亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? usrfwhomegwrules.c

?? firewall PNE 3.3 source code, running at more than vxworks6.x version.
?? C
?? 第 1 頁 / 共 5 頁
字號:
        printf("OUT-PUB: Failed to set netif\n");        return ERROR;        }    if (fwRuleFieldSet(groupId, FW_FIELD_STATE, FW_CONN_INITIATOR,                       FW_CONN_STATE_ALL) == ERROR)        {        printf("OUT-PUB: Failed to set state\n");        return ERROR;        }    if (fwRuleFieldSet(groupId, FW_FIELD_ACTION, FW_ACCEPT) == ERROR)        {        printf("OUT-PUB: Failed to set action\n");        return ERROR;        }                   return OK;    }/***************************************************************************** contentFilterRulesSet - Set rule to block HTTP traffic based on content** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS contentFilterRulesSet    (    void * groupId    )    {    void * ruleId;    static void * svcHdl;    static void * pUrlDesc;        char ** pUrls = (char **) urlBlockList;    char ** pKeywords = (char **) keywordsInUrlBlockList;            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("WEB: Can't create rule\n");        return ERROR;        }            /* Create a firewall rule to intercept the outbound HTTP traffic. */        if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0, HTTPS_PORT, HTTPS_PORT,                        0, 0, 0) == ERROR)        {        printf("WEB: Failed to set TCP fields\n");        return ERROR;        }             if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_USER_ACTION) == ERROR)        {        printf("WEB: Failed to set action\n");        return ERROR;        }              /* create a service container */    svcHdl = fwExtSvcCreate();    /* create a empty URL database */    pUrlDesc = fwUrlListCreate();    /* add URL pathes and keywords */        if ((urlBlock == TRUE) && (pUrls != NULL))        {        for (; *pUrls != NULL; pUrls++)            {            fwUrlAdd(pUrlDesc,*pUrls,FW_URL_SPECIFIC_PATH);                        }        }       if ((urlBlock == TRUE) && (pKeywords != NULL))        {        for (; *pKeywords != NULL; pKeywords++)            {            fwUrlAdd(pUrlDesc,*pKeywords,FW_URL_KEYWORD);                        }        }      /*      * Register the URL filter, proxy filter, Java Applet filter,     * activeX control filter and the cookie filter     */    if (urlBlock == TRUE)        fwExtSvcReg(svcHdl,"URL filter",fwUrlFilter,(void *)pUrlDesc,		    FW_REJECT);    if (proxyBlock == TRUE)                fwExtSvcReg(svcHdl,"Filter Proxy",fwProxyFilter,NULL,FW_REJECT);    if (javaAppletBlock == TRUE)                fwExtSvcReg(svcHdl,"Block Java Applet",fwJavaAppletFilter,NULL,                    FW_REJECT);    if (activeXBlock == TRUE)                            fwExtSvcReg(svcHdl,"Block ActiveX",fwActiveXFilter,NULL,                    FW_REJECT);    if (cookieBlock == TRUE)                            fwExtSvcReg(svcHdl,"Cookie Block",fwCookieFilter,NULL,0);    /* Install the service process function to the given firewall rule */    if (fwExtHandlerInstall(ruleId, NULL, fwExtSvcProcess, svcHdl, NULL)         == ERROR)        {        printf("Content: Failed to install extension handler\n");        return ERROR;        }        return OK;                  }		/***************************************************************************** inFtpsAllowRulesSet - Set firewall rule(s) allow FTP service offered* by a private host.** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS inFtpsAllowRulesSet    (    void * groupId    )    {    void * ruleId;        /* Sanity check */        if (privateServerAddr == NULL)        {        printf("Address of private host offering service not specified!n");        return ERROR;        }    /* Rule to allow FTP traffic to the private host offering service */            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("FTPS: Can't create rule\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_IPADDRSTR,                    (UINT32) NULL, (UINT32) NULL,                   (UINT32) privateServerAddr, (UINT32) privateServerAddr)        == ERROR)        {        printf("FTPS: Failed to set IP addr\n");        return ERROR;        }                       if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0, FTPS_PORT, FTPS_PORT,                        0, 0, 0) == ERROR)        {        printf("FTPS: Failed to set TCP fields\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG) == ERROR)        {        printf("FTPS: Failed to set action\n");        return ERROR;        }              return OK;    }/***************************************************************************** inHttpsAllowRulesSet - Set firewall rule(s) allow HTTP service offered* by a private host.** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS inHttpsAllowRulesSet    (    void * groupId    )    {    void * ruleId;    /* Sanity check */        if (privateServerAddr == NULL)        {        printf("Address of private host offering service not specified!n");        return ERROR;        }    /* Rule to allow HTTP traffic to the private host offering service */            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("HTTPS: Can't create rule\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_IPADDRSTR,                    (UINT32) NULL, (UINT32) NULL,                   (UINT32) privateServerAddr, (UINT32) privateServerAddr)        == ERROR)        {        printf("HTTPS: Failed to set IP addr\n");        return ERROR;        }                       if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0, HTTPS_PORT, HTTPS_PORT,                        0, 0, 0) == ERROR)        {        printf("HTTPS: Failed to set TCP fields\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG) == ERROR)        {        printf("HTTPS: Failed to set action\n");        return ERROR;        }                  return OK;    }/***************************************************************************** inTelnetsAllowRulesSet - Set firewall rule(s) allow TELNET service offered* by a private host.** RETURNS: OK (success), or ERROR (failure)*/    LOCAL STATUS inTelnetsAllowRulesSet    (    void * groupId    )    {    void * ruleId;    /* Sanity check */        if (privateServerAddr == NULL)        {        printf("Address of private host offering service not specified!n");        return ERROR;        }    /* Rule to allow TELNET traffic to the private host offering service */            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("TELS: Can't create rule\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_IPADDRSTR,                    (UINT32) NULL, (UINT32) NULL,                   (UINT32) privateServerAddr, (UINT32) privateServerAddr)        == ERROR)        {        printf("TELS: Failed to set IP addr\n");        return ERROR;        }                       if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0,                TELNETS_PORT, TELNETS_PORT, 0, 0, 0) == ERROR)        {        printf("TELS: Failed to set TCP fields\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG) == ERROR)        {        printf("TELS: Failed to set action\n");        return ERROR;        }                  return OK;    }/***************************************************************************** inSmtpsAllowRulesSet - Set firewall rule(s) allow SMTP service offered* by a private host.** RETURNS: OK (success), or ERROR (failure)*/    LOCAL STATUS inSmtpsAllowRulesSet    (    void * groupId    )    {    void * ruleId;    /* Sanity check */        if (privateServerAddr == NULL)        {        printf("Address of private host offering service not specified!n");        return ERROR;        }    /* Rule to allow SMTP traffic to the private host offering service */            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("SMTPS: Can't create rule\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_IPADDRSTR,                    (UINT32) NULL, (UINT32) NULL,                   (UINT32) privateServerAddr, (UINT32) privateServerAddr)        == ERROR)        {        printf("SMTPS: Failed to set IP addr\n");        return ERROR;        }                       if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0, SMTPS_PORT, SMTPS_PORT,                0, 0, 0) == ERROR)        {        printf("SMTPS: Failed to set TCP fields\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG) == ERROR)        {        printf("SMTPS: Failed to set action\n");        return ERROR;        }                  return OK;    }/***************************************************************************** inPopsAllowRulesSet - Set firewall rule(s) allow POP3 service offered* by a private host.** RETURNS: OK (success), or ERROR (failure)*/    LOCAL STATUS inPopsAllowRulesSet    (    void * groupId    )    {    void * ruleId;    /* Sanity check */        if (privateServerAddr == NULL)        {        printf("Address of private host offering service not specified!n");        return ERROR;        }    /* Rule to allow POP3 traffic to the private host offering service */            ruleId = fwRuleCreate(groupId);    if (ruleId == NULL)        {        printf("POPS: Can't create rule\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_IPADDRSTR,                    (UINT32) NULL, (UINT32) NULL,                   (UINT32) privateServerAddr, (UINT32) privateServerAddr)        == ERROR)        {        printf("POPS: Failed to set IP addr\n");        return ERROR;        }                       if (fwRuleFieldSet(ruleId, FW_FIELD_TCP, 0, 0, POPS_PORT, POPS_PORT,                        0, 0, 0) == ERROR)        {        printf("POPS: Failed to set TCP fields\n");        return ERROR;        }    if (fwRuleFieldSet(ruleId, FW_FIELD_ACTION, FW_ACCEPT | FW_LOG) == ERROR)        {        printf("POPS: Failed to set action\n");        return ERROR;        }                  return OK;    }/***************************************************************************** sourceRouteBlockRulesSet - Set firewall rule to block packets with the* IP source routing option.** IP source routing can be used to specify a direct route to a destination* and a return path back to the sender. The route could involve the use of* other routers or hosts that normally would not be used to forward packets* to the destination. This option can be used to trick Firewalls into* allowing connections from hosts that otherwise would not be allowed. It* can lead to breakins and intruder activity.** RETURNS: OK (success), or ERROR (failure)*/LOCAL STATUS sourceRouteBlockRulesSet()    {    void * groupId;    /* Group to reject IP source routed packets */        groupId = fwRuleGroupCreate(FW_PREIN_LOC,                                 "Source Routed packets from Public Network",                                pktLogLen);    if (groupId == NULL)        {        printf("PRE:SRCRT: Can't create rule group\n");        return ERROR;        }              /* Applies only if IP options are present - i.e., IP header len > 20 */        if (fwRuleFieldSet(groupId, FW_FIELD_HDRLEN, 20, FW_GT_OP) == ERROR)        {        printf("PRE:SRCRT Failed to set IP header length field\n");        re

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久精品一级爱片| 久久精品国产澳门| 久久99九九99精品| 91美女在线看| 久久九九99视频| 男人操女人的视频在线观看欧美 | 国产性做久久久久久| 亚洲国产精品一区二区www| 处破女av一区二区| 久久亚洲精精品中文字幕早川悠里| 亚洲日本欧美天堂| 国产999精品久久久久久绿帽| 制服丝袜亚洲精品中文字幕| 亚洲欧洲一区二区在线播放| 国产一区91精品张津瑜| 欧美videos大乳护士334| 日韩有码一区二区三区| 色老汉av一区二区三区| 国产精品麻豆视频| 成人午夜精品一区二区三区| 国产午夜亚洲精品午夜鲁丝片 | 日韩欧美视频在线| 五月天婷婷综合| 欧美在线观看视频一区二区| 亚洲欧洲制服丝袜| 91首页免费视频| 亚洲色图20p| 色菇凉天天综合网| 亚洲精品国久久99热| 91麻豆高清视频| 亚洲人成人一区二区在线观看| 成人av在线影院| 亚洲色图视频网| 日韩午夜电影av| 人人精品人人爱| 久久综合五月天婷婷伊人| 韩国av一区二区三区| 久久久精品中文字幕麻豆发布| 国产麻豆一精品一av一免费| 久久精品人人做| 成人黄色一级视频| 日韩美女精品在线| 欧美日韩在线精品一区二区三区激情| 亚洲一区二区成人在线观看| 精品视频一区三区九区| 五月激情六月综合| 欧美变态凌虐bdsm| 国产成人8x视频一区二区 | 99久久婷婷国产综合精品| 中文字幕一区二区日韩精品绯色| 成人av在线一区二区三区| 波多野结衣91| 日韩一卡二卡三卡四卡| 韩国精品一区二区| 国产精品日韩成人| 亚洲麻豆国产自偷在线| 91激情在线视频| 亚洲成av人影院| 精品久久99ma| 欧美精品一区二区久久久| 国产日产欧美一区| 精品一区二区成人精品| 91精品国产综合久久久久久漫画 | 久久蜜桃香蕉精品一区二区三区| 五月综合激情网| 欧美在线视频日韩| 亚洲资源中文字幕| 91在线一区二区| 亚洲欧洲中文日韩久久av乱码| 不卡视频免费播放| 国产精品美日韩| 99久久免费视频.com| 国产精品久久久久久久久搜平片 | 国产精品麻豆久久久| 国产盗摄一区二区三区| 久久综合一区二区| 国产成人99久久亚洲综合精品| 久久精品水蜜桃av综合天堂| 国产精品一二三在| 国产日韩欧美综合在线| av电影天堂一区二区在线观看| 国产精品入口麻豆原神| 99视频一区二区| 一区二区三区加勒比av| 9191国产精品| 另类人妖一区二区av| 亚洲欧美欧美一区二区三区| 一本色道亚洲精品aⅴ| 亚洲综合丁香婷婷六月香| 欧美日韩激情在线| 另类小说视频一区二区| 国产欧美一区二区三区沐欲 | 亚洲乱码国产乱码精品精的特点 | 亚洲一级二级在线| 欧美视频在线观看一区二区| 香蕉影视欧美成人| 日韩免费电影网站| 成人精品一区二区三区四区| 亚洲综合激情另类小说区| 在线综合亚洲欧美在线视频| 久久爱www久久做| 国产精品狼人久久影院观看方式| 一本久道久久综合中文字幕| 午夜伦欧美伦电影理论片| 久久麻豆一区二区| 色老头久久综合| 国产精品一卡二卡在线观看| 亚洲色图制服诱惑| 久久综合视频网| 91传媒视频在线播放| 国产一区二区三区日韩| 亚洲免费大片在线观看| 亚洲精品一区二区三区香蕉| 91日韩一区二区三区| 久久精品国产第一区二区三区| 亚洲天堂成人网| 2021久久国产精品不只是精品| 91国产免费观看| 国产精品一区二区在线观看网站| 亚洲综合一区二区三区| 国产午夜精品在线观看| 欧美日韩一级二级| eeuss鲁片一区二区三区在线看| 日本成人在线一区| 一区二区三区中文字幕电影| 久久久久国产精品麻豆| 日韩一区二区三区观看| 在线一区二区视频| 99久久99久久精品免费观看| 精品一区二区影视| 日韩电影网1区2区| 悠悠色在线精品| 一区精品在线播放| 国产精品私人影院| 国产亚洲精品资源在线26u| 欧美一区二区三区思思人| 日本韩国欧美三级| 91免费观看在线| 99精品偷自拍| 99久久国产综合精品色伊| 国产福利一区二区三区视频在线 | 在线播放亚洲一区| 色8久久人人97超碰香蕉987| zzijzzij亚洲日本少妇熟睡| 国产一区二区三区| 国产精品一区二区黑丝| 黄色成人免费在线| 国产精品中文欧美| 国产69精品久久99不卡| 国产一区二区不卡| 国产精品影音先锋| 丁香五精品蜜臀久久久久99网站| 国产91对白在线观看九色| 成人综合婷婷国产精品久久蜜臀| 韩国成人福利片在线播放| 国产一区福利在线| 国产一区欧美二区| 高清不卡在线观看av| 成人在线一区二区三区| 成人国产在线观看| 色综合久久99| 欧美一区二区在线观看| 日韩欧美中文一区| 久久蜜桃av一区精品变态类天堂 | 成人欧美一区二区三区1314 | 青青草原综合久久大伊人精品优势| 日本亚洲电影天堂| 国产中文字幕一区| 99精品欧美一区二区蜜桃免费| 不卡在线观看av| 欧洲一区二区av| 精品精品国产高清a毛片牛牛| 久久精品视频在线看| 亚洲天堂久久久久久久| 婷婷成人激情在线网| 精品在线播放免费| 99麻豆久久久国产精品免费| 在线观看日韩精品| 2022国产精品视频| 又紧又大又爽精品一区二区| 免费一级欧美片在线观看| 国产91精品一区二区| 色猫猫国产区一区二在线视频| 欧美一区二区精品久久911| 欧美激情综合在线| 亚洲成年人网站在线观看| 国产麻豆精品在线| 欧美日韩精品综合在线| 国产目拍亚洲精品99久久精品| 一区二区三区四区精品在线视频| 男女性色大片免费观看一区二区 | 欧美在线观看视频一区二区三区| 日韩午夜激情免费电影| 亚洲三级免费观看| 狠狠色丁香婷婷综合| 欧美日韩免费一区二区三区视频| 国产亚洲精品资源在线26u| 国产精品综合二区| 欧美精品国产精品| 亚洲欧美视频一区|