--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="94.142.244.14"
+INTERFACE=""
+VIRTUAL="No"
+RULE="protect against source-routed-packets"
+RULE="protect against icmp-redirect"
+RULE="protect against send-redirect"
+RULE="protect against rp-filter"
+RULE="protect against log-martians"
+COMMENT=" "
+DEVICE="eth0"
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="127.0.0.1"
+INTERFACE=""
+VIRTUAL="No"
+RULE="protect against source-routed-packets"
+RULE="protect against icmp-redirect"
+RULE="protect against send-redirect"
+RULE="protect against rp-filter"
+RULE="protect against log-martians"
+COMMENT=""
+DEVICE="lo"
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.1"
+INTERFACE=""
+VIRTUAL="No"
+RULE="protect against source-routed-packets"
+RULE="protect against icmp-redirect"
+RULE="protect against send-redirect"
+RULE="protect against rp-filter"
+RULE="protect against log-martians"
+COMMENT="Virtual interface for the vservers "
+DEVICE="dummy0"
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="172.31.1.2"
+INTERFACE=""
+VIRTUAL="No"
+RULE="protect against source-routed-packets"
+RULE="protect against icmp-redirect"
+RULE="protect against send-redirect"
+RULE="protect against rp-filter"
+RULE="protect against log-martians"
+COMMENT="Direct link to Zeratul "
+DEVICE="eth1"
--- /dev/null
+RULE="Accept service any from firewall to world.inet options comment=\"Outgoing host traffic\""
+RULE="Accept service any from vservers.internal to world.inet options comment=\"Outgoing vserver traffic\""
+RULE="Snat service any from vservers.internal to world.inet options comment=\"snat for vservers\""
+RULE="Accept service any from zeratul.direct to firewall options comment=\"direct traffic from zeratul\""
+RULE="Accept service any from firewall to zeratul.direct options comment=\"direct traffice to zeratul\""
+RULE="Accept service ssh-host from any to firewall(any) options comment=\"ssh access to the host\""
+RULE="Portfw service http from world.inet to www.vservers.internal options comment=\"http to www\""
+RULE="Portfw service smtp from world.inet to mail.vservers.internal options comment=\"smtp to mail\""
+RULE="Portfw service dns from world.inet to dns.vservers.internal options comment=\"dns to dns\""
+RULE="Portfw service imaps from world.inet to mail.vservers.internal options comment=\"imaps to mail\""
+RULE="Portfw service ssh from world.inet to login.vservers.internal options comment=\"ssh to login\""
--- /dev/null
+ACTIVE="Yes"
+TCP="22*1024:65535"
+UDP=""
+ICMP=""
+GRE=""
+AH=""
+ESP=""
+PROTO_41=""
+BROADCAST="No"
+HELPER=""
+COMMENT="The ssh daemon on the host, which runs on an alternative port. "
MAINMENU_STATUS="Yes"
# NEWRULE_LOG enables logging for new rules.
-NEWRULE_LOG="Yes"
+NEWRULE_LOG="No"
# NEWRULE_LOGLIMIT sets the maximum number of logs per second for new rules.
NEWRULE_LOGLIMIT="20"
--- /dev/null
+ACTIVE="No"
+IPADDRESS=""
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+NETWORK="172.31.1.0"
+NETMASK="255.255.255.0"
+INTERFACE="zeratul-nic"
+RULE=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+COMMENT="The direct link to Zeratul "
--- /dev/null
+ACTIVE="Yes"
+NETWORK="0.0.0.0"
+NETMASK="0.0.0.0"
+INTERFACE="inet-nic"
+RULE=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+COMMENT="The world wide internet "
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.3"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.5"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.4"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.9"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.10"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.6"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+IPADDRESS="10.42.0.7"
+MAC=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+NETWORK="10.42.0.0"
+NETMASK="255.255.255.0"
+INTERFACE="vservers-nic"
+RULE=""
+COMMENT=""
--- /dev/null
+ACTIVE="Yes"
+COMMENT="Internal networks "