft add rule ip filter FORWARD oifgroup and 0xc != 0xc counter accept
13 iptables-translate -A FORWARD -m devgroup ! --src-group 0x2 -j ACCEPT
14 nft add rule ip filter FORWARD iifgroup != 0x2 counter accept
16 iptables-translate -A FORWARD -m devgroup ! --src-group 0x2 --dst-group 0xc/0xc -j ACCEPT
17 nft add rule ip filter FORWARD iifgroup != 0x2 oifgroup and 0xc != 0xc counter accept
Dlibip6t_REJECT.txlate1 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT
2 nft add rule ip6 filter FORWARD tcp dport 22 counter reject
4 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp6-reject-route
5 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with icmpv6 type reject-route
7 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset
8 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with tcp reset
Dlibipt_REJECT.txlate1 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT
2 nft add rule ip filter FORWARD tcp dport 22 counter reject
4 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp-net-unreachable
5 nft add rule ip filter FORWARD tcp dport 22 counter reject with icmp type net-unreachable
7 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset
8 nft add rule ip filter FORWARD tcp dport 22 counter reject with tcp reset
Dlibxt_physdev.t1 :INPUT,FORWARD
4 :OUTPUT,FORWARD
5 # xt_physdev: using --physdev-out in the OUTPUT, FORWARD and POSTROUTING chains for non-bridged tra…
6 # ERROR: should fail: iptables -A FORWARD -m physdev --physdev-out lo
10 :FORWARD
Dlibxt_helper.txlate1 iptables-translate -A FORWARD -m helper --helper sip
2 nft add rule ip filter FORWARD ct helper \"sip\" counter
4 iptables-translate -A FORWARD -m helper ! --helper ftp
5 nft add rule ip filter FORWARD ct helper != \"ftp\" counter
Dlibipt_LOG.txlate1 iptables-translate -A FORWARD -p tcp -j LOG --log-level error
2 nft add rule ip filter FORWARD ip protocol tcp counter log level err
4 iptables-translate -A FORWARD -p tcp -j LOG --log-prefix "Random prefix"
5 nft add rule ip filter FORWARD ip protocol tcp counter log prefix \"Random prefix\"
/external/iptables/iptables/tests/shell/testcases/ipt-save/dumps/
Dipt-save-filter.txt4 :FORWARD DROP [0:0]
18 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p udp -m udp --dport 4166 -j ACCEPT
19 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4180 -j ACCEPT
20 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4162 -j ACCEPT
21 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 20376 -j ACCEPT
22 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 10209 -j ACCEPT
23 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 881 -j ACCEPT
24 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p icmp -j DROP
25 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p udp -j DROP
26 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p tcp -j DROP
[all …]
Dfedora27-iptables6 :FORWARD ACCEPT [0:0]
24 [0:0] -A FORWARD -j FORWARD_direct
62 :FORWARD ACCEPT [0:0]
96 [0:0] -A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
97 [0:0] -A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT
98 [0:0] -A FORWARD -i virbr0 -o virbr0 -j ACCEPT
99 [0:0] -A FORWARD -o virbr0 -j REJECT --reject-with icmp-port-unreachable
100 [0:0] -A FORWARD -i virbr0 -j REJECT --reject-with icmp-port-unreachable
101 [0:0] -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
102 [0:0] -A FORWARD -i lo -j ACCEPT
[all …]
Dfedora27-ip6tables5 :FORWARD ACCEPT [0:0]
23 -A FORWARD -j FORWARD_direct
60 :FORWARD ACCEPT [0:0]
90 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
91 -A FORWARD -i lo -j ACCEPT
92 -A FORWARD -j FORWARD_direct
93 -A FORWARD -j FORWARD_IN_ZONES_SOURCE
94 -A FORWARD -j FORWARD_IN_ZONES
95 -A FORWARD -j FORWARD_OUT_ZONES_SOURCE
96 -A FORWARD -j FORWARD_OUT_ZONES
[all …]
Dwireless.txt14 :FORWARD DROP [0:0]
44 -A FORWARD -i bond0.10 -j ACCEPT
45 -A FORWARD -m conntrack --ctstate INVALID -j L_DROP
46 -A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
47 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j L_ACCEPT
48 -A FORWARD -d 10.31.63.80/30 -o bond0.10 -j L_ACCEPT
49 -A FORWARD -o bond0.11 -j CUST_I16_IN
50 -A FORWARD -i bond0.11 -j CUST_I16_OUT
51 -A FORWARD -o bond0.12 -j CUST_I15_IN
52 -A FORWARD -i bond0.12 -j CUST_I15_OUT
[all …]
/external/iptables/iptables/tests/shell/testcases/iptables/
D0005-rule-replace_012 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 1" -j ACCEPT
13 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 2" -j ACCEPT
14 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 3" -j ACCEPT
16 $XT_MULTI iptables -R FORWARD 2 -m comment --comment "replaced 2" -j ACCEPT
24 $XT_MULTI iptables -R FORWARD 1 -m comment --comment "replaced 1" -j ACCEPT
32 $XT_MULTI iptables -R FORWARD 3 -m comment --comment "replaced 3" -j ACCEPT
D0002-verbose-output_013 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -A FORWARD $RULE1)
14 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -I FORWARD 2 $RULE2)
16 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -C FORWARD $RULE1)
17 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -C FORWARD $RULE2)
34 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -D FORWARD $RULE1)
35 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -D FORWARD $RULE2)
D0003-list-rules_06 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j ACCEPT
7 $XT_MULTI iptables -A FORWARD -i eth42 -o eth23 -g foo
32 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI iptables -S FORWARD)
38 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI iptables -v -S FORWARD)
61 $XT_MULTI iptables -S FORWARD 234 || {
D0005-delete-rules_05 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j DROP
6 $XT_MULTI iptables -D FORWARD -i eth23 -o eth42 -j REJECT
12 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j MARK --set-mark 23
13 $XT_MULTI iptables -D FORWARD -i eth23 -o eth42 -j MARK --set-mark 42
/external/iptables/iptables/tests/shell/testcases/ip6tables/
D0002-verbose-output_013 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -A FORWARD $RULE1)
14 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -I FORWARD 2 $RULE2)
16 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -C FORWARD $RULE1)
17 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -C FORWARD $RULE2)
32 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -D FORWARD $RULE1)
33 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -D FORWARD $RULE2)
D0003-list-rules_06 $XT_MULTI ip6tables -A FORWARD -i eth23 -o eth42 -j ACCEPT
7 $XT_MULTI ip6tables -A FORWARD -i eth42 -o eth23 -g foo
32 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI ip6tables -S FORWARD)
38 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI ip6tables -v -S FORWARD)
61 $XT_MULTI ip6tables -S FORWARD 234 || {
/external/iptables/iptables/tests/shell/testcases/firewalld-restore/
D0001-firewalld_052 -I FORWARD 1 -j FORWARD_direct
86 -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
87 -I FORWARD 2 -i lo -j ACCEPT
88 -I FORWARD 3 -j FORWARD_direct
89 -I FORWARD 4 -j FORWARD_IN_ZONES_SOURCE
90 -I FORWARD 5 -j FORWARD_IN_ZONES
91 -I FORWARD 6 -j FORWARD_OUT_ZONES_SOURCE
92 -I FORWARD 7 -j FORWARD_OUT_ZONES
93 -I FORWARD 8 -m conntrack --ctstate INVALID -j DROP
94 -I FORWARD 9 -j REJECT --reject-with icmp-host-prohibited
[all …]
/external/iptables/iptables/tests/shell/testcases/firewalld-restore/dumps/
Dipt-save-completed.txt42 :FORWARD ACCEPT [0:0]
60 -A FORWARD -j FORWARD_direct
92 :FORWARD ACCEPT [0:0]
122 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
123 -A FORWARD -i lo -j ACCEPT
124 -A FORWARD -j FORWARD_direct
125 -A FORWARD -j FORWARD_IN_ZONES_SOURCE
126 -A FORWARD -j FORWARD_IN_ZONES
127 -A FORWARD -j FORWARD_OUT_ZONES_SOURCE
128 -A FORWARD -j FORWARD_OUT_ZONES
[all …]
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/translit/
DTransliteratorTest.java155 Transliterator foo = Transliterator.createFromRules(id, rules, Transliterator.FORWARD); in checkRegistry()
226 Transliterator.FORWARD); in TestSimpleRules()
286 Transliterator fwd = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestRuleBasedInverse()
303 +"a>A;", Transliterator.FORWARD); in TestKeyboard()
327 +"a>A;", Transliterator.FORWARD); in TestKeyboard2()
371 Transliterator t = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestKeyboard3()
459 …or tempTrans = Transliterator.createFromRules("temp", "x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering()
464 …Trans = Transliterator.createFromRules("temp", "::[a]; x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering()
532 … Transliterator t = Transliterator.createFromRules("<ID>", DATA[i], Transliterator.FORWARD); in TestPatternQuoting()
539 …iterator gl = Transliterator.createFromRules("foo5", "$\u2DC0 = qy; a>b;", Transliterator.FORWARD); in TestVariableNames()
[all …]
/external/icu/icu4j/main/tests/translit/src/com/ibm/icu/dev/test/translit/
DTransliteratorTest.java152 Transliterator foo = Transliterator.createFromRules(id, rules, Transliterator.FORWARD); in checkRegistry()
223 Transliterator.FORWARD); in TestSimpleRules()
283 Transliterator fwd = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestRuleBasedInverse()
300 +"a>A;", Transliterator.FORWARD); in TestKeyboard()
324 +"a>A;", Transliterator.FORWARD); in TestKeyboard2()
368 Transliterator t = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestKeyboard3()
456 …or tempTrans = Transliterator.createFromRules("temp", "x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering()
461 …Trans = Transliterator.createFromRules("temp", "::[a]; x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering()
529 … Transliterator t = Transliterator.createFromRules("<ID>", DATA[i], Transliterator.FORWARD); in TestPatternQuoting()
536 …iterator gl = Transliterator.createFromRules("foo5", "$\u2DC0 = qy; a>b;", Transliterator.FORWARD); in TestVariableNames()
[all …]
/external/iptables/etc/
Dxtables.conf10 chain FORWARD hook NF_INET_FORWARD prio -150
17 chain FORWARD hook NF_INET_FORWARD prio 0
30 chain FORWARD hook NF_INET_FORWARD prio 50
44 chain FORWARD hook NF_INET_FORWARD prio -150
51 chain FORWARD hook NF_INET_FORWARD prio 0
64 chain FORWARD hook NF_INET_FORWARD prio 50

1234567891011