diff options
author | Guido van Rooij <guido@FreeBSD.org> | 2005-12-30 11:34:54 +0000 |
---|---|---|
committer | Guido van Rooij <guido@FreeBSD.org> | 2005-12-30 11:34:54 +0000 |
commit | e246b3be6fb350a2d317fb6a37b61764c7d3a70e (patch) | |
tree | 92e5e7f4a485051a94f584190e946730b901c425 /contrib/ipfilter/rules | |
parent | 984f8800d4a60bed43ae201a53ba5e0bf5c6b745 (diff) | |
download | src-e246b3be6fb350a2d317fb6a37b61764c7d3a70e.tar.gz src-e246b3be6fb350a2d317fb6a37b61764c7d3a70e.zip |
Import IP Filter 4.1.10
Notes
Notes:
svn path=/vendor/ipfilter/dist/; revision=153877
Diffstat (limited to 'contrib/ipfilter/rules')
-rw-r--r-- | contrib/ipfilter/rules/example.1 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.10 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.11 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.12 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.13 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.2 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.3 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.4 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.5 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.6 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.7 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.8 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.9 | 1 | ||||
-rw-r--r-- | contrib/ipfilter/rules/example.sr | 1 |
14 files changed, 0 insertions, 14 deletions
diff --git a/contrib/ipfilter/rules/example.1 b/contrib/ipfilter/rules/example.1 index 3da9f3ccab5c..ff93f492cafe 100644 --- a/contrib/ipfilter/rules/example.1 +++ b/contrib/ipfilter/rules/example.1 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all incoming TCP packets on le0 from host 10.1.1.1 to any destination. # diff --git a/contrib/ipfilter/rules/example.10 b/contrib/ipfilter/rules/example.10 index f7a0b011e144..560d1e670f61 100644 --- a/contrib/ipfilter/rules/example.10 +++ b/contrib/ipfilter/rules/example.10 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # pass ack packets (ie established connection) # diff --git a/contrib/ipfilter/rules/example.11 b/contrib/ipfilter/rules/example.11 index 1cefa9a3b35d..c6b4e7ff0d73 100644 --- a/contrib/ipfilter/rules/example.11 +++ b/contrib/ipfilter/rules/example.11 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # allow any TCP packets from the same subnet as foo is on through to host # 10.1.1.2 if they are destined for port 6667. diff --git a/contrib/ipfilter/rules/example.12 b/contrib/ipfilter/rules/example.12 index 6dbaef58c561..c0ba1d3cdda1 100644 --- a/contrib/ipfilter/rules/example.12 +++ b/contrib/ipfilter/rules/example.12 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # get rid of all short IP fragments (too small for valid comparison) # diff --git a/contrib/ipfilter/rules/example.13 b/contrib/ipfilter/rules/example.13 index ca741148931e..854f07f1694f 100644 --- a/contrib/ipfilter/rules/example.13 +++ b/contrib/ipfilter/rules/example.13 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # Log all short TCP packets to qe3, with 10.3.3.3 as the intended # destination for the packet. diff --git a/contrib/ipfilter/rules/example.2 b/contrib/ipfilter/rules/example.2 index 81e7d25c7c71..4f81725eeb0c 100644 --- a/contrib/ipfilter/rules/example.2 +++ b/contrib/ipfilter/rules/example.2 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all outgoing TCP packets on le0 from any host to port 23 of # host 10.1.1.2 diff --git a/contrib/ipfilter/rules/example.3 b/contrib/ipfilter/rules/example.3 index c5b4344f91ce..cd31f73e7c2b 100644 --- a/contrib/ipfilter/rules/example.3 +++ b/contrib/ipfilter/rules/example.3 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all inbound packets. # diff --git a/contrib/ipfilter/rules/example.4 b/contrib/ipfilter/rules/example.4 index f18dcdd0cd27..7918ec2fbd99 100644 --- a/contrib/ipfilter/rules/example.4 +++ b/contrib/ipfilter/rules/example.4 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all ICMP packets. # diff --git a/contrib/ipfilter/rules/example.5 b/contrib/ipfilter/rules/example.5 index 959dfb836371..6d688b5eab80 100644 --- a/contrib/ipfilter/rules/example.5 +++ b/contrib/ipfilter/rules/example.5 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # test ruleset # diff --git a/contrib/ipfilter/rules/example.6 b/contrib/ipfilter/rules/example.6 index e9ce23ac27e6..d40f0f3d2a18 100644 --- a/contrib/ipfilter/rules/example.6 +++ b/contrib/ipfilter/rules/example.6 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all TCP packets with only the SYN flag set (this is the first # packet sent to establish a connection) out of the SYN-ACK pair. diff --git a/contrib/ipfilter/rules/example.7 b/contrib/ipfilter/rules/example.7 index 0ddd7f77628b..062de9811935 100644 --- a/contrib/ipfilter/rules/example.7 +++ b/contrib/ipfilter/rules/example.7 @@ -1,4 +1,3 @@ -# $FreeBSD$ # block all ICMP packets. # block in proto icmp all diff --git a/contrib/ipfilter/rules/example.8 b/contrib/ipfilter/rules/example.8 index 2276b525b17d..baa02581256e 100644 --- a/contrib/ipfilter/rules/example.8 +++ b/contrib/ipfilter/rules/example.8 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # block all incoming TCP connections but send back a TCP-RST for ones to # the ident port diff --git a/contrib/ipfilter/rules/example.9 b/contrib/ipfilter/rules/example.9 index 50bb46a672d8..daff2031db8e 100644 --- a/contrib/ipfilter/rules/example.9 +++ b/contrib/ipfilter/rules/example.9 @@ -1,4 +1,3 @@ -# $FreeBSD$ # # drop all packets without IP security options # diff --git a/contrib/ipfilter/rules/example.sr b/contrib/ipfilter/rules/example.sr index 46fb6f14aaf6..c4c1994030ba 100644 --- a/contrib/ipfilter/rules/example.sr +++ b/contrib/ipfilter/rules/example.sr @@ -1,4 +1,3 @@ -# $FreeBSD$ # # log all inbound packet on le0 which has IP options present # |