06-07-2013
Delete all ebtables rules
Hi All,
I configured a bridged debian firewall using bridging utilities.
This works fine & I have been monitoring all users connecting to the internet & bandwidth usage.
There are 2 interfaces eth0 & eth1 which i have configured as bridged interface br0.
Today, I installed squid on the machine & used both IPTABLES & EBTABLES to transparently forward port 80 to port 3128.
This part is working OK. I now want a script that will quickly revert me back to my bridged linux firewall by removing all IPTABLE & EBTABLE rules..i.e remove the forwarding of port 80 to SQUID 3128
Thanks
9 More Discussions You Might Find Interesting
1. Post Here to Contact Site Administrators and Moderators
https://www.unix.com/showthread.php?t=2971
Spelling Error.
You 'Adhere' to rules, not adhear. (2 Replies)
Discussion started by: Tux
2 Replies
2. Post Here to Contact Site Administrators and Moderators
rules are there but asking 2 questions out of 30 is surely understanable esp when the instructor gives an open book test and urged us to seek answers anywhere we can except from him directly. (2 Replies)
Discussion started by: vrn
2 Replies
3. Red Hat
Hey all
I need your help with ebtables. I want to redirect traffic through local interfaces.
I have am Ubuntu linux machine with several NICs.
(I understand that ebtables is the same for RH)...
eth0 and eth1 are part of a bridge (br0) and they are connected to tap device. On eth0 I get... (0 Replies)
Discussion started by: d0g
0 Replies
4. Red Hat
ENVIROMENT
Linux: Fedora Core release 1 (Yarrow)
iPlanet: iPlanet-WebServer-Enterprise/6.0SP1
Log Path: /usr/iplanet/servers/https-company/logs
I have iPlanet log rotation enabled rotating files on a daily basis.
The rotated logs are NOT compressed & are taking up too much space.
I... (7 Replies)
Discussion started by: zachs
7 Replies
5. Shell Programming and Scripting
Hi My requirement is very simple .
I juts need to delte some lines from a file.
here comes theactual scenario
I have some data in file like say
srinivasa prabhu kumar antony
srinivas king prabhu antony
srinivas prabhu king yar venkata
venkata kingson srinivas... (6 Replies)
Discussion started by: ptappeta
6 Replies
6. Shell Programming and Scripting
Hi
My directory structure is as below.
dir1, dir2, dir3
I have the list of files to be deleted in the below path as below.
/staging/retain_for_2years/Cleanup/log $ ls -lrt
total 0
drwxr-xr-x 2 nobody nobody 256 Mar 01 16:15 01-MAR-2015_SPDBS2
drwxr-xr-x 2 root ... (2 Replies)
Discussion started by: prasadn
2 Replies
7. Linux
Dear All,
I got the valgrind report as below
Mismatch free() / delete / delete
at 0x4006895: operator delete(void*) (vg_replace_malloc.c:480)
by 0x8EA6D11: corefunction.
I supect that it is expect me to write free() instead of delete p1.
Given the the code.
I have the structure.
... (7 Replies)
Discussion started by: SA_Palani
7 Replies
8. Programming
Could you tell me the possibilities of the reason to get the Mismatched free() / delete / delete .
I unable to see the line no in the valgrind report. it displays the function name. with that function name, I am not able to find where exactly the issue is there.I am getting the Mismatched free()... (3 Replies)
Discussion started by: SA_Palani
3 Replies
9. UNIX for Advanced & Expert Users
rsync with --delete won't honor the delete if the source is something/*. I want the delete to work, but not to delete directories on the target that are peer to the intended directory. For example, using these source and target file structures:
Source on desktop:
~/
Money/
... (4 Replies)
Discussion started by: JavaMeister
4 Replies
LEARN ABOUT DEBIAN
pyroman
PYROMAN(8) System Manager's Manual PYROMAN(8)
NAME
pyroman - a firewall configuration utility
SYNOPSIS
pyroman
[ -hvnspP ] [ -r RULESDIR ] [ -t SECONDS ]
[ --help ] [ --version ] [ --safe ] [ --no-act ]
[ --print ] [ --print-verbose ] [ --rules=RULESDIR ]
[ --timeout=SECONDS ] [ safe ]
DESCRIPTION
pyroman is a firewall configuration utility.
It will compile a set of configuration files to iptables statements to setup IP packet filtering for you.
While it is not necessary for operating and using Pyroman, you should have understood how IP, TCP, UDP, ICMP and the other commonly used
Internet protocols work and interact. You should also have understood the basics of iptables in order to make use of the full
functionality.
pyroman does not try to hide all the iptables complexity from you, but tries to provide you with a convenient way of managing a complex
networks firewall. For this it offers a compact syntax to add new firewall rules, while still exposing access to add arbitrary iptables
rules.
OPTIONS
-r RULESDIR,--rules=RULES
Load the rules from directory RULESDIR instead of the default directory (usually /etc/pyroman )
-t SECONDS,--timeout=SECONDS
Wait SECONDS seconds after applying the changes for the user to type OK to confirm he can still access the firewall. This implies
--safe but allows you to use a different timeout.
-h, --help
Print a summary of the command line options and exit.
-V, --version
Print the version number of pyroman and exit.
-s, --safe, safe
When the firewall was committed, wait 30 seconds for the user to type OK to confirm, that he can still access the firewall (i.e. the
network connection wasn't blocked by the firewall). Otherwise, the firewall changes will be undone, and the firewall will be
restored to the previous state. Use the --timeout=SECONDS option to change the timeout.
-n, --no-act
Don't actually run iptables. This can be used to check if pyroman accepts the configuration files.
-p, --print
Instead of running iptables, output the generated rules.
-P, --print-verbose
Instead of running iptables, output the generated rules. Each statement will have one comment line explaining how this rules was
generated. This will usually include the filename and line number, and is useful for debugging.
CONFIGURATION
Configuration of pyroman consists of a number of files in the directory /etc/pyroman. These files are in python syntax, although you do
not need to be a python programmer to use these rules. There is only a small number of statements you need to know:
add_host
Define a new host or network
add_interface
Define a new interface (group)
add_service
Add a new service alias (note that you can always use e.g. www/tcp to reference the www tcp service as defined in /etc/services)
add_nat
Define a new NAT (Network Address Translation) rule
allow Allow a service, client, server combination
reject Reject access for this service, client, server combination
drop Drop packets for this service, client, server combination
add_rule
Add a rule for this service, client, server and target combination
iptables
Add an arbitrary iptables statement to be executed at beginning
iptables_end
Add an arbitrary iptables statement to be executed at the end
Detailed parameters for these functions can be looked up by caling
cd /usr/share/pyroman
pydoc ./commands.py
BUGS
None known as of pyroman-0.4 release
AUTHOR
pyroman was written by Erich Schubert <erich@debian.org>
SEE ALSO
iptables(8), iptables-restore(8) iptables-load(8)
PYROMAN(8)