Updated=no UpdateInterface='get: update-network-config.sh' CurrentInterfaces= SystemName= DomainName= DNSPrimaryIP= DNSSecondaryIP= IPAdmin=all AdminInterface=eth0 FullAdminName=admin ChangeAdminPasswd='set: change-password.pl' CurrentMirror=ftp://ftp.adv.mandrakesoft.com:20002/Mandrake/updates PackagesList= OfficialList='get: mirrors.pl' PackagesToUpdate='get: packages_to_update.pl' PackagesToDownload='get: download_packages.pl' PackagesToInstall='get: rpm-install.pl' PackageDescription='get: show_description.pl' DHCPClient=dhcp-client DHCPServer=off DHCPInterface= DHCPDomainName= DHCPWINSServer= DHCPServerEnd= DHCPServerStart= DHCP_LEASE_DEFAULT=21600 DHCP_LEASE_MAX=43200 DNS_SERVER_DYN_UPDATE=Y DNS_UPDATER_SECRET=Y SYSLOGLocal=on SYSLOGTargetServer= SYSLOGTargetServerLevel=* SYSLOGTty=tty12 SYSLOGTtyLevel=alert PreludeState=off SnortState=off SnortLogs='get: snortsnarf.sh' MessagesLogs='get: logs.pl' DynDnsAccount=dnsaccount DynDnsPassword=dnspassword DynDnsService=off DNSServer=off ChrootDNSServerOn='set: chroot_bind.sh -c /var/lib/named-chroot' ChrootDNSServerOff='set: chroot_bind.sh -u' TimeZoneList='get: timezone.pl tzlist' Zone=Europe/Paris ChangeDate='set: date.pl $md5 ' NTPServer=timeserv ServicesList='get: services.pl list' ServiceStatus='get: services.pl status' ServiceRestart='set: services.pl restart' ServiceReload='set: services.pl reload' ServiceStart='set: services.pl start' ServiceStop='set: services.pl stop' ServiceRemove='set: services.pl remove' ServiceAdd='set: services.pl add' SquidServer=off SquidServerAuthentication=none SquidServerAuthenticationOptions=none SquidParents=N SquidPort=3328 SquidCacheDir=/var/spool/squid SquidCacheSize=150 SquidWarningMesage=<A HREF=mailto:admin@yourdomain.com>Mail to Admin</A> SquidWarningMesagePosition=Bottom SquidAlertEmail=admin@yourdomain.com SquidRedirector=squidGuard SquidAnonymizer=Y RedirectAddress=127.0.0.1:8444 UrlFilter=off SquidGuardAddPrivilegedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -a ' SquidGuardDeletePrivilegedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -d' SquidGuardPrivilegedIpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -l' SquidGuardAddBannedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -a ' SquidGuardDeleteBannedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -d' SquidGuardBannedIpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -l' SquidGuardAddLansourceNetworkMask='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -a ' SquidGuardDeleteLansourceNetworkMask='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -d' SquidGuardLansourceNetworkMasksList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -l' SquidGuardAddBanneddestinationUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -a ' SquidGuardDeleteBanneddestinationUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -d' SquidGuardBanneddestinationUrlsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -l' SquidGuardAddBanneddestinationDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -a ' SquidGuardDeleteBanneddestinationDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -d' SquidGuardBanneddestinationDomainsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -l' SquidGuardAddBanneddestinationRegExp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -ea ' SquidGuardDeleteBanneddestinationRegExp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -ed' SquidGuardBanneddestinationRegExpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -el' SquidGuardAddAdvertisingUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -a ' SquidGuardDeleteAdvertisingUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -d' SquidGuardAdvertisingUrlsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -l' SquidGuardAddAdvertisingDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -a ' SquidGuardDeleteAdvertisingDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -d' SquidGuardAdvertisingDomainsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -l' SquidGuardAlertEmail=admin@yourdomain.com SquidGuardDb=/usr/share/squidGuard-1.2.0/db SquidGuardLogDir=/var/log/squidGuard SquidGuardTimeRestriction=Y SquidGuardTimeRestrictionRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u SquidGuardWorkHoursSunAM=09:30-12:00 SquidGuardWorkHoursSunPM=13:00-19:00 SquidGuardWorkHoursMonAM=09:00-12:00 SquidGuardWorkHoursMonPM=13:00-19:00 SquidGuardWorkHoursTueAM=09:00-11:00 SquidGuardWorkHoursTuePM=12:00-19:00 SquidGuardWorkHoursWedAM=09:00-12:00 SquidGuardWorkHoursWedPM=12:00-18:00 SquidGuardWorkHoursThuAM=09:00-13:00 SquidGuardWorkHoursThuPM=13:00-18:00 SquidGuardWorkHoursFriAM=09:00-12:00 SquidGuardWorkHoursFriPM=13:30-18:00 SquidGuardWorkHoursSatAM=08:20-13:00 SquidGuardWorkHoursSatPM=13:30-19:00 SquidGuardPrivilegedSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u SquidGuardBannedSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u SquidGuardBannedSourceLog= SquidGuardLanSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u SquidGuardLanSourceLog= SquidGuardAdvertisingRedirectUrl=nulbanner.png SquidGuardAdvertisingLog=/var/log/squidGuard/advertising.log SquidGuardDefaultRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u SquidGuardBackup='get: squidGuard_backup.pl $md5 --backup' SquidGuardRestore='get: squidGuard_backup.pl $md5 --restore' ContentFilter=off ContentFilterPort=8080 ContentFilterRedirectUrl=dansguardian.cgi ContentFilterBannedextensionList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -l' ContentFilterAddBannedextension='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -a ' ContentFilterDeleteBannedextension='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -d' ContentFilterBannedmimetypeList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -l' ContentFilterAddBannedmimetype='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -a ' ContentFilterDeleteBannedmimetype='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -d' ContentFilterBannedphraseList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -l' ContentFilterAddBannedphrase='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -a ' ContentFilterDeleteBannedphrase='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -d' ContentFilterBannedregexpurlList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -l' ContentFilterAddBannedregexpurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -a ' ContentFilterDeleteBannedregexpurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -d' ContentFilterBannedsiteList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -l' ContentFilterAddBannedsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -a ' ContentFilterDeleteBannedsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -d' ContentFilterBannedurlList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -l' ContentFilterAddBannedurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -a ' ContentFilterDeleteBannedurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -d' ContentFilterBannedexceptionipList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -l' ContentFilterAddBannedexceptionip='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -a ' ContentFilterDeleteBannedexceptionip='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -d' ContentFilterBannedexceptionsiteList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -l' ContentFilterAddBannedexceptionsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -a ' ContentFilterDeleteBannedexceptionsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -d' ContentFilterBannedexceptionuserList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -l' ContentFilterAddBannedexceptionuser='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -a ' ContentFilterDeleteBannedexceptionuser='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -d' ContentFilterBannedpicsList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -l' ContentFilterAddBannedpics='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -a ' ContentFilterDeleteBannedpics='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -d' BannerFilter=off UsersList='get: users.pl' UserCreate='set: users.pl -a' UserDelete='set: users.pl -d' UserShell='get: users.pl --shell -g ; set: users.pl --shell -s' UserHome='get: users.pl --home -g ; set: users.pl --home -s' UserPasswd='set: users.pl --passwd' UserPrimaryGroup='get: users.pl --primarygroup -g ; set: users.pl --primarygroup -s' UserGroupsList='get: users.pl --groups -g ; set: users.pl --groups -s' FilteringRules=on FirewallMasquerade=on Filtering=start FirewallLogs='get: fwlogsummary.pl' FirewallingLog=off FirewallLogDegre=info FirewallReject=DROP FirewallConfigType=expert FirewallLevelVar= FirewallServices='get: rules_sorting.pl' FirewallLevel='get: change-firewalling-level.pl return_level; trigger: change-firewalling-level.pl' FirewallCleanRules='get: clean_rules.pl' TcpOfficeServices='get: rules_sorting.pl -r -c local -s net -p tcp; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT -p tcp' UdpOfficeServices='get: rules_sorting.pl -r -c local -s net -p udp; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT -p udp' OtherOfficeServices='get: rules_sorting.pl -r -c local -s net -p other; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT' TcpInternetServices='get: rules_sorting.pl -r -n -c net -s local -p tcp; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT -p tcp' UdpInternetServices='get: rules_sorting.pl -r -n -c net -s local -n -p udp ; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT -p udp' OtherInternetServices='get: rules_sorting.pl -r -n -c net -s local -n -p other; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT' TcpFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -p tcp; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT -p tcp' UdpFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -n -p udp ; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT -p udp' OtherFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -n -p other; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT' TmpTcpOfficeServices= ModifyRule='get: swap_rules_to_tmp_vars.pl; trigger: add_rule.pl' TmpPort= TmpProtocol= TmpNat= TmpServer= TmpClient= TmpServerForward= TmpResult= TmpKey= Masquerade= FirewallPolicy= FirewallRules= FirewallAudit=1(protocol=tcp port=telnet),2(protocol=tcp port=ftp),3(protocol=udp port=31337 log=error) FirewallBlockedServices=1(protocol=tcp ports=6000:6063 result=DROP log=warning),service2(protocol=udp ports=2049) FirewallAlwaysForwardServices=1(protocol=tcp port=domain),2 (protocol=udp port=domain) FirewallingLevel='get: change-firewalling-level.pl' FirewallingConfigType=fast FirewallingRuleAnalyse='get: analyse-firewalling-rules.pl' FirewallingOptimizeTOS=off TCP_AUDIT_SERVICES= UDP_AUDIT_SERVICES= ICMP_AUDIT_TYPES= TCP_PUBLIC_SERVICES=ssh (forward=--- action=allow),8443 (forward=--- action=allow) UDP_PUBLIC_SERVICES=25 (forward=--- action=allow) NET_DMZ= TCP_INTERNAL_SERVICES=ssh,3328 UDP_INTERNAL_SERVICES= LOC_DMZ_HOST=web (ip=10.1.1.1 services=80 protocol=tcp;udp LOC=allow NET=allow FW=allow),web1 (ip=10.1.1.1 services=80 protocol=tcp;udp LOC=allow NET=allow FW=allow) LOC_DMZ_POLICY=REJECT LOC_DMZ_SERVICES=https (forward=--- protocol=tcp+udp action=allow),ssh (forward=--- protocol=tcp action=allow),imap (forward=10.2.3.5 protocol=udp action=allow),http (forward=10.2.2.2 protocol=tcp+udp action=allow),25 (forward=10.2.2.2 protocol=udp action=allow) LOC_NET_POLICY=ACCEPT LOC_NET_SERVICES=all (forward=--- protocol=all action=allow) LOC_FW_POLICY=REJECT LOC_FW_SERVICES= TCP_FORWARD_SERVICES=all UDP_FORWARD_SERVICES=firewall GetZonesList='get: shorewall_manage.pl $md5 /etc/shorewall/zones -lt' # The following variable allow to get an new ID and to be the last id in a Dyntable's variable with ID AddId='get: addid.sh' # Return the current id depend on criteria (E.g: GetId Variable attribut=value) GetId='get: getid.sh' # Filter a list on criteria (Eg: return only rules contains client=lan) ListFilter='get: list_filter.sh' ZonesList= 1 (zone=lan comments=local_area_network display=LAN),2 (zone=dmz comments=demilitarized_zone display=DMZ),3 (zone=wan comments=internet display=NET) #Example : ZonesList=1 (zone=loc comments=local_area_network display=LAN),2 (zone=dmz comments=demilitarized_zone display=DMZ),3 (zone=net comments=internet display=NET) InterfacesList= #Example : InterfacesList=1 (zone=dmz interface=eth1 broadcast=detect options=noping+routestopped),2 (zone=lan interface=eth2 broadcast=detect options=roustopped),3 (zone=wan interface=ppp+ broadcast=- options=-) #Example : HostsList=1 (zone=wan interface=eth2 ip=10.1.1.0/24 options=-),3 (zone=lan interface=eth1 ip=10.10.1.2 options=routestopped) HostsList= #Example : MasqList=1 (interface=ppp+ ip=!192.168.1.0/24 subnet=192.168.1.0:24) MasqList= #Example : NatList=1 (external=206.124.146.178 interface=eth0 internal=192.168.1.5 all=no local=no),2 (external=206.124.146.179 interface=eth0 internal=192.168.1.6 all=no local=no),3 (external=206.124.146.180 interface=eth0 internal=192.168.1.7 all=no local=no) NatList= #Example : ProxyarpList=1 (address=206.124.146.177 interface=eth1 external=eth0 haveroute=no) ProxyarpList= #Example : VpnList=1 (type=ipsec zone=net gw=130.252.100.21 host=-),2 (type=ipsec zone=net gw=130.252.100.22 host=tx) VpnList= #Example : PolicyList=7 (policy=ACCEPT log_level=- client=wanserver=fw),8 (policy=DROP log_level=info client=wan server=all),4 (policy=ACCEPT log_level=- client=lan server=all) PolicyList=1 (policy=REJECT log_level=info client=lan server=all),2 (policy=REJECT log_level=info client=dmz server=all),3 (policy=REJECT log_level=info client=fw server=all),4 (policy=REJECT log_level=info client=wan server=all),5 (policy=REJECT log_level=info client=all server=all) #Example : RulesList=1 (result=ACCEPT log_level=info client_zone=wan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=www client_port=- address=192.168.1.12 ip_snat=-) RulesList=1 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=wan server_ip=- server_port=- proto=tcp+udp port=53 client_port=- address=- ip_snat=-),2 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=wan server_ip=- server_port=- proto=udp port=53 client_port=- address=- ip_snat=-),3 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=wan server_ip=- server_port=- proto=udp port=53 client_port=- address=- ip_snat=-),4 (result=REJECT log_level=- client_zone=wan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=113 client_port=- address=- ip_snat=-),5 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=22 client_port=- address=- ip_snat=-),6 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=8443 client_port=- address=- ip_snat=-),7 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=lan server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),8 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),9 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=dmz server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),10 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=lan server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),11 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=fw server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),12 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=dmz server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-) # Blacklist entry : ip/subnet separate by comma (10.0.0.0/8,10.1.1.1) BlacklistList= #Example : TosList=1 (client_zone=wan client_ip=- server_zone=fw server_ip=- proto=tcp client_port=- server_port=- tos=16) TosList=1 (client_port=- client_zone=all server_ip=--- tos=16 server_port=ssh server_zone=all client_ip=--- proto=tcp),2 (client_zone=all client_port=ssh server_ip=--- tos=16 server_port=- server_zone=all client_ip=--- proto=tcp),3 (client_port=- client_zone=all server_ip=--- tos=16 server_port=ftp server_zone=all client_ip=--- proto=tcp),4 (client_zone=all client_port=ftp server_ip=--- tos=16 server_port=- server_zone=all client_ip=--- proto=tcp),5 (client_port=- client_zone=all server_ip=--- tos=8 server_port=ftp-data server_zone=all client_ip=--- proto=tcp),6 (client_zone=all client_port=ftp-data server_ip=--- tos=8 server_port=- server_zone=all client_ip=--- proto=tcp) NET_IF=eth1 NET_LABEL=Internet Zone NET_OPTIONS=noping,routestopped,norfc1918,routefilter,multi NET_BCAST=detect DMZ_IF=eth0 DMZ_LABEL=DMZ Zone DMZ_OPTIONS=noping,norfc1918 DMZ_BCAST=detect DMZ_LOC_POLICY=REJECT DMZ_LOC_SERVICES=https (forward=--- protocol=tcp+udp action=allow),http (forward=--- protocol=tcp action=allow) DMZ_NET_POLICY=ACCEPT DMZ_NET_SERVICES=all (forward=--- action=allow) DMZ_FW_POLICY=REJECT DMZ_FW_SERVICES= DMZ_FW_UDP_SERVICES= LOC_IF=eth0,eth1 LOC_LABEL=Office Zone LOC_OPTIONS=noping LOC_BCAST=detect FW_IF= FW_LABEL=Firewall FW_OPTIONS= FW_BCAST= FW_NET= FW_DMZ= FW_LOC= DMZ_NET= DMZ_LOC= DMZ_FW= TCP_BLOCKED_SERVICES=6000:6020 UDP_BLOCKED_SERVICES=2049 ICMP_ALLOWED_TYPES=destination-unreachable,echo-reply,time-exceeded IP_MASQ_MODULES=cuseeme,ftp,irc,quake,raudio,vdolive,dplay,icq,h323 ICMP_OUTBOUND_DISABLED_TYPES= FirewallAlwaysForwardPortTCP=domain FirewallAlwaysForwardPortUDP=domain FORCE_PASV_FTP=Y LOG_FAILURES=N ENABLE_SRC_ADDR_VERIFY=Y REJECT_METHOD=DENY TmpInterfaceToSet= InternetAccessType= InternetInterface= InternetOnBoot= InternetGateway= EthZonesList='get: ethernet-known-interfaces.pl' HostToPing=198.41.0.6 InternetStart='get: internet-access.pl -start;' InternetStop='get: internet-access.pl -stop;' EthernetInterfacesList='get: interfaces.pl net;' EthernetModulesList='get: ethernet-modules.pl;' EthernetLoadModule='get: ethernet-modules.pl --load;' EthernetKnownInterfaces='get: ethernet-known-interfaces.pl ;' Eth0_OPTIONS=dhcp,noping,routestopped,multi,dropunclean Eth0_BCAST=detect Eth0ZoneName= Eth0OptionsInterfacesShorewall= Eth0RestrictionShorewall= Eth0OptionsHostsShorewall= Eth0Known= Eth0IP= Eth0Mask= Eth0Mac= Eth0BootProto= Eth0OnBoot=yes Eth0Hostname= Eth0HostAlias= Eth0Driver= Eth0Irq= Eth0Port= Eth0DHCPClient= Eth0DHCPHostname= Eth0DHCPServerName= Eth1ZoneName= Eth1_OPTIONS= Eth1_BCAST=detect Eth1OptionsInterfacesShorewall= Eth1RestrictionShorewall= Eth1OptionsHostsShorewall= Eth1Known=true Eth1IP= Eth1Mask= Eth1Mac= Eth1BootProto= Eth1OnBoot=yes Eth1Hostname= Eth1HostAlias= Eth1Driver= Eth1Irq= Eth1Port= Eth1DHCPClient=/sbin/dhcpcd Eth1DHCPHostname= Eth1DHCPServerName= Eth2ZoneName= Eth2OptionsInterfacesShorewall= Eth2RestrictionShorewall= Eth2OptionsHostsShorewall= Eth2Known=false Eth2IP= Eth2Mask= Eth2Mac= Eth2BootProto= Eth2OnBoot= Eth2Hostname= Eth2HostAlias= Eth2Driver= Eth2Irq= Eth2Port= Eth2DHCPClient= Eth2DHCPHostname= Eth2DHCPServerName= Eth3ZoneName= Eth3OptionsInterfacesShorewall= Eth3RestrictionShorewall= Eth3OptionsHostsShorewall= Eth3Known=false Eth3IP= Eth3Mask= Eth3Mac= Eth3BootProto= Eth3OnBoot= Eth3Hostname= Eth3HostAlias= Eth3Driver= Eth3Irq= Eth3Port= Eth3DHCPClient= Eth3DHCPHostname= Eth3DHCPServerName= Eth4ZoneName= Eth4OptionsInterfacesShorewall= Eth4RestrictionShorewall= Eth4OptionsHostsShorewall= Eth4Known=false Eth4IP= Eth4Mask= Eth4Mac= Eth4BootProto= Eth4OnBoot= Eth4Hostname= Eth4HostAlias= Eth4Driver= Eth4Irq= Eth4Port= Eth4DHCPClient= Eth4DHCPHostname= Eth4DHCPServerName= FREESWAN_REP=/etc/freeswan LOCAL_RSA_KEYS= PLUTOT_DEBUG=no VPN=off IPSecZonesList='get: ipsec-know-interfaces.pl --with-zones' IPSec0ZoneName= IPSec0Interface= IPSec0Authby= IPSec0Keyingtries= IPSec0Auto= IPSec0SharedSecret= IPSec0LeftID= IPSec0RightSubnet= IPSec0RightID= IPSec0RightIP= IPSec0RightPubkey= IPSec1ZoneName= IPSec1Interface= IPSec1RightIP= IPSec1Authby= IPSec1Keyingtries= IPSec1Auto= IPSec1SharedSecret= IPSec1LeftSubnet= IPSec1LeftID= IPSec1RightSubnet= IPSec1RightID= IPSec1RightPubkey= IPSec2ZoneName= IPSec2Interface= IPSec2RightIP= IPSec2Authby= IPSec2Keyingtries= IPSec2Auto= IPSec2SharedSecret= IPSec2LeftSubnet= IPSec2LeftID= IPSec2RightSubnet= IPSec2RightID= IPSec2RightPubkey= IPSec3ZoneName= IPSec3Interface= IPSec3RightIP= IPSec3Authby= IPSec3Keyingtries= IPSec3Auto= IPSec3SharedSecret= IPSec3LeftSubnet= IPSec3LeftID= IPSec3RightSubnet= IPSec3RightID= IPSec3RightPubkey= IPSec4ZoneName= IPSec4Interface= IPSec4RightIP= IPSec4Authby= IPSec4Keyingtries= IPSec4Auto= IPSec4SharedSecret= IPSec4LeftSubnet= IPSec4LeftID= IPSec4RightSubnet= IPSec4RightID= IPSec4RightPubkey= IPSec5ZoneName= IPSec5Interface= IPSec5RightIP= IPSec5Authby= IPSec5Keyingtries= IPSec5Auto= IPSec5SharedSecret= IPSec5LeftSubnet= IPSec5LeftID= IPSec5RightSubnet= IPSec5RightID= IPSec5RightPubkey= DialupConnOffice=continuous DialupConnOutside=continuous DialupConnWeekend=continuous ISDNZoneName= ISDNOptions_Interfaces_Shorewall= ISDNOptions_Hosts_Shorewall= ISDNRestriction_Shorewall= ISDNProviders= ISDNInterfacesList='get: interfaces.pl isdn;' ISDNProvidersList='get: isdn-providers.pl ;' ISDNChosenProvider='get: set-provider.pl;' ISDNProviderInfo='get: isdn-providers.pl --info ;' ISDNCardsList='get: isdn-cards.pl ;' ISDNCardInfo='get: isdn-cards.pl --info ;' ISDNDriver= ISDNDeviceType= ISDNIrq= ISDNMem= ISDNIo= ISDNIo0= ISDNIo1= ISDNProtocol= ISDNCardDescription= ISDNCardVendor= ISDNId= ISDNProvider= ISDNProviderPhone= ISDNProviderDomain= ISDNProviderDNS1= ISDNProviderDNS2= ISDNDialing= ISDNHomePhone= ISDNLogin= ISDNPassword= ISDNConfirmPassword= PPPZoneName= PPPOptions_Interfaces_Shorewall= PPPOptions_Hosts_Shorewall= PPPRestrictionList_Shorewall= PPPInterfacesList='get: interfaces.pl modem;' PPPChosenProvider='get: set-provider.pl;' PPPProviders= PPPDevice= PPPDeviceSpeed= PPPConnectionName= PPPProviderPhone= PPPProviderDomain= PPPProviderDNS1= PPPProviderDNS2= PPPLogin= PPPPassword= PPPConfirmPassword= PPPAuth= PPPSpecialCommand= ADSLInterfacesList='get: interfaces.pl adsl;' ADSLChosenProvider='get: set-provider.pl;' ADSLPhysicalInterface= ADSLProviders= ADSLModem= ADSLType= ADSLProviderDomain= ADSLProviderDNS1= ADSLProviderDNS2= ADSLLogin= ADSLPassword= ADSLConfirmPassword= ADSLAutomaticReconnect=off ADSLAutomaticReconnectDelay=5 MONITORINGEnable=yes DynamicImagesPath=/genfiles InterfaceVolume='get: sumtraffic' NaatServerPort=8443 PowerOff='get: gotosleep.sh' # to make multiple config-wrapper on different List GetLists='get: getlists.sh' ProtocolList='get: list.protocol.pl' PortList='get: list.services.pl'