From 6891a04373daa365c35828ce71e047f5f14486e4 Mon Sep 17 00:00:00 2001 From: root Date: Mon, 30 May 2022 15:59:54 +0200 Subject: Beta2: DNS & NTP Redirect To Exernal Working! --- .../firewall.2022_05_30_03_46_PM_1653918417.local | 50 ++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100755 data/backups/firewall.2022_05_30_03_46_PM_1653918417.local (limited to 'data/backups/firewall.2022_05_30_03_46_PM_1653918417.local') diff --git a/data/backups/firewall.2022_05_30_03_46_PM_1653918417.local b/data/backups/firewall.2022_05_30_03_46_PM_1653918417.local new file mode 100755 index 0000000..273dab3 --- /dev/null +++ b/data/backups/firewall.2022_05_30_03_46_PM_1653918417.local @@ -0,0 +1,50 @@ +#!/bin/sh +# +# IPFire Custom Firewall (icf) +# +# Github: https://github.com/Mnkey +# +# Loops over the local "rules.d/" subfolder files +# Forwarding the (start/stop) command to every file +# which extension is ".on". To enabled multiple +# custom firewall rulesets! +# +# the configuration of the ipfire custom rules (ipfcr) +# in the local "rules.d/*" sunfolder, is inside the +# files themself! +# +# Use this at your OWN RISK. Not fully supported! +# +# License: GPL2 +# +# icf v0.1 (c) 30 May 2022 code.monkeycat.com +# +# Nuff text... + +pwd=$PWD +base=${PWD%/*/*} + +case "$1" in + start) + find $base/rules.d/ -maxdepth 1 -type f \( ! -name . \) -exec bash -c "{} $1" \; + + ;; + stop) + find $base/rules.d/ -maxdepth 1 -type f \( ! -name . \) -exec bash -c "{} $1" \; + + ;; + reload) + $0 stop + $0 start + + ;; + flush) + iptables -t nat -F CUSTOMPREROUTING + iptables -t nat -F CUSTOMPOSTROUTING + iptables -F CUSTOMFORWARD + + ;; + *) + echo "Usage: $0 {start|stop|reload|flush}" + ;; +esac -- cgit v1.2.3