Home
last modified time | relevance | path

Searched refs:em0 (Results 1 – 25 of 160) sorted by relevance

1234567

/dports/security/fwbuilder/fwbuilder-5.3.7/src/unit_tests/PFImporterTest/test_data/
H A Dpf-nat-rules.conf3 nat on em0 from 192.168.168.0/24 to any -> 192.0.2.111
4 nat on ! em0 from 192.168.168.0/24 to any -> 192.0.2.111
6 nat on em0 inet from any to any -> 192.0.2.16/28 bitmask
7 nat on em0 inet from any to any -> 192.0.2.16/28 random
16 nat on em0 inet proto udp from any port 10000 to any -> em0
17 nat on em0 inet proto udp from any port 10000 to any -> (em0)
18 nat on em0 inet proto udp from any port 10000 to any -> (em0) port 10000
19 nat on em0 inet proto udp from any port 10000:10010 to any -> (em0) port 10000
20 nat on em0 inet proto udp from any port 10000:10010 to any -> (em0) port 10000:*
28 no nat on em0 proto ah from 192.168.1.0/24 to any
[all …]
H A Dpf-nat-rules.output1 3: New interface: em0
2 3: nat rule: action nat; interfaces: em0
3 4: nat rule: action nat; interfaces: em0
4 6: nat rule: action nat; interfaces: em0
5 7: nat rule: action nat; interfaces: em0
6 8: nat rule: action nat; interfaces: em0
7 9: nat rule: action nat; interfaces: em0
8 10: nat rule: action nat; interfaces: em0
10 11: nat rule: action nat; interfaces: em0
12 12: nat rule: action nat; interfaces: em0
[all …]
H A Dpf-rdr-rules.conf3 rdr on em0 inet proto tcp from any to (em0) port 80 -> 10.0.1.111 port 8080
5 rdr on em0 inet proto tcp from any to any port 80 -> 127.0.0.1 port 8080
8 rdr on em0 inet proto tcp from any to (em0) port 80 -> \
12 no rdr on em0 inet proto tcp from 192.168.1.1 to any port 80
13 rdr on em0 inet proto tcp from 192.168.1.0/24 to any port 80 -> \
H A Dpf-rdr-rules.output1 3: New interface: em0
2 3: nat rule: action rdr; interfaces: em0
3 5: nat rule: action rdr; interfaces: em0
4 8: nat rule: action rdr; interfaces: em0
5 11: nat rule: action nonat; interfaces: em0
6 12: nat rule: action rdr; interfaces: em0
H A Dpf-route-to-4.7.conf2 pass in log quick inet from 192.168.1.0/24 to any route-to { ( em0 10.1.2.3 ) }
6 pass out quick on bce0 proto tcp from any port 80 to any dup-to (em0 10.1.2.3)
H A Dpf-route-to.conf2 pass in log quick route-to { ( em0 10.1.2.3 ) } inet from 192.168.1.0/24 to any
6 pass out quick on bce0 dup-to (em0 10.1.2.3) proto tcp from any port 80 to any
/dports/net-mgmt/p5-FusionInventory-Agent/FusionInventory-Agent-2.5.2/resources/generic/netstat/
H A Dopenbsd5 default 10.0.1.1 UGS 0 0 - 8 em0
6 10.0.1/24 link#1 UC 2 0 - 4 em0
7 10.0.1.1 00:1d:7e:43:96:57 UHLc 1 3 - 4 em0
8 10.0.1.100 00:13:77:b3:cf:0c UHLc 1 183 - 4 em0
/dports/sysutils/ansible-sshjail/ansible-sshjail-1.1.0-35-g35c3bf6/vagrant/
H A Djails.yml6 # em0 is NAT interface 10.0.2.0/24, see Vagrantfile
12 ipaddr: em0|10.0.2.21,em1|10.0.5.21
16 ipaddr: em0|10.0.2.22,em1|10.0.5.22
/dports/sysutils/iocell/iocell-2.1.2/doc/source/
H A Dnetworking.rst46 ``iocell set ip4_addr="em0|10.1.1.10/24" UUID| TAG``
52 ``iocell set ip4_addr="em0|10.1.1.10/24,em0|10.1.1.11/24" UUID| TAG``
103 # plumb interface em0 into bridge0
104 ifconfig_bridge0="addm em0 up"
163 ``iocell set ip4_addr="em0|192.168.0.10/24" UUID|TAG``
167 ``iocell set ip6_addr="em0|2001:123:456:242::5/64" UUID|TAG``
169 This will add an IP alias 192.168.0.10/24 to interface em0 for the shared IP jail at start time, as…
/dports/sysutils/bastille/bastille-00d9e03/docs/chapters/subcommands/
H A Drdr.rst20 rdr on em0 inet proto tcp from any to any port = 2001 -> 10.17.89.1 port 22
23 rdr on em0 inet proto tcp from any to any port = 2001 -> 10.17.89.1 port 22
24 rdr on em0 inet proto udp from any to any port = 2053 -> 10.17.89.1 port 53
/dports/math/R-cran-lava/lava/inst/doc/
H A Dnonlinear.R162 saveRDS(em0, "nonlinear_em0.rds")
164 em0 <- readRDS("nonlinear_em0.rds") globalVar
168 summary(em0)
172 AIC(e0,em0)
175 em2 <- twostage(em0,m2,data=d)
H A Dnonlinear.Rmd272 em0 <- mixture(m1, k=2, data=d)
279 em0 <- NULL
285 if (is.null(em0) || logLik(em0)<tail(ll,1))
286 em0 <- em
293 saveRDS(em0, "nonlinear_em0.rds")
295 em0 <- readRDS("nonlinear_em0.rds")
300 summary(em0)
307 AIC(e0,em0)
313 em2 <- twostage(em0,m2,data=d)
/dports/net-mgmt/librenms/librenms-21.5.1/tests/snmpsim/
H A Dtruenas_11-3.snmprec7 1.3.6.1.2.1.2.2.1.2.1|4|em0
376 1.3.6.1.2.1.25.3.2.1.3.262145|4|network interface em0
398 1.3.6.1.2.1.31.1.1.1.1.1|4|em0
/dports/sysutils/py-focker/focker-ce2108e3/example/scm-manager/
H A DREADME.md6 to replace `em0` with the name of your external interface and make sure that
16 echo "rdr on em0 proto tcp from any to (em0) port 8080 -> 127.0.55.1 port 8080" >>/etc/pf.conf
17 echo "nat on em0 from (lo1:network) -> (em0)" >>/etc/pf.conf
/dports/net-mgmt/p5-FusionInventory-Agent/FusionInventory-Agent-2.5.2/resources/generic/ifconfig/
H A Ddragonfly-11 em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
3 inet6 fe80::a00:27ff:fe2e:7097%em0 prefixlen 64 scopeid 0x1
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/junos_command/tests/netconf_json/
H A Dnotequal.yaml11 - "result[1]['interface-information'][0]['physical-interface'][0]['name'][0]['data'] neq em0"
28 - "result[1]['interface-information'][0]['physical-interface'][0]['name'][0]['data'] neq em0"
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/junipernetworks/junos/tests/integration/targets/junos_command/tests/netconf_json/
H A Dnotequal.yaml14 neq em0
32 neq em0
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/junipernetworks/junos/tests/integration/targets/junos_command/tests/netconf_xml/
H A Dnotequal.yaml13 - result[1].rpc-reply.interface-information.physical-interface.name neq em0
30 - result[1].rpc-reply.interface-information.physical-interface.name neq em0
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/junos_command/tests/netconf_xml/
H A Dnotequal.yaml11 - "result[1].rpc-reply.interface-information.physical-interface.name neq em0"
28 - "result[1].rpc-reply.interface-information.physical-interface.name neq em0"
/dports/security/arpCounterattack/arpCounterattack-1.2.0/
H A DarpCounterattack.conf.sample6 interfaces="em0 fxp0"
19 # Monitor em0 for attacks against 192.168.0.1 and 192.168.0.14 and respond
/dports/math/R-cran-lava/lava/vignettes/
H A Dnonlinear.Rmd272 em0 <- mixture(m1, k=2, data=d)
279 em0 <- NULL
285 if (is.null(em0) || logLik(em0)<tail(ll,1))
286 em0 <- em
293 saveRDS(em0, "nonlinear_em0.rds")
295 em0 <- readRDS("nonlinear_em0.rds")
300 summary(em0)
307 AIC(e0,em0)
313 em2 <- twostage(em0,m2,data=d)
/dports/net/haproxy19/haproxy-1.9.16/examples/
H A Dtransparent_proxy.cfg29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0
40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0
46 # - set a rule to catches reply traffic on em0 coming from the webserver
/dports/net/haproxy20/haproxy-2.0.26/examples/
H A Dtransparent_proxy.cfg29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0
40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0
46 # - set a rule to catches reply traffic on em0 coming from the webserver
/dports/net/haproxy/haproxy-2.4.10/examples/
H A Dtransparent_proxy.cfg29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0
40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0
46 # - set a rule to catches reply traffic on em0 coming from the webserver
/dports/net/haproxy22/haproxy-2.2.19/examples/
H A Dtransparent_proxy.cfg29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0
40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0
46 # - set a rule to catches reply traffic on em0 coming from the webserver

1234567