diff options
author | rhatto <rhatto@04377dda-e619-0410-9926-eae83683ac58> | 2007-02-09 16:44:20 +0000 |
---|---|---|
committer | rhatto <rhatto@04377dda-e619-0410-9926-eae83683ac58> | 2007-02-09 16:44:20 +0000 |
commit | bd5a14836a8967b9ff8b8ed1c14a0b1d8289ea52 (patch) | |
tree | ec801fc9d595e3cf483c564f0d1d9a0f6858ba52 /templates/vserver-legacy.d/etc/rc.d/rc.ip_forward | |
parent | f7595585fae0e0844877ad111388837aaf74028b (diff) | |
download | simplepkg-bd5a14836a8967b9ff8b8ed1c14a0b1d8289ea52.tar.gz simplepkg-bd5a14836a8967b9ff8b8ed1c14a0b1d8289ea52.tar.bz2 |
lots of changes:
- jail-update renamed to jail-commit
- mkjail, jail-commit and templatepkg with svn support
- templates now has permission tracking
- etc
git-svn-id: svn+slack://slack.fluxo.info/var/svn/simplepkg@164 04377dda-e619-0410-9926-eae83683ac58
Diffstat (limited to 'templates/vserver-legacy.d/etc/rc.d/rc.ip_forward')
-rw-r--r-- | templates/vserver-legacy.d/etc/rc.d/rc.ip_forward | 64 |
1 files changed, 0 insertions, 64 deletions
diff --git a/templates/vserver-legacy.d/etc/rc.d/rc.ip_forward b/templates/vserver-legacy.d/etc/rc.d/rc.ip_forward deleted file mode 100644 index 52bd2fe..0000000 --- a/templates/vserver-legacy.d/etc/rc.d/rc.ip_forward +++ /dev/null @@ -1,64 +0,0 @@ -#!/bin/sh -# /etc/rc.d/rc.ip_forward: start/stop IP packet forwarding -# -# If you intend to run your Linux box as a router, i.e. as a -# computer that forwards and redistributes network packets, you -# will need to enable IP packet forwarding in your kernel. -# -# To activate IP packet forwarding at boot time, make this -# script executable: chmod 755 /etc/rc.d/rc.ip_forward -# -# To disable IP packet forwarding at boot time, make this -# script non-executable: chmod 644 /etc/rc.d/rc.ip_forward - -# Start IP packet forwarding: -ip_forward_start() { - if [ -f /proc/sys/net/ipv4/ip_forward ]; then - echo "Activating IPv4 packet forwarding." - echo 1 > /proc/sys/net/ipv4/ip_forward - fi - # When using IPv4 packet forwarding, you will also get the - # rp_filter, which automatically rejects incoming packets if the - # routing table entry for their source address doesn't match the - # network interface they're arriving on. This has security - # advantages because it prevents the so-called IP spoofing, - # however it can pose problems if you use asymmetric routing - # (packets from you to a host take a different path than packets - # from that host to you) or if you operate a non-routing host - # which has several IP addresses on different interfaces. To - # turn rp_filter off, uncomment the lines below: - #if [ -r /proc/sys/net/ipv4/conf/all/rp_filter ]; then - # echo "Disabling rp_filter." - # echo 0 > /proc/sys/net/ipv4/conf/all/rp_filter - #fi -} - -# Stop IP packet forwarding: -ip_forward_stop() { - if [ -f /proc/sys/net/ipv4/ip_forward ]; then - echo "Disabling IPv4 packet forwarding." - echo 0 > /proc/sys/net/ipv4/ip_forward - fi -} - -# Restart IP packet forwarding: -ip_forward_restart() { - ip_forward_stop - sleep 1 - ip_forward_start -} - -case "$1" in -'start') - ip_forward_start - ;; -'stop') - ip_forward_stop - ;; -'restart') - ip_forward_restart - ;; -*) - echo "usage $0 start|stop|restart" -esac - |