亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? usrfwhomegwrules.c

?? firewall PNE 3.3 source code, running at more than vxworks6.x version.
?? C
?? 第 1 頁 / 共 5 頁
字號:
                           1, FW_SRC_TRK_ON, 57) == ERROR)            {            printf("PRE:FLOOD2: Failed to set rate limit rule\n");            return ERROR;            }        if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_REJECT) == ERROR)            {            printf("PRE:FLOOD2: Failed to set action\n");            return ERROR;            }        }        if (pingFloodProtect == TRUE)        {            /* Rule to block ping flood */            ruleId = fwRuleCreate(groupId);        if (ruleId == NULL)            {            printf("PRE:FLOOD3: Can't create rule\n");            return ERROR;            }                  if (fwRuleFieldSet(ruleId, FW_FIELD_ICMP, ICMP_ECHO, 0)	    == ERROR)        {        printf("PRE:FLOOD3: Can't set ICMP field\n");        return ERROR;                        }                /* Rate limit per host up to 57 hosts */                      if (fwRuleFieldSet(ruleId, FW_FIELD_RATELIMIT, FW_GT_OP, pingFloodRate,                            1, FW_SRC_TRK_ON, 57) == ERROR)            {            printf("PRE:FLOOD3: Failed to set rate limit rule\n");            return ERROR;            }        if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_REJECT) == ERROR)            {            printf("PRE:FLOOD3: Failed to set action\n");            return ERROR;            }          }            return OK;                    }                                       /***************************************************************************** forwardRulesSet - Set firewall rules for forwarded packets** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS forwardRulesSet()    {    void * groupId1;    void * groupId2;    void * groupId3;        void * ruleId;    FW_SERVICE_DESC extServiceDesc;        /*     * Set the default action for ALL forwarded packets (from any     * network interface) to reject      */        if (fwRuleFilterInstall(FW_FORW_LOC, FW_REJECT, NULL, NULL, NULL, 0)        == ERROR)        {        printf("FWD: Failed to install Rule Filter!\n");        return ERROR;        }     /*     * Packets forwarded from Public network to Private network     */         /* Group for Public --> Private packets */        groupId1 = fwRuleGroupCreate(FW_FORW_LOC,                                  "Packets Forwarded from Public to Private",                                 pktLogLen);    if (groupId1 == NULL)        {        printf("FWD-PUB: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId1, FW_FIELD_NETIF,                        (UINT32) publicIfName, publicIfUnit,                       (UINT32) privateIfName, privateIfUnit) == ERROR)        {        printf("FWD-PUB: Failed to set netif\n");        return ERROR;        }        /* Rule to allow packets that are part of established connections */            ruleId = fwRuleCreate(groupId1);    if (ruleId == NULL)        {        printf("FWD-PUB: Can't create rule\n");        return ERROR;        }               if (fwRuleFieldSet(ruleId, FW_FIELD_STATE, FW_CONN_RESPONDER,                       FW_CONN_STATE_ESTABLISHED) == ERROR)        {        printf("FWD-PUB: Failed to set state\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG)         == ERROR)        {        printf("FWD-PUB: Failed to set action\n");        return ERROR;        }               /* Rule(s) to allow FTP Service on the private network */        if (inFtpsAllow == TRUE)        {        if (inFtpsAllowRulesSet(groupId1) == ERROR)            return ERROR;                }            /* Rule(s) to allow HTTP Service on the private network */        if (inHttpsAllow == TRUE)        {        if (inHttpsAllowRulesSet(groupId1) == ERROR)            return ERROR;                        }            /* Rule(s) to allow Telnet Service on the private network */        if (inTelnetsAllow == TRUE)        {        if (inTelnetsAllowRulesSet(groupId1) == ERROR)            return ERROR;                        }            /* Rule(s) to allow SMTP Service on the private network */        if (inSmtpsAllow == TRUE)        {        if (inSmtpsAllowRulesSet(groupId1) == ERROR)            return ERROR;                        }                /* Rule(s) to allow POP Service on the private network */        if (inPopsAllow == TRUE)        {        if (inPopsAllowRulesSet(groupId1) == ERROR)            return ERROR;                        }                                                /*     * Packets forwarded from Private network to Public network     */             /* Group for Private --> Public packets */        groupId2 = fwRuleGroupCreate(FW_FORW_LOC,                                  "Packets Forwarded from Private to Public",                                 pktLogLen);    if (groupId2 == NULL)        {        printf("FWD-PRI: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId2, FW_FIELD_NETIF,                        (UINT32) privateIfName, privateIfUnit,                       (UINT32) publicIfName, publicIfUnit) == ERROR)        {        printf("FWD-PRI: Failed to set netif\n");        return ERROR;        }                /* Rule to block HTTP traffic based on content */        if (httpContentFilter == TRUE)        {        if (contentFilterRulesSet(groupId2) == ERROR)            return ERROR;        }            /* Rule to accept all other packets */        ruleId = fwRuleCreate(groupId2);    if (ruleId == NULL)        {        printf("FWD-PRI: Can't create rule\n");        return ERROR;        }           if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT) == ERROR)        {        printf("FWD-PRI: Failed to set action\n");        return ERROR;        }               /*     * For FTP Client on Private Network to talk to FTP Server on Public     * Network in NORMAL (Active) mode, attach an extension handler     * to the above rule to:     *     * a) inspect payload of FTP control channel to look for PORT command     * b) get the client port of the FTP data channel     * c) create rules to allow the incoming FTP data channel connection     */    extServiceDesc.proto = IPPROTO_TCP;    extServiceDesc.srcPort = 0;    extServiceDesc.dstPort = FTPS_PORT;    if (fwExtHandlerInstall(ruleId, &extServiceDesc, fwExtFtpHandler,                             NULL, NULL) == ERROR)        {        printf("FWD-PRI: Failed to install FTP ext handler for Client\n");        return ERROR;        }    if (inFtpsAllow == TRUE)        {        /*         * For FTP Server on Private Network to talk to FTP Client on Public         * Network in Passive mode, attach an extension handler to the         * above rule to:         *         * a) inspect payload of FTP control channel to look for PASV command         * b) get the server port of the FTP data channel         * c) create rules to allow the incoming FTP data channel connection         */                                 extServiceDesc.proto = IPPROTO_TCP;        extServiceDesc.srcPort = FTPS_PORT;        extServiceDesc.dstPort = 0;        if (fwExtHandlerInstall(ruleId, &extServiceDesc, fwExtFtpHandler,                                 NULL, NULL) == ERROR)            {            printf("FWD-PRI: Failed to install FTP ext handler for Server\n");            return ERROR;            }                 }               /*     * Packets sent in response to rejected packets at Public interface.     *     * At pre-input filter location, in addition to rejecting packets you     * can also choose to send a TCP Reset or an ICMP packet in response     * to the rejected packet. These packets will go through the     * Forward filter location, and need to be allowed.     */         /* Group to allow response to rejected packets from public interface */       groupId3 = fwRuleGroupCreate(FW_FORW_LOC,                         "Response to Rejected packets from Public Interface",                         pktLogLen);    if (groupId3 == NULL)        {        printf("FWD-RESP: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId3, FW_FIELD_NETIF,                       (UINT32) publicIfName, publicIfUnit,                       (UINT32) publicIfName, publicIfUnit) == ERROR)        {        printf("FWD-RESP: Failed to set netif\n");        return ERROR;        }    if (fwRuleFieldSet(groupId3, FW_FIELD_ACTION, FW_ACCEPT) == ERROR)        {        printf("FWD-RESP: Failed to set action\n");        return ERROR;        }                        return OK;       }    /***************************************************************************** inGatewayRulesSet - Set firewall rules for packets incoming to* gateway itself** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS inGatewayRulesSet()    {    void * groupId1;    void * groupId2;    void * groupId3;        /*     * Set the default action for ALL incoming packets to Gateway      * (from any network interface) to reject      */        if (fwRuleFilterInstall(FW_IN_LOC, FW_REJECT, NULL, NULL, NULL, 0)        == ERROR)        {        printf("IN: Failed to install Rule Filter!\n");        return ERROR;        }    /* Group to allow packets ONLY if they are part of established connection */    groupId1 = fwRuleGroupCreate(FW_IN_LOC,                                  "Packets from Public to Gateway",                                  pktLogLen);    if (groupId1 == NULL)        {        printf("IN-PUB: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId1, FW_FIELD_NETIF,                        (UINT32) publicIfName, publicIfUnit, 0, 0) == ERROR)        {        printf("IN-PUB: Failed to set netif\n");        return ERROR;        }         if (fwRuleFieldSet(groupId1, FW_FIELD_STATE, FW_CONN_RESPONDER,                       FW_CONN_STATE_ESTABLISHED) == ERROR)        {        printf("IN-PUB: Failed to set state\n");        return ERROR;        }    if (fwRuleFieldSet(groupId1, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG)         == ERROR)        {        printf("IN-PUB: Failed to set action\n");        return ERROR;        }        /* Group to allow ALL packets from private network */        groupId2 = fwRuleGroupCreate(FW_IN_LOC,                                  "Packets from Private to Gateway",                                  pktLogLen);    if (groupId2 == NULL)        {        printf("IN-PRI: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId2, FW_FIELD_NETIF,                        (UINT32) privateIfName, privateIfUnit, 0, 0) == ERROR)        {        printf("IN-PRI: Failed to set netif\n");        return ERROR;        }     if (fwRuleFieldSet(groupId2, FW_FIELD_ACTION, FW_ACCEPT) == ERROR)        {        printf("IN-PRI: Failed to set action\n");        return ERROR;        }                            /* Group to allow ALL packets from Loopback interface */          groupId3 = fwRuleGroupCreate(FW_IN_LOC,                                  "Packets from Loopback Interface",                                 pktLogLen);    if (groupId3 == NULL)        {        printf("IN-LO: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId3, FW_FIELD_NETIF,                        (UINT32) loIfName, loIfUnit, 0, 0) == ERROR)        {        printf("IN-LO: Failed to set netif\n");        return ERROR;        }     if (fwRuleFieldSet(groupId3, FW_FIELD_ACTION, FW_ACCEPT) == ERROR)        {        printf("IN-LO: Failed to set action\n");        return ERROR;        }                          return OK;    }    /***************************************************************************** outRulesSet - Set firewall rules for all outgoing packets ** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS outRulesSet()    {    void * groupId;        /*     * Set the default action for ALL outgoing packets (to any     * network interface) to accept for performance      */        if (fwRuleFilterInstall(FW_OUT_LOC, FW_ACCEPT, NULL, NULL, NULL, 0)        == ERROR)        {        printf("OUT: Failed to install Rule Filter!\n");        return ERROR;        }    /*     * Group to allow ALL packets outgoing to the public network      * and keep state     */    groupId = fwRuleGroupCreate(FW_OUT_LOC,                                 "Outgoing Packets to Public Network",                                pktLogLen);    if (groupId == NULL)        {        printf("OUT-PUB: Can't create rule group\n");        return ERROR;        }    if (fwRuleFieldSet(groupId, FW_FIELD_NETIF, 0, 0,                        (UINT32) publicIfName, publicIfUnit) == ERROR)        {

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品在线观看一区二区| 美女久久久精品| 国产成人精品免费网站| 2021中文字幕一区亚洲| 久久精品国产网站| 精品国产髙清在线看国产毛片| 日本美女一区二区| 日韩一区和二区| 日韩不卡免费视频| 欧美精品一区二区三区视频| 精品无人码麻豆乱码1区2区| 精品欧美一区二区久久| 国产真实乱对白精彩久久| 久久这里只有精品视频网| 国产经典欧美精品| 亚洲日本青草视频在线怡红院| 91在线你懂得| 婷婷国产在线综合| 精品少妇一区二区三区日产乱码 | 国产精品你懂的在线| av网站一区二区三区| 亚洲福利视频三区| 精品少妇一区二区三区在线视频 | 亚洲欧美日韩国产一区二区三区| 91麻豆国产自产在线观看| 亚洲成人激情社区| 久久一留热品黄| 95精品视频在线| 另类小说图片综合网| 日本一区二区三区电影| 在线观看av不卡| 激情五月激情综合网| 亚洲三级在线免费观看| 欧美人狂配大交3d怪物一区| 国产一区二区影院| 亚洲自拍偷拍麻豆| 精品国产免费一区二区三区香蕉| 成人app网站| 麻豆精品在线看| 中文字幕亚洲视频| 精品奇米国产一区二区三区| 91香蕉视频污在线| 精品在线免费观看| 一区二区国产视频| 久久九九影视网| 欧美精品乱码久久久久久按摩 | 风流少妇一区二区| 图片区日韩欧美亚洲| 国产精品久久久久三级| 日韩欧美一区中文| 欧美中文字幕不卡| 成人激情小说乱人伦| 免费成人在线观看视频| 亚洲黄色在线视频| 日本一区免费视频| 日韩免费高清av| 在线观看一区不卡| 成人av免费在线播放| 久久精品国产99久久6| 一区二区三区中文字幕| 久久精品在这里| 欧美精品一区男女天堂| 欧美视频在线观看一区| 91小视频在线观看| 成人理论电影网| 国产精品一区二区你懂的| 日韩电影在线一区| 亚洲一区二区精品视频| 亚洲日本在线观看| 国产精品久久久久影视| 久久久久综合网| 日韩欧美国产一区二区在线播放| 欧美久久久一区| 欧美日韩美女一区二区| 欧美在线色视频| 91国偷自产一区二区三区观看| 不卡av在线网| www.一区二区| www.久久久久久久久| 成人av电影在线播放| 丁香激情综合国产| a在线欧美一区| 99久久久精品| 91蝌蚪porny| 91在线免费视频观看| 色综合久久久网| 91小视频在线免费看| 日本丶国产丶欧美色综合| 色婷婷综合五月| 欧美在线观看18| 欧美日韩高清在线播放| 欧美日韩你懂的| 欧美一二三四区在线| 日韩精品中文字幕在线一区| 精品国产凹凸成av人导航| 久久在线观看免费| 中文字幕电影一区| 最新国产の精品合集bt伙计| 有坂深雪av一区二区精品| 亚洲综合色丁香婷婷六月图片| 一级中文字幕一区二区| 亚洲国产色一区| 日本系列欧美系列| 国产乱对白刺激视频不卡| 成人高清免费观看| 91成人网在线| 欧美一激情一区二区三区| 久久一夜天堂av一区二区三区| 久久青草国产手机看片福利盒子| 中国色在线观看另类| 亚洲免费av在线| 蜜臀va亚洲va欧美va天堂 | 麻豆视频观看网址久久| 国产成人av资源| 色久优优欧美色久优优| 欧美成人一区二区三区片免费| 久久夜色精品一区| 一区二区三区四区蜜桃| 久久 天天综合| 99v久久综合狠狠综合久久| 欧美性一二三区| 国产午夜精品久久| 丝袜a∨在线一区二区三区不卡| 精品亚洲免费视频| 色婷婷av久久久久久久| 欧美刺激脚交jootjob| 中文字幕亚洲精品在线观看| 亚洲高清三级视频| 国产·精品毛片| 91精品国产福利| 亚洲视频一区二区免费在线观看| 麻豆91小视频| 欧美色欧美亚洲另类二区| 久久久久久电影| 日韩成人一区二区三区在线观看| 成人99免费视频| 久久久三级国产网站| 亚洲高清免费在线| 一本色道a无线码一区v| 久久久久久久久久看片| 日韩高清在线不卡| 色屁屁一区二区| 国产精品久久久久久福利一牛影视| 日本美女一区二区| 欧美丝袜自拍制服另类| 日韩理论片一区二区| 国产精品一区一区| 日韩一级黄色片| 午夜精品久久久| 色美美综合视频| 国产精品毛片久久久久久久| 尤物av一区二区| 国产老肥熟一区二区三区| 日韩三级免费观看| 一区二区三区中文在线| 国产一区二区伦理| 精品对白一区国产伦| 一区二区三区四区高清精品免费观看 | 一区二区三区毛片| 成人h精品动漫一区二区三区| 日韩午夜在线观看| 亚洲美女屁股眼交3| 国产精品456| 久久亚洲综合色一区二区三区| 一区二区三区在线影院| 国产成人亚洲精品狼色在线| 欧美精品高清视频| 18欧美亚洲精品| 91欧美激情一区二区三区成人| 亚洲精品一线二线三线无人区| 亚洲国产cao| 色噜噜狠狠一区二区三区果冻| 伊人婷婷欧美激情| 99久久精品国产麻豆演员表| 欧美精品一区男女天堂| 亚洲乱码国产乱码精品精小说 | 亚洲欧美日韩国产另类专区| 国产一区二区主播在线| 日韩午夜三级在线| 亚洲bdsm女犯bdsm网站| 欧美日韩国产另类不卡| 亚洲免费资源在线播放| 从欧美一区二区三区| 日韩欧美一区在线| 国产成人综合精品三级| wwwwxxxxx欧美| 国产麻豆9l精品三级站| 欧美电影免费观看高清完整版在| 精品一区二区三区的国产在线播放| 欧美日韩国产高清一区二区| 亚洲一级电影视频| 91精品1区2区| 奇米精品一区二区三区在线观看| 欧美日韩dvd在线观看| 亚洲成人你懂的| 欧美另类久久久品| 天天综合日日夜夜精品| 欧美日韩国产综合久久| 日韩中文字幕一区二区三区| 欧美一级高清片|