HomeSort by relevance Sort by last modified time
    Searched refs:iptables (Results 1 - 16 of 16) sorted by null

  /external/wpa_supplicant_8/wpa_supplicant/examples/
p2p-action-udhcp.sh 54 iptables -P FORWARD DROP
55 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
56 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
57 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
66 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
67 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
68 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
p2p-action.sh 68 iptables -P FORWARD DROP
69 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
70 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
71 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
80 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
81 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
82 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
  /external/iptables/iptables/
Android.mk 27 # iptables
42 iptables-standalone.c iptables.c xshared.c
45 LOCAL_MODULE:=iptables
iptables-apply 3 # iptables-apply -- a safer way to update iptables remotely
14 DEFAULT_FILE=/etc/network/iptables
19 $PROGNAME $VERSION -- a safer way to update iptables remotely
44 The script will try to apply a new ruleset (as output by iptables-save/read
45 by iptables-restore) to iptables, then prompt the user whether the changes
108 SAVE=iptables-save
109 RESTORE=iptables-restore
129 echo "E: iptables support lacking from the kernel." >&
    [all...]
iptables-standalone.c 13 * iptables -- IP firewall administration for kernels with
16 * See the accompanying manual page iptables(8) for information
39 #include <iptables.h>
40 #include "iptables-multi.h"
56 iptables_globals.program_name = "iptables";
77 fprintf(stderr, "iptables: %s. "
81 fprintf(stderr, "iptables: %s.\n",
iptables.c 1 /* Code to take an iptables-style command line and do it. */
39 #include <iptables.h>
267 " --ipv6 -6 Error (line is ignored by iptables-restore)\n"
313 "Perhaps iptables or your kernel needs to be upgraded.\n");
1108 /* print counters for iptables-save */
1139 /* print counters for iptables -R */
1190 counters = -1; /* iptables -c format */
    [all...]
  /external/iptables/include/
ip6tables.h 7 #include <iptables/internal.h>
iptables.h 7 #include <iptables/internal.h>
  /development/scripts/
reverse_tether.sh 157 sudo iptables -F
158 sudo iptables -t nat -F
159 sudo iptables -t nat -A POSTROUTING -o $LAN_DEV -j MASQUERADE
160 sudo iptables -P FORWARD ACCEPT
165 sudo iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
166 sudo iptables -A FORWARD -m state --state NEW -i $HOST_DEV -j ACCEPT
167 sudo iptables -P FORWARD DROP
172 sudo iptables -F
173 sudo iptables -t nat -F
  /external/dnsmasq/contrib/port-forward/
dnsmasq-portforward 20 IPTABLES=/sbin/iptables
55 ${IPTABLES} -t nat -D PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
57 ${IPTABLES} -t nat -A PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
  /build/target/product/
core_minimal.mk 44 iptables \
  /external/iproute2/
configure 33 #check if we have xtables from iptables >= 1.4.5.
145 echo "using iptables"
154 for file in $dir/{xtables,iptables}/lib*t_*so ; do
199 echo -n "iptables modules directory: "
  /external/chromium_org/media/tools/constrained_network_server/
traffic_control.py 52 _Exec(['sudo', '-n', 'iptables', '-help'],
53 msg=('Cannot run \'iptables\' command. Traffic Control must be run '
126 """Deletes the root qdisc and all iptables rules.
298 command = ['sudo', 'iptables', '-t', 'nat', '-A', 'PREROUTING', '-i',
301 _Exec(command, msg='Error adding iptables rule for port %d.' % port)
304 command = ['sudo', 'iptables', '-t', 'nat', '-A', 'OUTPUT', '-p', 'tcp',
306 _Exec(command, msg='Error adding iptables rule for port %d.' % port)
317 command = ['sudo', 'iptables', '-t', 'nat', '-D', 'PREROUTING', '-i',
320 _Exec(command, msg='Error deleting iptables rule for port %d.' % port)
322 command = ['sudo', 'iptables', '-t', 'nat', '-D', 'OUTPUT', '-p', 'tcp'
    [all...]
  /external/iptables/extensions/
libipt_DNAT.c 6 #include <iptables.h> /* get_kernel_version */
libipt_SNAT.c 6 #include <iptables.h>
  /external/iproute2/tc/
m_ipt.c 2 * m_ipt.c iptables based targets
3 * utilities mostly ripped from iptables <duh, its the linux way>
18 #include <iptables.h>
100 "Perhaps iptables or your kernel needs to be upgraded.\n");
104 /* stolen from iptables 1.2.11
202 perror("iptables: calloc failed");

Completed in 432 milliseconds