Sophie

Sophie

distrib > Mandriva > 9.1 > i586 > by-pkgid > de8870cc2bc47a132becd0a8ece4f4b6 > files > 23

naat-backend-0.8-28mdk.i586.rpm

Updated=no
UpdateInterface='get: update-network-config.sh'
CurrentInterfaces=
SystemName=
DomainName=
DNSPrimaryIP=
DNSSecondaryIP=
IPAdmin=all
AdminInterface=eth0
FullAdminName=admin
ChangeAdminPasswd='set: change-password.pl'
CurrentMirror=ftp://ftp.adv.mandrakesoft.com:20002/Mandrake/updates
PackagesList=
OfficialList='get: mirrors.pl'
PackagesToUpdate='get: packages_to_update.pl'
PackagesToDownload='get: download_packages.pl'
PackagesToInstall='get: rpm-install.pl'
PackageDescription='get: show_description.pl'
DHCPClient=dhcp-client
DHCPServer=off
DHCPInterface=
DHCPDomainName=
DHCPWINSServer=
DHCPServerEnd=
DHCPServerStart=
DHCP_LEASE_DEFAULT=21600
DHCP_LEASE_MAX=43200
DNS_SERVER_DYN_UPDATE=Y
DNS_UPDATER_SECRET=Y
SYSLOGLocal=on
SYSLOGTargetServer=
SYSLOGTargetServerLevel=*
SYSLOGTty=tty12
SYSLOGTtyLevel=alert
PreludeState=off
SnortState=off
SnortLogs='get: snortsnarf.sh'
MessagesLogs='get: logs.pl'
DynDnsAccount=dnsaccount
DynDnsPassword=dnspassword
DynDnsService=off
DNSServer=off
ChrootDNSServerOn='set: chroot_bind.sh -c /var/lib/named-chroot'
ChrootDNSServerOff='set: chroot_bind.sh -u'
TimeZoneList='get: timezone.pl tzlist'
Zone=Europe/Paris
ChangeDate='set: date.pl $md5 '
NTPServer=timeserv
ServicesList='get: services.pl list'
ServiceStatus='get: services.pl status'
ServiceRestart='set: services.pl restart'
ServiceReload='set: services.pl reload'
ServiceStart='set: services.pl start'
ServiceStop='set: services.pl stop'
ServiceRemove='set: services.pl remove'
ServiceAdd='set: services.pl add'
SquidServer=off
SquidServerAuthentication=none
SquidServerAuthenticationOptions=none
SquidParents=N
SquidPort=3328
SquidCacheDir=/var/spool/squid
SquidCacheSize=150
SquidWarningMesage=<A HREF=mailto:admin@yourdomain.com>Mail to Admin</A>
SquidWarningMesagePosition=Bottom
SquidAlertEmail=admin@yourdomain.com
SquidRedirector=squidGuard
SquidAnonymizer=Y
RedirectAddress=127.0.0.1:8444
UrlFilter=off
SquidGuardAddPrivilegedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -a '
SquidGuardDeletePrivilegedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -d'
SquidGuardPrivilegedIpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/privilegedsource/ips -l'
SquidGuardAddBannedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -a '
SquidGuardDeleteBannedIp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -d'
SquidGuardBannedIpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/bannedsource/ips -l'
SquidGuardAddLansourceNetworkMask='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -a '
SquidGuardDeleteLansourceNetworkMask='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -d'
SquidGuardLansourceNetworkMasksList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/lansource/lan -l'
SquidGuardAddBanneddestinationUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -a '
SquidGuardDeleteBanneddestinationUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -d'
SquidGuardBanneddestinationUrlsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/urls -l'
SquidGuardAddBanneddestinationDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -a '
SquidGuardDeleteBanneddestinationDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -d'
SquidGuardBanneddestinationDomainsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/domains -l'
SquidGuardAddBanneddestinationRegExp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -ea '
SquidGuardDeleteBanneddestinationRegExp='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -ed'
SquidGuardBanneddestinationRegExpsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/banneddestination/expressions -el'
SquidGuardAddAdvertisingUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -a '
SquidGuardDeleteAdvertisingUrl='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -d'
SquidGuardAdvertisingUrlsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/urls -l'
SquidGuardAddAdvertisingDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -a '
SquidGuardDeleteAdvertisingDomain='set: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -d'
SquidGuardAdvertisingDomainsList='get: web_filter_manage.pl $md5 /usr/share/squidGuard-1.2.0/db/advertising/domains -l'
SquidGuardAlertEmail=admin@yourdomain.com
SquidGuardDb=/usr/share/squidGuard-1.2.0/db
SquidGuardLogDir=/var/log/squidGuard
SquidGuardTimeRestriction=Y
SquidGuardTimeRestrictionRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u
SquidGuardWorkHoursSunAM=09:30-12:00
SquidGuardWorkHoursSunPM=13:00-19:00
SquidGuardWorkHoursMonAM=09:00-12:00
SquidGuardWorkHoursMonPM=13:00-19:00
SquidGuardWorkHoursTueAM=09:00-11:00
SquidGuardWorkHoursTuePM=12:00-19:00
SquidGuardWorkHoursWedAM=09:00-12:00
SquidGuardWorkHoursWedPM=12:00-18:00
SquidGuardWorkHoursThuAM=09:00-13:00
SquidGuardWorkHoursThuPM=13:00-18:00
SquidGuardWorkHoursFriAM=09:00-12:00
SquidGuardWorkHoursFriPM=13:30-18:00
SquidGuardWorkHoursSatAM=08:20-13:00
SquidGuardWorkHoursSatPM=13:30-19:00
SquidGuardPrivilegedSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u
SquidGuardBannedSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u
SquidGuardBannedSourceLog=
SquidGuardLanSourceRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u
SquidGuardLanSourceLog=
SquidGuardAdvertisingRedirectUrl=nulbanner.png
SquidGuardAdvertisingLog=/var/log/squidGuard/advertising.log
SquidGuardDefaultRedirectUrl=squidGuard.cgi?clientaddr=%a&srcclass=%s&targetclass=%t&url=%u
SquidGuardBackup='get: squidGuard_backup.pl $md5 --backup'
SquidGuardRestore='get: squidGuard_backup.pl $md5 --restore'
ContentFilter=off
ContentFilterPort=8080
ContentFilterRedirectUrl=dansguardian.cgi
ContentFilterBannedextensionList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -l'
ContentFilterAddBannedextension='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -a '
ContentFilterDeleteBannedextension='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedextensionlist -d'
ContentFilterBannedmimetypeList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -l'
ContentFilterAddBannedmimetype='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -a '
ContentFilterDeleteBannedmimetype='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedmimetypelist -d'
ContentFilterBannedphraseList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -l'
ContentFilterAddBannedphrase='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -a '
ContentFilterDeleteBannedphrase='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedphraselist -d'
ContentFilterBannedregexpurlList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -l'
ContentFilterAddBannedregexpurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -a '
ContentFilterDeleteBannedregexpurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedregexpurllist -d'
ContentFilterBannedsiteList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -l'
ContentFilterAddBannedsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -a '
ContentFilterDeleteBannedsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedsitelist -d'
ContentFilterBannedurlList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -l'
ContentFilterAddBannedurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -a '
ContentFilterDeleteBannedurl='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedurllist -d'
ContentFilterBannedexceptionipList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -l'
ContentFilterAddBannedexceptionip='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -a '
ContentFilterDeleteBannedexceptionip='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptioniplist -d'
ContentFilterBannedexceptionsiteList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -l'
ContentFilterAddBannedexceptionsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -a '
ContentFilterDeleteBannedexceptionsite='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionsitelist -d'
ContentFilterBannedexceptionuserList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -l'
ContentFilterAddBannedexceptionuser='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -a '
ContentFilterDeleteBannedexceptionuser='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedexceptionuserlist -d'
ContentFilterBannedpicsList='get: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -l'
ContentFilterAddBannedpics='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -a '
ContentFilterDeleteBannedpics='set: web_filter_manage.pl $md5 /etc/dansguardian/bannedpicslist -d'
BannerFilter=off
UsersList='get: users.pl'
UserCreate='set: users.pl -a'
UserDelete='set: users.pl -d'
UserShell='get: users.pl --shell -g ; set: users.pl --shell -s'
UserHome='get: users.pl --home -g ; set: users.pl --home -s'
UserPasswd='set: users.pl --passwd'
UserPrimaryGroup='get: users.pl --primarygroup -g ; set: users.pl --primarygroup -s'
UserGroupsList='get: users.pl --groups -g ; set: users.pl --groups -s'
FilteringRules=on
FirewallMasquerade=on
Filtering=start
FirewallLogs='get: fwlogsummary.pl'
FirewallingLog=off
FirewallLogDegre=info
FirewallReject=DROP
FirewallConfigType=expert
FirewallLevelVar=
FirewallServices='get: rules_sorting.pl'
FirewallLevel='get: change-firewalling-level.pl return_level; trigger: change-firewalling-level.pl'
FirewallCleanRules='get: clean_rules.pl'
TcpOfficeServices='get: rules_sorting.pl -r -c local -s net -p tcp; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT -p tcp'
UdpOfficeServices='get: rules_sorting.pl -r -c local -s net -p udp; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT -p udp'
OtherOfficeServices='get: rules_sorting.pl -r -c local -s net -p other; trigger: add_rule.pl FirewallRules -c local -s net -r ACCEPT'
TcpInternetServices='get: rules_sorting.pl -r -n -c net -s local -p tcp; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT -p tcp'
UdpInternetServices='get: rules_sorting.pl -r -n -c net -s local -n -p udp ; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT -p udp'
OtherInternetServices='get: rules_sorting.pl -r -n -c net -s local -n -p other; trigger: add_rule.pl FirewallRules -c net -s local -r ACCEPT'
TcpFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -p tcp; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT -p tcp'
UdpFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -n -p udp ; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT -p udp'
OtherFirewallServices='get: rules_sorting.pl -r -n -c local -s fw -n -p other; trigger: add_rule.pl FirewallRules -c local -s fw -r ACCEPT'
TmpTcpOfficeServices=
ModifyRule='get: swap_rules_to_tmp_vars.pl; trigger: add_rule.pl'
TmpPort=
TmpProtocol=
TmpNat=
TmpServer=
TmpClient=
TmpServerForward=
TmpResult=
TmpKey=
Masquerade=
FirewallPolicy=
FirewallRules=
FirewallAudit=1(protocol=tcp port=telnet),2(protocol=tcp port=ftp),3(protocol=udp port=31337 log=error)
FirewallBlockedServices=1(protocol=tcp ports=6000:6063 result=DROP log=warning),service2(protocol=udp ports=2049)
FirewallAlwaysForwardServices=1(protocol=tcp port=domain),2 (protocol=udp port=domain)
FirewallingLevel='get: change-firewalling-level.pl'
FirewallingConfigType=fast
FirewallingRuleAnalyse='get: analyse-firewalling-rules.pl'
FirewallingOptimizeTOS=off
TCP_AUDIT_SERVICES=
UDP_AUDIT_SERVICES=
ICMP_AUDIT_TYPES=
TCP_PUBLIC_SERVICES=ssh (forward=--- action=allow),8443 (forward=--- action=allow)
UDP_PUBLIC_SERVICES=25 (forward=--- action=allow)
NET_DMZ=
TCP_INTERNAL_SERVICES=ssh,3328
UDP_INTERNAL_SERVICES=
LOC_DMZ_HOST=web (ip=10.1.1.1 services=80 protocol=tcp;udp LOC=allow NET=allow FW=allow),web1 (ip=10.1.1.1 services=80 protocol=tcp;udp LOC=allow NET=allow FW=allow)
LOC_DMZ_POLICY=REJECT
LOC_DMZ_SERVICES=https (forward=--- protocol=tcp+udp action=allow),ssh (forward=--- protocol=tcp action=allow),imap (forward=10.2.3.5 protocol=udp action=allow),http (forward=10.2.2.2 protocol=tcp+udp action=allow),25 (forward=10.2.2.2 protocol=udp action=allow)
LOC_NET_POLICY=ACCEPT
LOC_NET_SERVICES=all (forward=--- protocol=all action=allow)
LOC_FW_POLICY=REJECT
LOC_FW_SERVICES=
TCP_FORWARD_SERVICES=all
UDP_FORWARD_SERVICES=firewall
GetZonesList='get: shorewall_manage.pl $md5 /etc/shorewall/zones -lt'
# The following variable allow to get an new ID and to be the last id in a Dyntable's variable with ID
AddId='get: addid.sh'
# Return the current id depend on criteria (E.g: GetId Variable attribut=value)
GetId='get: getid.sh'
# Filter a list on criteria (Eg: return only rules contains client=lan)
ListFilter='get: list_filter.sh'
ZonesList= 1 (zone=lan comments=local_area_network display=LAN),2 (zone=dmz comments=demilitarized_zone display=DMZ),3 (zone=wan comments=internet display=NET)
#Example : ZonesList=1 (zone=loc comments=local_area_network display=LAN),2 (zone=dmz comments=demilitarized_zone display=DMZ),3 (zone=net comments=internet display=NET)
InterfacesList=
#Example : InterfacesList=1 (zone=dmz interface=eth1 broadcast=detect options=noping+routestopped),2 (zone=lan interface=eth2 broadcast=detect options=roustopped),3 (zone=wan interface=ppp+ broadcast=- options=-)
#Example : HostsList=1 (zone=wan interface=eth2 ip=10.1.1.0/24 options=-),3 (zone=lan interface=eth1 ip=10.10.1.2 options=routestopped)
HostsList=
#Example : MasqList=1 (interface=ppp+ ip=!192.168.1.0/24 subnet=192.168.1.0:24)
MasqList=
#Example : NatList=1 (external=206.124.146.178 interface=eth0 internal=192.168.1.5 all=no local=no),2 (external=206.124.146.179 interface=eth0 internal=192.168.1.6 all=no local=no),3 (external=206.124.146.180 interface=eth0 internal=192.168.1.7 all=no local=no)
NatList=
#Example : ProxyarpList=1 (address=206.124.146.177 interface=eth1 external=eth0 haveroute=no)
ProxyarpList=
#Example : VpnList=1 (type=ipsec zone=net gw=130.252.100.21 host=-),2 (type=ipsec zone=net gw=130.252.100.22 host=tx)
VpnList=
#Example : PolicyList=7 (policy=ACCEPT log_level=- client=wanserver=fw),8 (policy=DROP log_level=info client=wan server=all),4 (policy=ACCEPT log_level=- client=lan server=all)
PolicyList=1 (policy=REJECT log_level=info client=lan server=all),2 (policy=REJECT log_level=info client=dmz server=all),3 (policy=REJECT log_level=info client=fw server=all),4 (policy=REJECT log_level=info client=wan server=all),5 (policy=REJECT log_level=info client=all server=all)
#Example : RulesList=1 (result=ACCEPT log_level=info client_zone=wan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=www client_port=- address=192.168.1.12 ip_snat=-)
RulesList=1 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=wan server_ip=- server_port=- proto=tcp+udp port=53 client_port=- address=- ip_snat=-),2 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=wan server_ip=- server_port=- proto=udp port=53 client_port=- address=- ip_snat=-),3 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=wan server_ip=- server_port=- proto=udp port=53 client_port=- address=- ip_snat=-),4 (result=REJECT log_level=- client_zone=wan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=113 client_port=- address=- ip_snat=-),5 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=22 client_port=- address=- ip_snat=-),6 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=tcp port=8443 client_port=- address=- ip_snat=-),7 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=lan server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),8 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=fw server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),9 (result=ACCEPT log_level=- client_zone=lan client_ip=- server_zone=dmz server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),10 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=lan server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),11 (result=ACCEPT log_level=- client_zone=dmz client_ip=- server_zone=fw server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-),12 (result=ACCEPT log_level=- client_zone=fw client_ip=- server_zone=dmz server_ip=- server_port=- proto=icmp port=8 client_port=- address=- ip_snat=-)
# Blacklist entry : ip/subnet separate by comma (10.0.0.0/8,10.1.1.1)
BlacklistList=
#Example : TosList=1 (client_zone=wan client_ip=- server_zone=fw server_ip=- proto=tcp client_port=- server_port=- tos=16)
TosList=1 (client_port=- client_zone=all server_ip=--- tos=16 server_port=ssh server_zone=all client_ip=--- proto=tcp),2 (client_zone=all client_port=ssh server_ip=--- tos=16 server_port=- server_zone=all client_ip=--- proto=tcp),3 (client_port=- client_zone=all server_ip=--- tos=16 server_port=ftp server_zone=all client_ip=--- proto=tcp),4 (client_zone=all client_port=ftp server_ip=--- tos=16 server_port=- server_zone=all client_ip=--- proto=tcp),5 (client_port=- client_zone=all server_ip=--- tos=8 server_port=ftp-data server_zone=all client_ip=--- proto=tcp),6 (client_zone=all client_port=ftp-data server_ip=--- tos=8 server_port=- server_zone=all client_ip=--- proto=tcp)
NET_IF=eth1
NET_LABEL=Internet Zone
NET_OPTIONS=noping,routestopped,norfc1918,routefilter,multi
NET_BCAST=detect
DMZ_IF=eth0
DMZ_LABEL=DMZ Zone
DMZ_OPTIONS=noping,norfc1918
DMZ_BCAST=detect
DMZ_LOC_POLICY=REJECT
DMZ_LOC_SERVICES=https (forward=--- protocol=tcp+udp action=allow),http (forward=--- protocol=tcp action=allow)
DMZ_NET_POLICY=ACCEPT
DMZ_NET_SERVICES=all (forward=--- action=allow)
DMZ_FW_POLICY=REJECT
DMZ_FW_SERVICES=
DMZ_FW_UDP_SERVICES=
LOC_IF=eth0,eth1
LOC_LABEL=Office Zone
LOC_OPTIONS=noping
LOC_BCAST=detect
FW_IF=
FW_LABEL=Firewall
FW_OPTIONS=
FW_BCAST=
FW_NET=
FW_DMZ=
FW_LOC=
DMZ_NET=
DMZ_LOC=
DMZ_FW=
TCP_BLOCKED_SERVICES=6000:6020
UDP_BLOCKED_SERVICES=2049
ICMP_ALLOWED_TYPES=destination-unreachable,echo-reply,time-exceeded
IP_MASQ_MODULES=cuseeme,ftp,irc,quake,raudio,vdolive,dplay,icq,h323
ICMP_OUTBOUND_DISABLED_TYPES=
FirewallAlwaysForwardPortTCP=domain
FirewallAlwaysForwardPortUDP=domain
FORCE_PASV_FTP=Y
LOG_FAILURES=N
ENABLE_SRC_ADDR_VERIFY=Y
REJECT_METHOD=DENY
TmpInterfaceToSet=
InternetAccessType=
InternetInterface=
InternetOnBoot=
InternetGateway=
EthZonesList='get: ethernet-known-interfaces.pl'
HostToPing=198.41.0.6
InternetStart='get: internet-access.pl -start;'
InternetStop='get: internet-access.pl -stop;'
EthernetInterfacesList='get: interfaces.pl net;'
EthernetModulesList='get: ethernet-modules.pl;'
EthernetLoadModule='get: ethernet-modules.pl --load;'
EthernetKnownInterfaces='get: ethernet-known-interfaces.pl ;'
Eth0_OPTIONS=dhcp,noping,routestopped,multi,dropunclean
Eth0_BCAST=detect
Eth0ZoneName=
Eth0OptionsInterfacesShorewall=
Eth0RestrictionShorewall=
Eth0OptionsHostsShorewall=
Eth0Known=
Eth0IP=
Eth0Mask=
Eth0Mac=
Eth0BootProto=
Eth0OnBoot=yes
Eth0Hostname=
Eth0HostAlias=
Eth0Driver=
Eth0Irq=
Eth0Port=
Eth0DHCPClient=
Eth0DHCPHostname=
Eth0DHCPServerName=
Eth1ZoneName=
Eth1_OPTIONS=
Eth1_BCAST=detect
Eth1OptionsInterfacesShorewall=
Eth1RestrictionShorewall=
Eth1OptionsHostsShorewall=
Eth1Known=true
Eth1IP=
Eth1Mask=
Eth1Mac=
Eth1BootProto=
Eth1OnBoot=yes
Eth1Hostname=
Eth1HostAlias=
Eth1Driver=
Eth1Irq=
Eth1Port=
Eth1DHCPClient=/sbin/dhcpcd
Eth1DHCPHostname=
Eth1DHCPServerName=
Eth2ZoneName=
Eth2OptionsInterfacesShorewall=
Eth2RestrictionShorewall=
Eth2OptionsHostsShorewall=
Eth2Known=false
Eth2IP=
Eth2Mask=
Eth2Mac=
Eth2BootProto=
Eth2OnBoot=
Eth2Hostname=
Eth2HostAlias=
Eth2Driver=
Eth2Irq=
Eth2Port=
Eth2DHCPClient=
Eth2DHCPHostname=
Eth2DHCPServerName=
Eth3ZoneName=
Eth3OptionsInterfacesShorewall=
Eth3RestrictionShorewall=
Eth3OptionsHostsShorewall=
Eth3Known=false
Eth3IP=
Eth3Mask=
Eth3Mac=
Eth3BootProto=
Eth3OnBoot=
Eth3Hostname=
Eth3HostAlias=
Eth3Driver=
Eth3Irq=
Eth3Port=
Eth3DHCPClient=
Eth3DHCPHostname=
Eth3DHCPServerName=
Eth4ZoneName=
Eth4OptionsInterfacesShorewall=
Eth4RestrictionShorewall=
Eth4OptionsHostsShorewall=
Eth4Known=false
Eth4IP=
Eth4Mask=
Eth4Mac=
Eth4BootProto=
Eth4OnBoot=
Eth4Hostname=
Eth4HostAlias=
Eth4Driver=
Eth4Irq=
Eth4Port=
Eth4DHCPClient=
Eth4DHCPHostname=
Eth4DHCPServerName=
FREESWAN_REP=/etc/freeswan
LOCAL_RSA_KEYS=
PLUTOT_DEBUG=no
VPN=off
IPSecZonesList='get: ipsec-know-interfaces.pl --with-zones'
IPSec0ZoneName=
IPSec0Interface=
IPSec0Authby=
IPSec0Keyingtries=
IPSec0Auto=
IPSec0SharedSecret=
IPSec0LeftID=
IPSec0RightSubnet=
IPSec0RightID=
IPSec0RightIP=
IPSec0RightPubkey=
IPSec1ZoneName=
IPSec1Interface=
IPSec1RightIP=
IPSec1Authby=
IPSec1Keyingtries=
IPSec1Auto=
IPSec1SharedSecret=
IPSec1LeftSubnet=
IPSec1LeftID=
IPSec1RightSubnet=
IPSec1RightID=
IPSec1RightPubkey=
IPSec2ZoneName=
IPSec2Interface=
IPSec2RightIP=
IPSec2Authby=
IPSec2Keyingtries=
IPSec2Auto=
IPSec2SharedSecret=
IPSec2LeftSubnet=
IPSec2LeftID=
IPSec2RightSubnet=
IPSec2RightID=
IPSec2RightPubkey=
IPSec3ZoneName=
IPSec3Interface=
IPSec3RightIP=
IPSec3Authby=
IPSec3Keyingtries=
IPSec3Auto=
IPSec3SharedSecret=
IPSec3LeftSubnet=
IPSec3LeftID=
IPSec3RightSubnet=
IPSec3RightID=
IPSec3RightPubkey=
IPSec4ZoneName=
IPSec4Interface=
IPSec4RightIP=
IPSec4Authby=
IPSec4Keyingtries=
IPSec4Auto=
IPSec4SharedSecret=
IPSec4LeftSubnet=
IPSec4LeftID=
IPSec4RightSubnet=
IPSec4RightID=
IPSec4RightPubkey=
IPSec5ZoneName=
IPSec5Interface=
IPSec5RightIP=
IPSec5Authby=
IPSec5Keyingtries=
IPSec5Auto=
IPSec5SharedSecret=
IPSec5LeftSubnet=
IPSec5LeftID=
IPSec5RightSubnet=
IPSec5RightID=
IPSec5RightPubkey=
DialupConnOffice=continuous
DialupConnOutside=continuous
DialupConnWeekend=continuous
ISDNZoneName=
ISDNOptions_Interfaces_Shorewall=
ISDNOptions_Hosts_Shorewall=
ISDNRestriction_Shorewall=
ISDNProviders=
ISDNInterfacesList='get: interfaces.pl isdn;'
ISDNProvidersList='get: isdn-providers.pl ;'
ISDNChosenProvider='get: set-provider.pl;'
ISDNProviderInfo='get: isdn-providers.pl --info ;'
ISDNCardsList='get: isdn-cards.pl ;'
ISDNCardInfo='get: isdn-cards.pl --info ;'
ISDNDriver=
ISDNDeviceType=
ISDNIrq=
ISDNMem=
ISDNIo=
ISDNIo0=
ISDNIo1=
ISDNProtocol=
ISDNCardDescription=
ISDNCardVendor=
ISDNId=
ISDNProvider=
ISDNProviderPhone=
ISDNProviderDomain=
ISDNProviderDNS1=
ISDNProviderDNS2=
ISDNDialing=
ISDNHomePhone=
ISDNLogin=
ISDNPassword=
ISDNConfirmPassword=
PPPZoneName=
PPPOptions_Interfaces_Shorewall=
PPPOptions_Hosts_Shorewall=
PPPRestrictionList_Shorewall=
PPPInterfacesList='get: interfaces.pl modem;'
PPPChosenProvider='get: set-provider.pl;'
PPPProviders=
PPPDevice=
PPPDeviceSpeed=
PPPConnectionName=
PPPProviderPhone=
PPPProviderDomain=
PPPProviderDNS1=
PPPProviderDNS2=
PPPLogin=
PPPPassword=
PPPConfirmPassword=
PPPAuth=
PPPSpecialCommand=
ADSLInterfacesList='get: interfaces.pl adsl;'
ADSLChosenProvider='get: set-provider.pl;'
ADSLPhysicalInterface=
ADSLProviders=
ADSLModem=
ADSLType=
ADSLProviderDomain=
ADSLProviderDNS1=
ADSLProviderDNS2=
ADSLLogin=
ADSLPassword=
ADSLConfirmPassword=
ADSLAutomaticReconnect=off
ADSLAutomaticReconnectDelay=5
MONITORINGEnable=yes
DynamicImagesPath=/genfiles
InterfaceVolume='get: sumtraffic'
NaatServerPort=8443
PowerOff='get: gotosleep.sh'
# to make multiple config-wrapper on different List
GetLists='get: getlists.sh'
ProtocolList='get: list.protocol.pl'
PortList='get: list.services.pl'