亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? netfilter-script.c

?? linux防火墻源代碼 需要用的人自己下載看看 程序比較簡單啊
?? C
?? 第 1 頁 / 共 3 頁
字號:
			 "			$IPT -A INPUT -p tcp ! --syn -s $server -d 0/0 -j ACCEPT\n"			 "			$IPT -A INPUT -p udp -s $server -d 0/0 -j ACCEPT\n"			 "			$IPT -A OUTPUT -p tcp -s $IP -d $server --dport 53 -j ACCEPT\n"			 "			$IPT -A OUTPUT -p udp -s $IP -d $server --dport 53 -j ACCEPT\n"			 "		fi\n"			 "	done < /etc/resolv.conf\n\n");	fprintf (script, "\n# --------( Initial Setup - Configure Kernel Parameters )--------\n\n");		fprintf (script, "source "FIRESTARTER_SYSCTL_SCRIPT"\n\n");	fprintf (script, "\n# --------( Intial Setup - User Defined Pre Script )--------\n\n");	fprintf (script, "source "FIRESTARTER_USER_PRE_SCRIPT"\n\n");   fprintf (script, "\n# --------( Rules Configuration - Specific Rule - Loopback Interfaces )--------\n\n");	fprintf (script, "# Allow all traffic on the loopback interface\n");	fprintf (script, "$IPT -A INPUT -i lo -s 0/0 -d 0/0 -j ACCEPT\n");	fprintf (script, "$IPT -A OUTPUT -o lo -s 0/0 -d 0/0 -j ACCEPT\n\n");   fprintf (script, "\n# --------( Rules Configuration - Type of Service (ToS) - Ruleset Filtered by GUI )--------\n\n");	fprintf (script, "if [ \"$FILTER_TOS\" = \"on\" ]; then\n");	fprintf (script, "	if [ \"$TOS_CLIENT\" = \"on\" -a $mangle_supported ]; then\n"			 "		# ToS: Client Applications\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 20:21 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 68 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 80 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 443 --set-tos $TOSOPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$TOS_SERVER\" = \"on\" -a $mangle_supported ]; then\n"			 "		# ToS: Server Applications\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 20:21 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 25 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 53 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 67 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 80 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 110 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 143 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 443 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 1812 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 1813 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 2401 --set-tos $TOSOPT\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 8080 --set-tos $TOSOPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$TOS_SERVER\" = \"on\" -a $mangle_supported ]; then\n"			 "		# ToS: The X Window System\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 22 --set-tos 0x10\n"			 "		$IPT -t mangle -A OUTPUT -p tcp -j TOS --dport 6000:6015 --set-tos 0x08\n"			 "	fi\n");	fprintf (script, "fi\n\n");        fprintf (script, "\n# --------( Rules Configuration - ICMP )--------\n\n");        fprintf (script, "if [ \"$FILTER_ICMP\" = \"on\" ]; then\n");	fprintf (script, "	if [ \"$ICMP_ECHO_REQUEST\" = \"on\" ]; then\n"	                 "		# ICMP: Ping Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/s -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type echo-request -m limit --limit 1/s -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_ECHO_REPLY\" = \"on\" ]; then\n"	                 "		# ICMP: Ping Replies\n"	                 "		$IPT -A INPUT -p icmp --icmp-type echo-reply -m limit --limit 1/s -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type echo-reply -m limit --limit 1/s -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_TRACEROUTE\" = \"on\" ]; then\n"	                 "		# ICMP: Traceroute Requests\n"	                 "		$IPT -A INPUT -p udp --dport 33434 -j ACCEPT\n"	                 "		$IPT -A FORWARD -p udp --dport 33434 -j ACCEPT\n"	                 "	else\n"			 "		$IPT -A INPUT -p udp --dport 33434 -j LSI\n"			 "		$IPT -A FORWARD -p udp --dport 33434 -j LSI\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_MSTRACEROUTE\" = \"on\" ]; then\n"	                 "		# ICMP: MS Traceroute Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type destination-unreachable -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type destination-unreachable -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_UNREACHABLE\" = \"on\" ]; then\n"	                 "		# ICMP: Unreachable Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type host-unreachable -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type host-unreachable -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_TIMESTAMPING\" = \"on\" ]; then\n"	                 "		# ICMP: Timestamping Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type timestamp-request -j ACCEPT\n"	                 "		$IPT -A INPUT -p icmp --icmp-type timestamp-reply -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_MASKING\" = \"on\" ]; then\n"	                 "		# ICMP: Address Masking\n"	                 "		$IPT -A INPUT -p icmp --icmp-type address-mask-request -j ACCEPT\n"	                 "		$IPT -A INPUT -p icmp --icmp-type address-mask-reply -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type address-mask-request -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type address-mask-reply -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_REDIRECTION\" = \"on\" ]; then\n"	                 "		# ICMP: Redirection Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type redirect -m limit --limit 2/s -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type redirect -m limit --limit 2/s -j ACCEPT\n"			 "	fi\n");	fprintf (script, "	if [ \"$ICMP_SOURCE_QUENCHES\" = \"on\" ]; then\n"	                 "		# ICMP: Source Quench Requests\n"	                 "		$IPT -A INPUT -p icmp --icmp-type source-quench -m limit --limit 2/s -j ACCEPT\n"	                 "		$IPT -A FORWARD -p icmp --icmp-type source-quench -m limit --limit 2/s -j ACCEPT\n"			 "	fi\n\n");	fprintf (script, "	# Catch ICMP traffic not allowed above\n"			 "	$IPT -A INPUT -p icmp -j LSI\n"			 "	$IPT -A FORWARD -p icmp -j LSI\n");	fprintf (script, "else\n"	                 "	# Allow all ICMP traffic when filtering disabled\n"	                 "	$IPT -A INPUT -p icmp -m limit --limit 10/s -j ACCEPT\n"	                 "	$IPT -A FORWARD -p icmp -m limit --limit 10/s -j ACCEPT\n"			 "fi\n\n");	fprintf (script, "if [ \"$NAT\" = \"on\" ]; then\n"			 "	# --------( Rules Configuration - Masquerading - Sysctl Modifications )--------\n\n");   	fprintf (script, "	#Turn on IP forwarding\n");	fprintf (script, "	if [ -e /proc/sys/net/ipv4/ip_forward ]; then\n"	                 "		echo 1 > /proc/sys/net/ipv4/ip_forward\n"			 "	fi\n\n");	fprintf (script, "	# --------( Rules Configuration - Masquerading - Default Ruleset )--------\n\n");      			fprintf (script, "	#TCPMSS Fix - Needed for *many* broken PPPO{A/E} clients\n"	                 "	$IPT -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu\n\n");	fprintf (script, "	if [ \"$stripoptions_supported\" -a \"$mangle_supported\" ]; then\n"	                 "		#IPv4OPTIONS Fix - Strip IP options from a forwarded packet\n"	                 "		$IPT -t mangle -A PREROUTING -j IPV4OPTSSTRIP\n"	                 "	fi\n\n");	fprintf (script, "	# --------( Rules Configuration - Forwarded Traffic )--------\n\n");	fprintf (script, "	if [ \"$nat_supported\" ]; then\n"	                 "		#Masquerade outgoing traffic\n"	                 "		$IPT -t nat -A POSTROUTING -o $IF -j MASQUERADE\n"	                 "	fi\n\n");	fprintf (script, "	# Temoporarily set the field separator for CSV format\n"	                 "	OLDIFS=$IFS\n"	                 "	IFS=','\n\n");	fprintf (script, "	# Services forward from the firewall to the internal network\n"	                 "	while read service ext_port host int_port garbage\n"	                 "		do\n"			 "			scrub_parameters\n"	                 "			$IPT -A FORWARD -i $IF -p tcp -d $host --dport $int_port -j ACCEPT\n"	                 "			$IPT -A FORWARD -i $IF -p udp -d $host --dport $int_port -j ACCEPT\n"	                 "			$IPT -A PREROUTING -t nat -i $IF -p tcp --dport $ext_port -j DNAT --to-destination $host:$int_port_dashed\n"	                 "			$IPT -A PREROUTING -t nat -i $IF -p udp --dport $ext_port -j DNAT --to-destination $host:$int_port_dashed\n"	                 "		done < "POLICY_IN_FORWARD"\n\n");	fprintf (script, "	IFS=$OLDIFS\n\n");	fprintf (script, "fi\n\n");   fprintf (script, "\n# --------( Rules Configuration - Inbound Traffic )--------\n\n");	fprintf (script, "if [ \"$BLOCK_NON_ROUTABLES\" = \"on\" ]; then\n"	                 "	# Block traffic from non-routable address space on the public interfaces\n"	                 "	$IPT -N NR 2> /dev/null\n"			 "	$IPT -F NR\n"	                 "	while read block garbage\n"			 "		do\n"	                 "			$IPT -A NR -s $block -d $NET -i $IF -j LSI\n"	                 "		done < "FIRESTARTER_NON_ROUTABLES_SCRIPT"\n"	                 "	$IPT -A INPUT -s ! $NET -i $IF -j NR\n"			 "fi\n\n");	fprintf (script, "# Block Broadcast Traffic\n"	                 "if [ \"$BLOCK_EXTERNAL_BROADCAST\" = \"on\" ]; then\n"	                 "	$IPT -A INPUT -i $IF -d 255.255.255.255 -j DROP\n"			 "	if [ \"$BCAST\" != \"\" ]; then\n"	                 "		$IPT -A INPUT -d $BCAST -j DROP\n"			 "	fi\n"			 "fi\n\n");	fprintf (script, "if [ \"$NAT\" = \"on\" -a \"$BLOCK_INTERNAL_BROADCAST\" = \"on\" ]; then\n"	                 "	$IPT -A INPUT -i $INIF -d 255.255.255.255 -j DROP\n"			 "	if [ \"$INBCAST\" != \"\" ]; then\n"	                 "		$IPT -A INPUT -i $INIF -d $INBCAST -j DROP\n"			 "	fi\n"			 "fi\n\n");	fprintf (script, "# Block Multicast Traffic\n"	                 "#  Some cable/DSL providers require their clients to accept multicast transmissions\n"	                 "#  you should remove the following four rules if you are affected by multicasting\n"	                 "$IPT -A INPUT -s 224.0.0.0/8 -d 0/0 -j DROP\n"	                 "$IPT -A INPUT -s 0/0 -d 224.0.0.0/8 -j DROP\n"	                 "$IPT -A OUTPUT -s 224.0.0.0/8 -d 0/0 -j DROP\n"	                 "$IPT -A OUTPUT -s 0/0 -d 224.0.0.0/8 -j DROP\n\n");	fprintf (script, "# Block Traffic with Stuffed Routing\n"                         "#  Early versions of PUMP - (the DHCP client application included in RH / Mandrake) require\n"                         "#  inbound packets to be accepted from a source address of 255.255.255.255.  If you have issues\n"                         "#  with DHCP clients on your local LAN - either update PUMP, or remove the first rule below)\n"	                 "$IPT -A INPUT -s 255.255.255.255 -j DROP\n"	                 "$IPT -A INPUT -d 0.0.0.0 -j DROP\n"	                 "$IPT -A OUTPUT -s 255.255.255.255 -j DROP\n"	                 "$IPT -A OUTPUT -d 0.0.0.0 -j DROP\n\n");	fprintf (script, "$IPT -A INPUT -m state --state INVALID -j DROP # Block Traffic with Invalid Flags\n");	fprintf (script, "$IPT -A INPUT -f -m limit --limit 10/minute -j LSI # Block Traffic w/ Excessive Fragmented Packets\n");   fprintf (script, "\n# --------( Rules Configuration - Outbound Traffic )--------\n\n");	fprintf (script, "$IPT -A OUTPUT -m state --state INVALID -j DROP # Block Traffic w/ Invalid Flags\n\n");   fprintf (script, "\n# --------( Traffic Policy )--------\n\n");	fprintf (script, "# Load the inbound traffic policy\n");	fprintf (script, "source "FIRESTARTER_INBOUND_SETUP"\n"	                 "$IPT -A INPUT -i $IF -j INBOUND # Check Internet to firewall traffic\n"	                 "if [ \"$NAT\" = \"on\" ]; then\n"	                 "	$IPT -A INPUT -i $INIF -d $INIP -j INBOUND # Check LAN to firewall (private ip) traffic\n"	                 "	$IPT -A INPUT -i $INIF -d $IP -j INBOUND   # Check LAN to firewall (public ip) traffic\n"			 "	if [ \"$INBCAST\" != \"\" ]; then\n"			 "		$IPT -A INPUT -i $INIF -d $INBCAST -j INBOUND # Check LAN to firewall broadcast traffic\n"			 "	fi\n"	                 "fi\n\n");	fprintf (script, "# Load the outbound traffic policy\n");	fprintf (script, "source "FIRESTARTER_OUTBOUND_SETUP"\n"	                 "$IPT -A OUTPUT -o $IF -j OUTBOUND # Check firewall to Internet traffic\n"	                 "if [ \"$NAT\" = \"on\" ]; then\n"	                 "	$IPT -A OUTPUT -o $INIF -j OUTBOUND  # Check firewall to LAN traffic\n"	                 "	$IPT -A FORWARD -i $INIF -j OUTBOUND # Check LAN to Internet traffic\n\n"	                 "	# Allow Internet to LAN response traffic\n"	                 "	$IPT -A FORWARD -p tcp -d $INNET -m state --state ESTABLISHED,RELATED -j ACCEPT\n"	                 "	$IPT -A FORWARD -p udp -d $INNET -m state --state ESTABLISHED,RELATED -j ACCEPT\n"			 "fi\n");	fprintf (script, "\n# --------( User Defined Post Script )--------\n\n");	fprintf (script, "source "FIRESTARTER_USER_POST_SCRIPT"\n\n");	fprintf (script, "\n# --------( Unsupported Traffic Catch-All )--------\n\n"			 "$IPT -A INPUT -j LOG_FILTER\n"			 "$IPT -A INPUT -j LOG --log-level=$LOG_LEVEL --log-prefix \"Unknown Input\"\n"			 "$IPT -A OUTPUT -j LOG_FILTER\n"			 "$IPT -A OUTPUT -j LOG --log-level=$LOG_LEVEL --log-prefix \"Unknown Output\"\n"			 "$IPT -A FORWARD -j LOG_FILTER\n"			 "$IPT -A FORWARD -j LOG --log-level=$LOG_LEVEL --log-prefix \"Unknown Forward\"\n\n");	fprintf (script, "return 0\n");	fclose (script);	g_print (_("Firewall script saved as %s\n"), scriptpath);}

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美亚洲综合在线| 亚洲欧洲精品一区二区精品久久久| 精品区一区二区| 精品国产电影一区二区| 国产精品的网站| 日本不卡一区二区| av电影在线观看完整版一区二区| 欧美日韩国产一二三| 中文字幕中文字幕一区二区 | 欧美日韩一卡二卡三卡| 久久久另类综合| 偷窥少妇高潮呻吟av久久免费| 精品一区二区在线看| 91福利视频网站| 久久蜜桃一区二区| 奇米影视7777精品一区二区| 色播五月激情综合网| 久久综合久久久久88| 日本亚洲欧美天堂免费| 欧美体内she精视频| 亚洲人成电影网站色mp4| 成人精品国产一区二区4080| 久久精品视频在线免费观看| 久久99国产精品麻豆| 在线播放欧美女士性生活| 一区二区三区精品在线| 99久久er热在这里只有精品15| 国产午夜一区二区三区| 久久精品国产99国产| 制服.丝袜.亚洲.中文.综合| 亚洲码国产岛国毛片在线| 99re66热这里只有精品3直播| 日本一区二区在线不卡| 国产电影一区在线| 久久久久久免费毛片精品| 国精品**一区二区三区在线蜜桃| 欧美一区二区福利视频| 日日夜夜精品免费视频| 欧美日韩一级黄| 青青草精品视频| 精品国产91九色蝌蚪| 国产在线精品一区二区不卡了 | 国产精品888| 国产日韩欧美制服另类| 丁香天五香天堂综合| 国产精品毛片久久久久久久| 成人理论电影网| 亚洲日本va午夜在线影院| 色999日韩国产欧美一区二区| 亚洲蜜臀av乱码久久精品蜜桃| 日本韩国精品在线| 婷婷久久综合九色综合绿巨人 | 欧美午夜一区二区三区免费大片| 亚洲最大成人网4388xx| 777xxx欧美| 国产成人综合网站| 亚洲另类一区二区| 日韩无一区二区| 国产一区亚洲一区| 亚洲男人天堂av| 欧美xxx久久| 99精品黄色片免费大全| 日韩影视精彩在线| 久久久精品tv| 欧美午夜精品一区二区蜜桃| 精品一区二区三区免费| 中文字幕视频一区| 51精品国自产在线| 高清国产一区二区三区| 亚洲韩国精品一区| 精品国产伦一区二区三区观看方式 | 成人中文字幕合集| 亚洲国产精品久久艾草纯爱| 2023国产一二三区日本精品2022| av电影在线观看一区| 免费在线看一区| 亚洲狼人国产精品| 26uuuu精品一区二区| 色综合久久中文综合久久97| 久久精品国产亚洲高清剧情介绍| 1000部国产精品成人观看| 欧美刺激午夜性久久久久久久| 99久久伊人精品| 久久66热re国产| 一区二区三区四区五区视频在线观看 | 久久97超碰色| 午夜私人影院久久久久| 国产精品二三区| 26uuu精品一区二区在线观看| 精品污污网站免费看| 成人深夜福利app| 精品伊人久久久久7777人| 亚洲成人免费在线观看| 中文字幕佐山爱一区二区免费| 日韩欧美国产一二三区| 欧美最新大片在线看| 丁香婷婷综合网| 国产福利电影一区二区三区| 免费久久99精品国产| 亚洲午夜免费电影| 亚洲欧洲韩国日本视频| 国产日韩欧美不卡在线| 8v天堂国产在线一区二区| 色国产精品一区在线观看| 成人永久看片免费视频天堂| 国精品**一区二区三区在线蜜桃| 日本成人在线视频网站| 亚洲第一成人在线| 亚洲女厕所小便bbb| 日韩理论片在线| 成人欧美一区二区三区小说 | 国产欧美日韩麻豆91| 精品国产乱码久久久久久老虎 | 欧美日韩一级片在线观看| 在线一区二区三区四区| 99精品一区二区| 成人高清免费观看| 99精品视频在线观看| 97久久精品人人澡人人爽| 91伊人久久大香线蕉| 日本精品一级二级| 色视频一区二区| 欧美少妇一区二区| 欧美久久一二三四区| 8x8x8国产精品| 欧美tickle裸体挠脚心vk| 日韩精品一区二区三区在线播放| 欧美电影免费观看完整版| 日韩精品在线一区| 久久久久久黄色| 国产精品高清亚洲| 一级中文字幕一区二区| 亚洲va天堂va国产va久| 人人爽香蕉精品| 国产一区二区精品久久| 成人一区在线观看| 欧美性猛片aaaaaaa做受| 欧美一区二区三区啪啪| 久久久久久久电影| 亚洲四区在线观看| 午夜国产精品一区| 激情欧美日韩一区二区| 99综合电影在线视频| 欧美日韩成人在线| 久久久久国产免费免费| 亚洲精品高清在线观看| 另类小说图片综合网| 成人国产亚洲欧美成人综合网| 一本一本大道香蕉久在线精品 | 色狠狠综合天天综合综合| 4438x亚洲最大成人网| 日本一区二区视频在线观看| 亚洲国产精品影院| 韩国av一区二区三区在线观看| 99久久精品99国产精品| 91精品国产综合久久精品app| 久久久不卡影院| 亚洲自拍偷拍图区| 国产一区不卡视频| 91黄色小视频| 久久综合精品国产一区二区三区| 亚洲色大成网站www久久九九| 免费一级欧美片在线观看| 91麻豆国产在线观看| 欧美xxxxxxxxx| 亚洲国产一区视频| av午夜一区麻豆| 欧美不卡123| 婷婷中文字幕综合| 色一情一伦一子一伦一区| 久久久久88色偷偷免费| 天天色综合天天| www.在线欧美| 久久午夜羞羞影院免费观看| 婷婷成人综合网| 色成年激情久久综合| 国产精品嫩草影院av蜜臀| 免费成人av资源网| 欧洲亚洲精品在线| 国产精品传媒视频| 国产在线精品视频| 精品久久人人做人人爱| 亚洲成av人片一区二区三区| 色综合久久天天| 中文天堂在线一区| 国产成人精品免费网站| 欧美成人性福生活免费看| 日韩av一二三| 欧美美女直播网站| 亚洲综合999| 色综合天天综合网天天狠天天| 精品国产制服丝袜高跟| 美腿丝袜一区二区三区| 777奇米成人网| 亚洲成人动漫在线免费观看| 在线观看网站黄不卡| 亚洲人xxxx| 91高清视频免费看| 亚洲精品国产a| 欧美视频一区二区三区四区|