aboutsummaryrefslogtreecommitdiffstats
path: root/package/firewall/files
Commit message (Expand)AuthorAgeFilesLines
* firewall: fix zone defaultsFelix Fietkau2009-10-111-2/+19
* firewall: do not process rules in reverseFelix Fietkau2009-10-101-1/+1
* [package] firewall: fix MSS issue affection RELATED new connections (closes: ...Nicolas Thill2009-09-272-4/+4
* firewall: add sanity checks to zone default rules (patch from #5459)Felix Fietkau2009-09-241-3/+3
* [package] firewall: move the config_get out of the loop, no need to call it m...Jo-Philipp Wich2009-09-141-2/+3
* [package] firewall: properly dispatch delif events if the network has a diffe...Jo-Philipp Wich2009-09-141-1/+1
* firewall: emit hotplug events for interface add/removeFelix Fietkau2009-08-261-0/+2
* [package] firewall: allow incoming udp/68 packets in the default configuratio...Jo-Philipp Wich2009-08-131-0/+8
* [package] firewall: add icmp_type option to specify the icmp type in rule sec...Jo-Philipp Wich2009-08-031-0/+3
* [package] fix typo in the uci firewall scriptFlorian Fainelli2009-05-261-1/+1
* firewall: automatically set up NOTRACK rules to disable connection tracking f...Felix Fietkau2009-05-141-13/+43
* [package] firewall: process custom rules after forwardings and redirects, thi...Jo-Philipp Wich2009-04-191-2/+2
* [package] firewall: enable /etc/firewall.user by default and install sample f...Jo-Philipp Wich2009-04-122-4/+8
* re-enable the mss fix by default for now - see discussion at http://lists.ope...Felix Fietkau2009-01-311-5/+1
* firewall: don't clear the mangle table at startup or stop - it doesn't use it...Felix Fietkau2009-01-201-4/+0
* firewall: introduce drop_invalid option to allow disabling the invalid state ...Jo-Philipp Wich2009-01-161-7/+10
* firewall: allow multiple interfaces to be part of one zone, fix the sanity ch...Felix Fietkau2009-01-162-39/+52
* firewall: clear the MSSFIX rulesFelix Fietkau2009-01-021-0/+1
* Unify portrange-support in firewall rule generatorSteven Barth2009-01-011-0/+10
* disable the MSS fixup hack by default (most ISPs don't require this as a work...Felix Fietkau2008-12-312-1/+9
* fixes firewall for trunk, custom chains were never reched, as policies apply ...John Crispin2008-10-141-3/+3
* fixes firewall rule generation. forwarding rules were inserted in input chain...John Crispin2008-09-281-3/+6
* custom chains were never reached on DROP/REJECT policy, fixes #4004 #4029John Crispin2008-09-281-3/+3
* set default input policy to ACCEPT to bring the firewall behavior closer to t...Felix Fietkau2008-09-281-1/+1
* firewall: fix default policies, add a check for duplicate defaults sections a...Felix Fietkau2008-09-281-18/+34
* firewall changes:Nicolas Thill2008-09-242-33/+57
* Fixed a typo in the firewall scriptsSteven Barth2008-09-161-1/+1
* Fixed a typo in firewall scripts, closes #4000Steven Barth2008-09-151-1/+1
* make uci firewall backwards compatible to the old firewall.userJohn Crispin2008-08-271-2/+9
* add proto tcpudp to firewallJohn Crispin2008-08-271-38/+51
* fix device duplication in firewall if the balancing of ifup and ifdown is brokenJohn Crispin2008-08-271-2/+9
* make sure uci firewall reverts its states when stoppedJohn Crispin2008-08-271-0/+1
* fixes uci firewall init order, Signed-off-by: Roberto Riggio John Crispin2008-08-271-2/+2
* firewall: Added support for port-ranges as firstPort-lastPort to redirect sec...Steven Barth2008-08-271-0/+17
* adds 5 new chains to the uci firewall that can be used to hook custom rulesJohn Crispin2008-08-271-1/+16
* adds more sanity checks to uci firewallJohn Crispin2008-08-261-0/+4
* use proto instead of protocol in uci firewallJohn Crispin2008-08-262-6/+6
* fix some firewall script typos (patch from #3897)Felix Fietkau2008-08-171-2/+3
* fix typo, proto should be protocolTravis Kemen2008-08-161-1/+1
* trigger error if dport is used when no proto is definedJohn Crispin2008-08-151-0/+4
* uci firewallJohn Crispin2008-08-118-270/+0
* uci_firewallJohn Crispin2008-08-111-1/+1
* uci firewallJohn Crispin2008-08-112-9/+1
* adds a new uci firewallJohn Crispin2008-08-048-0/+696