mirror of https://github.com/aredn/aredn.git
Fix issue where firewall.user does not get copied into place AND clean up firewall.user files
This commit is contained in:
parent
09769d0717
commit
c59a9e6101
|
@ -1,30 +1,4 @@
|
||||||
#!/bin/sh
|
# This file is interpreted as shell script.
|
||||||
# Copyright (C) 2006 OpenWrt.org
|
# Put your custom iptables rules here, they will
|
||||||
|
# be executed with each firewall (re-)start.
|
||||||
|
|
||||||
iptables -F input_rule
|
|
||||||
iptables -F output_rule
|
|
||||||
iptables -F forwarding_rule
|
|
||||||
iptables -t nat -F prerouting_rule
|
|
||||||
iptables -t nat -F postrouting_rule
|
|
||||||
|
|
||||||
# The following chains are for traffic directed at the IP of the
|
|
||||||
# WAN interface
|
|
||||||
|
|
||||||
iptables -F input_wan
|
|
||||||
iptables -F forwarding_wan
|
|
||||||
iptables -t nat -F prerouting_wan
|
|
||||||
|
|
||||||
### Open port to WAN
|
|
||||||
## -- This allows port 22 to be answered by (dropbear on) the router
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
### Port forwarding
|
|
||||||
## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
|
|
||||||
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
||||||
### DMZ
|
|
||||||
## -- Connections to ports not handled above will be forwarded to 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
|
|
||||||
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
|
@ -1,30 +1,4 @@
|
||||||
#!/bin/sh
|
# This file is interpreted as shell script.
|
||||||
# Copyright (C) 2006 OpenWrt.org
|
# Put your custom iptables rules here, they will
|
||||||
|
# be executed with each firewall (re-)start.
|
||||||
|
|
||||||
iptables -F input_rule
|
|
||||||
iptables -F output_rule
|
|
||||||
iptables -F forwarding_rule
|
|
||||||
iptables -t nat -F prerouting_rule
|
|
||||||
iptables -t nat -F postrouting_rule
|
|
||||||
|
|
||||||
# The following chains are for traffic directed at the IP of the
|
|
||||||
# WAN interface
|
|
||||||
|
|
||||||
iptables -F input_wan
|
|
||||||
iptables -F forwarding_wan
|
|
||||||
iptables -t nat -F prerouting_wan
|
|
||||||
|
|
||||||
### Open port to WAN
|
|
||||||
## -- This allows port 22 to be answered by (dropbear on) the router
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
### Port forwarding
|
|
||||||
## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
|
|
||||||
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
||||||
### DMZ
|
|
||||||
## -- Connections to ports not handled above will be forwarded to 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
|
|
||||||
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
|
@ -1,30 +1,4 @@
|
||||||
#!/bin/sh
|
# This file is interpreted as shell script.
|
||||||
# Copyright (C) 2006 OpenWrt.org
|
# Put your custom iptables rules here, they will
|
||||||
|
# be executed with each firewall (re-)start.
|
||||||
|
|
||||||
iptables -F input_rule
|
|
||||||
iptables -F output_rule
|
|
||||||
iptables -F forwarding_rule
|
|
||||||
iptables -t nat -F prerouting_rule
|
|
||||||
iptables -t nat -F postrouting_rule
|
|
||||||
|
|
||||||
# The following chains are for traffic directed at the IP of the
|
|
||||||
# WAN interface
|
|
||||||
|
|
||||||
iptables -F input_wan
|
|
||||||
iptables -F forwarding_wan
|
|
||||||
iptables -t nat -F prerouting_wan
|
|
||||||
|
|
||||||
### Open port to WAN
|
|
||||||
## -- This allows port 22 to be answered by (dropbear on) the router
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
### Port forwarding
|
|
||||||
## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
|
|
||||||
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
||||||
### DMZ
|
|
||||||
## -- Connections to ports not handled above will be forwarded to 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
|
|
||||||
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
|
@ -1,30 +1,4 @@
|
||||||
#!/bin/sh
|
# This file is interpreted as shell script.
|
||||||
# Copyright (C) 2006 OpenWrt.org
|
# Put your custom iptables rules here, they will
|
||||||
|
# be executed with each firewall (re-)start.
|
||||||
|
|
||||||
iptables -F input_rule
|
|
||||||
iptables -F output_rule
|
|
||||||
iptables -F forwarding_rule
|
|
||||||
iptables -t nat -F prerouting_rule
|
|
||||||
iptables -t nat -F postrouting_rule
|
|
||||||
|
|
||||||
# The following chains are for traffic directed at the IP of the
|
|
||||||
# WAN interface
|
|
||||||
|
|
||||||
iptables -F input_wan
|
|
||||||
iptables -F forwarding_wan
|
|
||||||
iptables -t nat -F prerouting_wan
|
|
||||||
|
|
||||||
### Open port to WAN
|
|
||||||
## -- This allows port 22 to be answered by (dropbear on) the router
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
### Port forwarding
|
|
||||||
## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
|
|
||||||
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
||||||
### DMZ
|
|
||||||
## -- Connections to ports not handled above will be forwarded to 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
|
|
||||||
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
|
@ -1,30 +1,4 @@
|
||||||
#!/bin/sh
|
# This file is interpreted as shell script.
|
||||||
# Copyright (C) 2006 OpenWrt.org
|
# Put your custom iptables rules here, they will
|
||||||
|
# be executed with each firewall (re-)start.
|
||||||
|
|
||||||
iptables -F input_rule
|
|
||||||
iptables -F output_rule
|
|
||||||
iptables -F forwarding_rule
|
|
||||||
iptables -t nat -F prerouting_rule
|
|
||||||
iptables -t nat -F postrouting_rule
|
|
||||||
|
|
||||||
# The following chains are for traffic directed at the IP of the
|
|
||||||
# WAN interface
|
|
||||||
|
|
||||||
iptables -F input_wan
|
|
||||||
iptables -F forwarding_wan
|
|
||||||
iptables -t nat -F prerouting_wan
|
|
||||||
|
|
||||||
### Open port to WAN
|
|
||||||
## -- This allows port 22 to be answered by (dropbear on) the router
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
# iptables -A input_wan -p tcp --dport 22 -j ACCEPT
|
|
||||||
|
|
||||||
### Port forwarding
|
|
||||||
## -- This forwards port 8080 on the WAN to port 80 on 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -p tcp --dport 8080 -j DNAT --to 192.168.1.2:80
|
|
||||||
# iptables -A forwarding_wan -p tcp --dport 80 -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
||||||
### DMZ
|
|
||||||
## -- Connections to ports not handled above will be forwarded to 192.168.1.2
|
|
||||||
# iptables -t nat -A prerouting_wan -j DNAT --to 192.168.1.2
|
|
||||||
# iptables -A forwarding_wan -d 192.168.1.2 -j ACCEPT
|
|
||||||
|
|
|
@ -199,6 +199,7 @@ if($do_basic)
|
||||||
system "rm -f /etc/config/*";
|
system "rm -f /etc/config/*";
|
||||||
system "mv /tmp/new_config/* /etc/config";
|
system "mv /tmp/new_config/* /etc/config";
|
||||||
unlink "/tmp/new_config";
|
unlink "/tmp/new_config";
|
||||||
|
system "cp -f /etc/config.$config/firewall.user /etc/";
|
||||||
|
|
||||||
#system "nvram set config=$config";
|
#system "nvram set config=$config";
|
||||||
#system "nvram set node=$node";
|
#system "nvram set node=$node";
|
||||||
|
|
Loading…
Reference in New Issue