Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/share/examples/npf Indent to improve readability.



details:   https://anonhg.NetBSD.org/src/rev/546e7877dd03
branches:  trunk
changeset: 455880:546e7877dd03
user:      sevan <sevan%NetBSD.org@localhost>
date:      Tue Apr 16 10:52:28 2019 +0000

description:
Indent to improve readability.
Add a description for log event.

diffstat:

 share/examples/npf/host-npf.conf |  48 ++++++++++++++++++++--------------------
 1 files changed, 24 insertions(+), 24 deletions(-)

diffs (78 lines):

diff -r 6d8fe1ef0a47 -r 546e7877dd03 share/examples/npf/host-npf.conf
--- a/share/examples/npf/host-npf.conf  Tue Apr 16 10:00:04 2019 +0000
+++ b/share/examples/npf/host-npf.conf  Tue Apr 16 10:52:28 2019 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: host-npf.conf,v 1.9 2019/04/15 22:38:48 sevan Exp $
+# $NetBSD: host-npf.conf,v 1.10 2019/04/16 10:52:28 sevan Exp $
 #
 # Simple ruleset for a host with (i.e., not routing) two interfaces,
 # ethernet and wifi.
@@ -22,16 +22,16 @@
 alg "icmp"
 
 procedure "log" {
-       log: npflog0
+    # Send log events to npflog0, see npfd(8)
+    log: npflog0
 }
 
 group "wired" on $wired_if {
-# Placeholder for blacklistd (configuration separate) to add blocked hosts
-ruleset "blacklistd"
+    # Placeholder for blacklistd (configuration separate) to add blocked hosts
+    ruleset "blacklistd"
 
-# Allow SSH on wired interface
-pass in on $wired_if proto tcp to $wired_addrs port ssh apply "log"
-
+    # Allow SSH on wired interface and log all connection attempts
+    pass in on $wired_if proto tcp to $wired_addrs port ssh apply "log"
 }
 
 group "wifi" on $wifi_if {
@@ -39,28 +39,28 @@
 }
 
 group default {
-# Default deny, otherwise last matching rule wins
-block all apply "log"
+    # Default deny, otherwise last matching rule wins
+    block all apply "log"
 
-# Don't block loopback
-pass on lo0 all
+    # Don't block loopback
+    pass on lo0 all
 
-# Allow incoming DHCP server responses
-pass in family inet4 proto udp from any port bootps to any port bootpc
-pass in family inet6 proto udp from any to any port "dhcpv6-client"
+    # Allow incoming DHCP server responses
+    pass in family inet4 proto udp from any port bootps to any port bootpc
+    pass in family inet6 proto udp from any to any port "dhcpv6-client"
 
-# Allow IPv6 ICMP
-pass family inet6 proto ipv6-icmp all
+    # Allow IPv6 ICMP
+    pass family inet6 proto ipv6-icmp all
 
-# Allow incoming IPv4 pings
-pass in family inet4 proto icmp icmp-type echo all
+    # Allow incoming IPv4 pings
+    pass in family inet4 proto icmp icmp-type echo all
 
-# Allow being tracerouted
-pass in proto udp to any port 33434-33600
+    # Allow being tracerouted
+    pass in proto udp to any port 33434-33600
 
-# Allow incoming mDNS traffic from neighbours
-pass in proto udp to any port mdns
+    # Allow incoming mDNS traffic from neighbours
+    pass in proto udp to any port mdns
 
-# Allow all outbound traffic
-pass stateful out all
+    # Allow all outbound traffic
+    pass stateful out all
 }



Home | Main Index | Thread Index | Old Index