summaryrefslogtreecommitdiffstats
path: root/contrib/ipfilter/rules
diff options
context:
space:
mode:
authorguido <guido@FreeBSD.org>2005-12-30 11:34:54 +0000
committerguido <guido@FreeBSD.org>2005-12-30 11:34:54 +0000
commit530bf89f140b005c1cc1706d6d7bcfa392bbf202 (patch)
tree61e8b83d132738b87e9980fc140d58e1d16ffd1e /contrib/ipfilter/rules
parent61382ac33f17a56cf1ff6a93775491b7e4950972 (diff)
parent9749beb9e35afd40d054e5592764d50ed069a890 (diff)
downloadFreeBSD-src-530bf89f140b005c1cc1706d6d7bcfa392bbf202.zip
FreeBSD-src-530bf89f140b005c1cc1706d6d7bcfa392bbf202.tar.gz
This commit was generated by cvs2svn to compensate for changes in r153877,
which included commits to RCS files with non-trunk default branches.
Diffstat (limited to 'contrib/ipfilter/rules')
-rw-r--r--contrib/ipfilter/rules/example.11
-rw-r--r--contrib/ipfilter/rules/example.101
-rw-r--r--contrib/ipfilter/rules/example.111
-rw-r--r--contrib/ipfilter/rules/example.121
-rw-r--r--contrib/ipfilter/rules/example.131
-rw-r--r--contrib/ipfilter/rules/example.21
-rw-r--r--contrib/ipfilter/rules/example.31
-rw-r--r--contrib/ipfilter/rules/example.41
-rw-r--r--contrib/ipfilter/rules/example.51
-rw-r--r--contrib/ipfilter/rules/example.61
-rw-r--r--contrib/ipfilter/rules/example.71
-rw-r--r--contrib/ipfilter/rules/example.81
-rw-r--r--contrib/ipfilter/rules/example.91
-rw-r--r--contrib/ipfilter/rules/example.sr1
14 files changed, 0 insertions, 14 deletions
diff --git a/contrib/ipfilter/rules/example.1 b/contrib/ipfilter/rules/example.1
index 3da9f3c..ff93f49 100644
--- a/contrib/ipfilter/rules/example.1
+++ b/contrib/ipfilter/rules/example.1
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all incoming TCP packets on le0 from host 10.1.1.1 to any destination.
#
diff --git a/contrib/ipfilter/rules/example.10 b/contrib/ipfilter/rules/example.10
index f7a0b01..560d1e6 100644
--- a/contrib/ipfilter/rules/example.10
+++ b/contrib/ipfilter/rules/example.10
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# pass ack packets (ie established connection)
#
diff --git a/contrib/ipfilter/rules/example.11 b/contrib/ipfilter/rules/example.11
index 1cefa9a..c6b4e7f 100644
--- a/contrib/ipfilter/rules/example.11
+++ b/contrib/ipfilter/rules/example.11
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# allow any TCP packets from the same subnet as foo is on through to host
# 10.1.1.2 if they are destined for port 6667.
diff --git a/contrib/ipfilter/rules/example.12 b/contrib/ipfilter/rules/example.12
index 6dbaef5..c0ba1d3 100644
--- a/contrib/ipfilter/rules/example.12
+++ b/contrib/ipfilter/rules/example.12
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# get rid of all short IP fragments (too small for valid comparison)
#
diff --git a/contrib/ipfilter/rules/example.13 b/contrib/ipfilter/rules/example.13
index ca74114..854f07f 100644
--- a/contrib/ipfilter/rules/example.13
+++ b/contrib/ipfilter/rules/example.13
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# Log all short TCP packets to qe3, with 10.3.3.3 as the intended
# destination for the packet.
diff --git a/contrib/ipfilter/rules/example.2 b/contrib/ipfilter/rules/example.2
index 81e7d25..4f81725 100644
--- a/contrib/ipfilter/rules/example.2
+++ b/contrib/ipfilter/rules/example.2
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all outgoing TCP packets on le0 from any host to port 23 of
# host 10.1.1.2
diff --git a/contrib/ipfilter/rules/example.3 b/contrib/ipfilter/rules/example.3
index c5b4344..cd31f73 100644
--- a/contrib/ipfilter/rules/example.3
+++ b/contrib/ipfilter/rules/example.3
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all inbound packets.
#
diff --git a/contrib/ipfilter/rules/example.4 b/contrib/ipfilter/rules/example.4
index f18dcdd..7918ec2 100644
--- a/contrib/ipfilter/rules/example.4
+++ b/contrib/ipfilter/rules/example.4
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all ICMP packets.
#
diff --git a/contrib/ipfilter/rules/example.5 b/contrib/ipfilter/rules/example.5
index 959dfb8..6d688b5 100644
--- a/contrib/ipfilter/rules/example.5
+++ b/contrib/ipfilter/rules/example.5
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# test ruleset
#
diff --git a/contrib/ipfilter/rules/example.6 b/contrib/ipfilter/rules/example.6
index e9ce23a..d40f0f3 100644
--- a/contrib/ipfilter/rules/example.6
+++ b/contrib/ipfilter/rules/example.6
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all TCP packets with only the SYN flag set (this is the first
# packet sent to establish a connection) out of the SYN-ACK pair.
diff --git a/contrib/ipfilter/rules/example.7 b/contrib/ipfilter/rules/example.7
index 0ddd7f7..062de98 100644
--- a/contrib/ipfilter/rules/example.7
+++ b/contrib/ipfilter/rules/example.7
@@ -1,4 +1,3 @@
-# $FreeBSD$
# block all ICMP packets.
#
block in proto icmp all
diff --git a/contrib/ipfilter/rules/example.8 b/contrib/ipfilter/rules/example.8
index 2276b52..baa0258 100644
--- a/contrib/ipfilter/rules/example.8
+++ b/contrib/ipfilter/rules/example.8
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# block all incoming TCP connections but send back a TCP-RST for ones to
# the ident port
diff --git a/contrib/ipfilter/rules/example.9 b/contrib/ipfilter/rules/example.9
index 50bb46a..daff203 100644
--- a/contrib/ipfilter/rules/example.9
+++ b/contrib/ipfilter/rules/example.9
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# drop all packets without IP security options
#
diff --git a/contrib/ipfilter/rules/example.sr b/contrib/ipfilter/rules/example.sr
index 46fb6f1..c4c1994 100644
--- a/contrib/ipfilter/rules/example.sr
+++ b/contrib/ipfilter/rules/example.sr
@@ -1,4 +1,3 @@
-# $FreeBSD$
#
# log all inbound packet on le0 which has IP options present
#
OpenPOWER on IntegriCloud