OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:iptables
(Results
1 - 16
of
16
) sorted by null
/external/wpa_supplicant_8/wpa_supplicant/examples/
p2p-action-udhcp.sh
54
iptables
-P FORWARD DROP
55
iptables
-t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
56
iptables
-A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
57
iptables
-A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
66
iptables
-t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
67
iptables
-D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
68
iptables
-D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
p2p-action.sh
68
iptables
-P FORWARD DROP
69
iptables
-t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
70
iptables
-A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
71
iptables
-A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
80
iptables
-t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
81
iptables
-D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
82
iptables
-D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
/external/iptables/iptables/
Android.mk
27
#
iptables
42
iptables
-standalone.c
iptables
.c xshared.c
45
LOCAL_MODULE:=
iptables
iptables-apply
3
#
iptables
-apply -- a safer way to update
iptables
remotely
14
DEFAULT_FILE=/etc/network/
iptables
19
$PROGNAME $VERSION -- a safer way to update
iptables
remotely
44
The script will try to apply a new ruleset (as output by
iptables
-save/read
45
by
iptables
-restore) to
iptables
, then prompt the user whether the changes
108
SAVE=
iptables
-save
109
RESTORE=
iptables
-restore
129
echo "E:
iptables
support lacking from the kernel." >&
[
all
...]
iptables-standalone.c
13
*
iptables
-- IP firewall administration for kernels with
16
* See the accompanying manual page
iptables
(8) for information
39
#include <
iptables
.h>
40
#include "
iptables
-multi.h"
56
iptables_globals.program_name = "
iptables
";
77
fprintf(stderr, "
iptables
: %s. "
81
fprintf(stderr, "
iptables
: %s.\n",
iptables.c
1
/* Code to take an
iptables
-style command line and do it. */
39
#include <
iptables
.h>
267
" --ipv6 -6 Error (line is ignored by
iptables
-restore)\n"
313
"Perhaps
iptables
or your kernel needs to be upgraded.\n");
1108
/* print counters for
iptables
-save */
1139
/* print counters for
iptables
-R */
1190
counters = -1; /*
iptables
-c format */
[
all
...]
/external/iptables/include/
ip6tables.h
7
#include <
iptables
/internal.h>
iptables.h
7
#include <
iptables
/internal.h>
/development/scripts/
reverse_tether.sh
157
sudo
iptables
-F
158
sudo
iptables
-t nat -F
159
sudo
iptables
-t nat -A POSTROUTING -o $LAN_DEV -j MASQUERADE
160
sudo
iptables
-P FORWARD ACCEPT
165
sudo
iptables
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
166
sudo
iptables
-A FORWARD -m state --state NEW -i $HOST_DEV -j ACCEPT
167
sudo
iptables
-P FORWARD DROP
172
sudo
iptables
-F
173
sudo
iptables
-t nat -F
/external/dnsmasq/contrib/port-forward/
dnsmasq-portforward
20
IPTABLES
=/sbin/
iptables
55
${
IPTABLES
} -t nat -D PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
57
${
IPTABLES
} -t nat -A PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
/build/target/product/
core_minimal.mk
44
iptables
\
/external/iproute2/
configure
33
#check if we have xtables from
iptables
>= 1.4.5.
145
echo "using
iptables
"
154
for file in $dir/{xtables,
iptables
}/lib*t_*so ; do
199
echo -n "
iptables
modules directory: "
/external/chromium_org/media/tools/constrained_network_server/
traffic_control.py
52
_Exec(['sudo', '-n', '
iptables
', '-help'],
53
msg=('Cannot run \'
iptables
\' command. Traffic Control must be run '
126
"""Deletes the root qdisc and all
iptables
rules.
298
command = ['sudo', '
iptables
', '-t', 'nat', '-A', 'PREROUTING', '-i',
301
_Exec(command, msg='Error adding
iptables
rule for port %d.' % port)
304
command = ['sudo', '
iptables
', '-t', 'nat', '-A', 'OUTPUT', '-p', 'tcp',
306
_Exec(command, msg='Error adding
iptables
rule for port %d.' % port)
317
command = ['sudo', '
iptables
', '-t', 'nat', '-D', 'PREROUTING', '-i',
320
_Exec(command, msg='Error deleting
iptables
rule for port %d.' % port)
322
command = ['sudo', '
iptables
', '-t', 'nat', '-D', 'OUTPUT', '-p', 'tcp'
[
all
...]
/external/iptables/extensions/
libipt_DNAT.c
6
#include <
iptables
.h> /* get_kernel_version */
libipt_SNAT.c
6
#include <
iptables
.h>
/external/iproute2/tc/
m_ipt.c
2
* m_ipt.c
iptables
based targets
3
* utilities mostly ripped from
iptables
<duh, its the linux way>
18
#include <
iptables
.h>
100
"Perhaps
iptables
or your kernel needs to be upgraded.\n");
104
/* stolen from
iptables
1.2.11
202
perror("
iptables
: calloc failed");
Completed in 432 milliseconds