Current Path : /etc/rc.d/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //etc/rc.d/ipfw |
#!/bin/sh # # $FreeBSD: release/9.1.0/etc/rc.d/ipfw 220153 2011-03-30 01:19:00Z emaste $ # # PROVIDE: ipfw # REQUIRE: ppp # KEYWORD: nojail . /etc/rc.subr . /etc/network.subr name="ipfw" rcvar="firewall_enable" start_cmd="ipfw_start" start_precmd="ipfw_prestart" start_postcmd="ipfw_poststart" stop_cmd="ipfw_stop" required_modules="ipfw" set_rcvar_obsolete ipv6_firewall_enable ipfw_prestart() { if checkyesno dummynet_enable; then required_modules="$required_modules dummynet" fi if checkyesno firewall_nat_enable; then if ! checkyesno natd_enable; then required_modules="$required_modules ipfw_nat" fi fi } ipfw_start() { local _firewall_type _firewall_type=$1 # set the firewall rules script if none was specified [ -z "${firewall_script}" ] && firewall_script=/etc/rc.firewall if [ -r "${firewall_script}" ]; then /bin/sh "${firewall_script}" "${_firewall_type}" echo 'Firewall rules loaded.' elif [ "`ipfw list 65535`" = "65535 deny ip from any to any" ]; then echo 'Warning: kernel has firewall functionality, but' \ ' firewall rules are not enabled.' echo ' All ip services are disabled.' fi # Firewall logging # if checkyesno firewall_logging; then echo 'Firewall logging enabled.' sysctl net.inet.ip.fw.verbose=1 >/dev/null fi } ipfw_poststart() { local _coscript # Start firewall coscripts # for _coscript in ${firewall_coscripts} ; do if [ -f "${_coscript}" ]; then ${_coscript} quietstart fi done # Enable the firewall # if ! ${SYSCTL} net.inet.ip.fw.enable=1 1>/dev/null 2>&1; then warn "failed to enable IPv4 firewall" fi if afexists inet6; then if ! ${SYSCTL} net.inet6.ip6.fw.enable=1 1>/dev/null 2>&1 then warn "failed to enable IPv6 firewall" fi fi } ipfw_stop() { local _coscript # Disable the firewall # ${SYSCTL} net.inet.ip.fw.enable=0 if afexists inet6; then ${SYSCTL} net.inet6.ip6.fw.enable=0 fi # Stop firewall coscripts # for _coscript in `reverse_list ${firewall_coscripts}` ; do if [ -f "${_coscript}" ]; then ${_coscript} quietstop fi done } load_rc_config $name firewall_coscripts="/etc/rc.d/natd ${firewall_coscripts}" run_rc_command $*