Searched refs:iptables (Results 1 – 25 of 35) sorted by relevance
12
/external/iptables/iptables/ |
D | Makefile.am | 17 xtables_multi_SOURCES = xtables-multi.c iptables-xml.c 25 xtables_multi_SOURCES += iptables-save.c iptables-restore.c \ 26 iptables-standalone.c iptables.c 40 man_MANS = iptables.8 iptables-restore.8 iptables-save.8 \ 41 iptables-xml.1 ip6tables.8 ip6tables-restore.8 \ 43 CLEANFILES = iptables.8 ip6tables.8 45 vx_bin_links = iptables-xml 47 v4_sbin_links = iptables iptables-restore iptables-save 53 iptables.8: ${srcdir}/iptables.8.in ../extensions/matches4.man ../extensions/targets4.man
|
D | .gitignore | 6 /iptables 7 /iptables.8 8 /iptables-save 9 /iptables-restore 10 /iptables-static 11 /iptables-xml
|
D | iptables-apply | 14 DEFAULT_FILE=/etc/network/iptables 19 $PROGNAME $VERSION -- a safer way to update iptables remotely 44 The script will try to apply a new ruleset (as output by iptables-save/read 45 by iptables-restore) to iptables, then prompt the user whether the changes 108 SAVE=iptables-save 109 RESTORE=iptables-restore
|
/external/wpa_supplicant_8/wpa_supplicant/examples/ |
D | p2p-action-udhcp.sh | 54 iptables -P FORWARD DROP 55 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE 56 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 57 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT 66 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE 67 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 68 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
|
D | p2p-action.sh | 68 iptables -P FORWARD DROP 69 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE 70 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 71 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT 80 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE 81 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT 82 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
|
/external/iptables/extensions/ |
D | libxt_AUDIT.man | 10 iptables \-N AUDIT_DROP 12 iptables \-A AUDIT_DROP \-j AUDIT \-\-type drop 14 iptables \-A AUDIT_DROP \-j DROP
|
D | libxt_sctp.man | 24 iptables \-A INPUT \-p sctp \-\-dport 80 \-j DROP 26 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA,INIT \-j DROP 28 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA:Be \-j ACCEPT
|
D | libxt_cluster.man | 22 iptables \-A PREROUTING \-t mangle \-i eth1 \-m cluster 27 iptables \-A PREROUTING \-t mangle \-i eth2 \-m cluster 32 iptables \-A PREROUTING \-t mangle \-i eth1 35 iptables \-A PREROUTING \-t mangle \-i eth2
|
D | libxt_cpu.man | 9 iptables \-t nat \-A PREROUTING \-p tcp \-\-dport 80 \-m cpu \-\-cpu 0 12 iptables \-t nat \-A PREROUTING \-p tcp \-\-dport 80 \-m cpu \-\-cpu 1
|
D | libxt_rateest.man | 80 iptables \-t mangle \-A POSTROUTING \-o eth0 \-j RATEEST \-\-rateest\-name eth0 83 iptables \-t mangle \-A POSTROUTING \-o ppp0 \-j RATEEST \-\-rateest\-name ppp0 88 iptables \-t mangle \-A balance \-m conntrack \-\-ctstate NEW \-m helper \-\-helper ftp 92 iptables \-t mangle \-A balance \-m conntrack \-\-ctstate NEW \-m helper \-\-helper ftp 96 iptables \-t mangle \-A balance \-j CONNMARK \-\-restore\-mark
|
D | libxt_connlimit.man | 24 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-above 2 \-j REJECT 27 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-upto 2 \-j ACCEPT 31 iptables \-p tcp \-\-syn \-\-dport 80 \-m connlimit \-\-connlimit\-above 16
|
D | libxt_comment.man | 6 iptables \-A INPUT \-i eth1 \-m comment \-\-comment "my local LAN"
|
D | libipt_icmp.man | 8 iptables \-p icmp \-h
|
D | libxt_TCPOPTSTRIP.man | 7 iptables with \fB\-j TCPOPTSTRIP \-h\fP.
|
D | libxt_tos.man | 11 recognized TOS names can be obtained by calling iptables with \fB\-m tos \-h\fP.
|
D | libxt_set.man | 10 iptables \-A FORWARD \-m set \-\-match\-set test src,dst
|
/external/iptables/ |
D | configure.ac | 2 AC_INIT([iptables], [1.4.11.1]) package 35 AS_HELP_STRING([--disable-ipv4], [Do not build iptables]), 114 iptables/Makefile iptables/xtables.pc 116 include/xtables.h include/iptables/internal.h])
|
D | INSTALL | 1 Installation instructions for iptables 4 iptables uses the well-known configure(autotools) infrastructure. 46 Produce additional binaries, iptables-static/ip6tables-static, 78 These have the core (iptables), -save, -restore and -xml code
|
D | Makefile.am | 6 SUBDIRS = extensions libiptc iptables subdir 26 include/xtables.h.in include/iptables/internal.h.in
|
D | INCOMPATIBILITIES | 13 After upgrading from 1.2 to 1.3, it suggest go do an iptables-save, then 14 iptables-restore to ensure your dynamic rule changes continue to work.
|
/external/iptables/tests/ |
D | options-ipv4.rules | 1 # Generated by iptables-save v1.4.10 on Mon Jan 31 03:03:38 2011 24 # Generated by iptables-save v1.4.10 on Mon Jan 31 03:03:38 2011 38 # Generated by iptables-save v1.4.10 on Mon Jan 31 03:03:38 2011
|
/external/iptables/libiptc/ |
D | libiptc.pc.in | 8 Description: iptables ruleset ADT and kernel interface
|
/external/dnsmasq/contrib/port-forward/ |
D | dnsmasq-portforward | 20 IPTABLES=/sbin/iptables
|
D | portforward | 27 # SIGHUP to dnsmasq to install new iptables entries in the kernel.
|
/external/iproute2/doc/actions/ |
D | actions-general | 33 Essentially this is now an alternative to iptables. 34 I wont go into details of my dislike for iptables at times, but 73 iptables people, a classifier can have a packet being massaged by an 83 Example syntax for iptables targets usage becomes: 84 tc filter add ..... u32 <u32 syntax> action ipt -j <iptables target syntax>
|
12