beautypg.com

Firewall commands, 364 example – Technicolor - Thomson ST585 V6 User Manual

Page 388

background image

E-DOC-CTC-20061027-0004 v1.0

Firewall Commands

364

EXAMPLE:

=>firewall rule list

Rules (flags: C=Constant, D=Dynamic, E=Enable, L=Log)
=====
Chain

Nr.

Flags

Rule

---------------------------------------------------------------------------------------
sink

1

CDE

: link

sink_fire

2

CDE

: link

sink_system_service

sink_fire

1

C E

SSDP

: accept

ssdp_serv lan.* > *.ssdp_ip

sink_system_service

1

CDE

HTTPI

: accept

HTTPI_sv_0 HTTPI_if_0.* > *.*

2

DE

PING_RESPONDER

: accept

PING_RESPONDER_sv_0 PING_RESPON

DER_

if_0.* > *.*

3

CD

SENDTO_LISTEN

: accept

SENDTO_LISTEN_sv_0 *.* > *.*

4

D

ICMP_LISTEN

: accept

ICMP_LISTEN_sv_0 *.* > *.*

5

CD

SRAS

: accept

SRAS_sv_0 *.* > *.*

6

CD

RAS

: accept

RAS_sv_0 *.* > *.*

7

CDE

MDAP

: accept

MDAP_sv_0 *.* > *.*

8

CDE

SNMP_AGENT

: accept

SNMP_AGENT_sv_0 SNMP_AGENT_
if_0.* > *.*

9

CD

DHCP-S

: accept

DHCP-S_sv_0 *.* > *.*

10

CDE

DHCP-R

: accept

DHCP-R_sv_0 DHCP-R_if_0.* > *.*

11

CDE

DNS-S

: accept

DNS-S_sv_0 DNS-S_if_0.* > *.*

12

CD

RIP-Query

: accept

RIP-Query_sv_0 *.* > *.*

13

CDE

RIP

: accept

RIP_sv_0 *.* > *.*

14

CDE

TELNET

: accept

TELNET_sv_0 TELNET_if_0.* > *.*

15

CDE

FTP

: accept

FTP_sv_0 FTP_if_0.* > *.*

16

CDE

HTTPs

: accept

HTTPs_sv_0 HTTPs_if_0.* > *.*

17

CDE

HTTP

: accept

HTTP_sv_0 HTTP_if_0.* > *.*

forward

1

CDE

: link

forward_fire

2

CDE

: link

forward_host_service

3

CDE

: link

forward_level

forward_level

1

CDE

: link

forward_level_Disabled

forward_level_Disabled

1

C E

AnyTraffic

: accept

*.* > *.*

source

1

CDE

: link

source_fire

source_fire

1

C E

AnyTraffic

: accept

*.* > *.*

=>
=>firewall rule list format=cli
:firewall rule add chain=sink_fire index=1 name=SSDP srcintf=lan dstip=ssdp_ip serv=ssdp_serv

| log=disabled state=enabled action=accept
:firewall rule add chain=source_fire index=1 name=AnyTraffic log=disabled state=enabled
| action=accept
:firewall rule add chain=forward_level_BlockAll index=1 name=AnyTraffic log=disabled state=en
abled
| action=drop
:firewall rule add chain=forward_level_Standard index=1 name=FromLAN srcintf=lan log=disabled

| state=enabled action=accept
:firewall rule add chain=forward_level_Disabled index=1 name=AnyTraffic log=disabled state=en
abled
| action=accept
=>