/dports/security/fwbuilder/fwbuilder-5.3.7/src/unit_tests/PFImporterTest/test_data/ |
H A D | pf-nat-rules.conf | 3 nat on em0 from 192.168.168.0/24 to any -> 192.0.2.111 4 nat on ! em0 from 192.168.168.0/24 to any -> 192.0.2.111 6 nat on em0 inet from any to any -> 192.0.2.16/28 bitmask 7 nat on em0 inet from any to any -> 192.0.2.16/28 random 16 nat on em0 inet proto udp from any port 10000 to any -> em0 17 nat on em0 inet proto udp from any port 10000 to any -> (em0) 18 nat on em0 inet proto udp from any port 10000 to any -> (em0) port 10000 19 nat on em0 inet proto udp from any port 10000:10010 to any -> (em0) port 10000 20 nat on em0 inet proto udp from any port 10000:10010 to any -> (em0) port 10000:* 28 no nat on em0 proto ah from 192.168.1.0/24 to any [all …]
|
H A D | pf-nat-rules.output | 1 3: New interface: em0 2 3: nat rule: action nat; interfaces: em0 3 4: nat rule: action nat; interfaces: em0 4 6: nat rule: action nat; interfaces: em0 5 7: nat rule: action nat; interfaces: em0 6 8: nat rule: action nat; interfaces: em0 7 9: nat rule: action nat; interfaces: em0 8 10: nat rule: action nat; interfaces: em0 10 11: nat rule: action nat; interfaces: em0 12 12: nat rule: action nat; interfaces: em0 [all …]
|
H A D | pf-rdr-rules.conf | 3 rdr on em0 inet proto tcp from any to (em0) port 80 -> 10.0.1.111 port 8080 5 rdr on em0 inet proto tcp from any to any port 80 -> 127.0.0.1 port 8080 8 rdr on em0 inet proto tcp from any to (em0) port 80 -> \ 12 no rdr on em0 inet proto tcp from 192.168.1.1 to any port 80 13 rdr on em0 inet proto tcp from 192.168.1.0/24 to any port 80 -> \
|
H A D | pf-rdr-rules.output | 1 3: New interface: em0 2 3: nat rule: action rdr; interfaces: em0 3 5: nat rule: action rdr; interfaces: em0 4 8: nat rule: action rdr; interfaces: em0 5 11: nat rule: action nonat; interfaces: em0 6 12: nat rule: action rdr; interfaces: em0
|
H A D | pf-route-to-4.7.conf | 2 pass in log quick inet from 192.168.1.0/24 to any route-to { ( em0 10.1.2.3 ) } 6 pass out quick on bce0 proto tcp from any port 80 to any dup-to (em0 10.1.2.3)
|
H A D | pf-route-to.conf | 2 pass in log quick route-to { ( em0 10.1.2.3 ) } inet from 192.168.1.0/24 to any 6 pass out quick on bce0 dup-to (em0 10.1.2.3) proto tcp from any port 80 to any
|
/dports/net-mgmt/p5-FusionInventory-Agent/FusionInventory-Agent-2.5.2/resources/generic/netstat/ |
H A D | openbsd | 5 default 10.0.1.1 UGS 0 0 - 8 em0 6 10.0.1/24 link#1 UC 2 0 - 4 em0 7 10.0.1.1 00:1d:7e:43:96:57 UHLc 1 3 - 4 em0 8 10.0.1.100 00:13:77:b3:cf:0c UHLc 1 183 - 4 em0
|
/dports/sysutils/ansible-sshjail/ansible-sshjail-1.1.0-35-g35c3bf6/vagrant/ |
H A D | jails.yml | 6 # em0 is NAT interface 10.0.2.0/24, see Vagrantfile 12 ipaddr: em0|10.0.2.21,em1|10.0.5.21 16 ipaddr: em0|10.0.2.22,em1|10.0.5.22
|
/dports/sysutils/iocell/iocell-2.1.2/doc/source/ |
H A D | networking.rst | 46 ``iocell set ip4_addr="em0|10.1.1.10/24" UUID| TAG`` 52 ``iocell set ip4_addr="em0|10.1.1.10/24,em0|10.1.1.11/24" UUID| TAG`` 103 # plumb interface em0 into bridge0 104 ifconfig_bridge0="addm em0 up" 163 ``iocell set ip4_addr="em0|192.168.0.10/24" UUID|TAG`` 167 ``iocell set ip6_addr="em0|2001:123:456:242::5/64" UUID|TAG`` 169 This will add an IP alias 192.168.0.10/24 to interface em0 for the shared IP jail at start time, as…
|
/dports/sysutils/bastille/bastille-00d9e03/docs/chapters/subcommands/ |
H A D | rdr.rst | 20 rdr on em0 inet proto tcp from any to any port = 2001 -> 10.17.89.1 port 22 23 rdr on em0 inet proto tcp from any to any port = 2001 -> 10.17.89.1 port 22 24 rdr on em0 inet proto udp from any to any port = 2053 -> 10.17.89.1 port 53
|
/dports/math/R-cran-lava/lava/inst/doc/ |
H A D | nonlinear.R | 162 saveRDS(em0, "nonlinear_em0.rds") 164 em0 <- readRDS("nonlinear_em0.rds") globalVar 168 summary(em0) 172 AIC(e0,em0) 175 em2 <- twostage(em0,m2,data=d)
|
H A D | nonlinear.Rmd | 272 em0 <- mixture(m1, k=2, data=d) 279 em0 <- NULL 285 if (is.null(em0) || logLik(em0)<tail(ll,1)) 286 em0 <- em 293 saveRDS(em0, "nonlinear_em0.rds") 295 em0 <- readRDS("nonlinear_em0.rds") 300 summary(em0) 307 AIC(e0,em0) 313 em2 <- twostage(em0,m2,data=d)
|
/dports/net-mgmt/librenms/librenms-21.5.1/tests/snmpsim/ |
H A D | truenas_11-3.snmprec | 7 1.3.6.1.2.1.2.2.1.2.1|4|em0 376 1.3.6.1.2.1.25.3.2.1.3.262145|4|network interface em0 398 1.3.6.1.2.1.31.1.1.1.1.1|4|em0
|
/dports/sysutils/py-focker/focker-ce2108e3/example/scm-manager/ |
H A D | README.md | 6 to replace `em0` with the name of your external interface and make sure that 16 echo "rdr on em0 proto tcp from any to (em0) port 8080 -> 127.0.55.1 port 8080" >>/etc/pf.conf 17 echo "nat on em0 from (lo1:network) -> (em0)" >>/etc/pf.conf
|
/dports/net-mgmt/p5-FusionInventory-Agent/FusionInventory-Agent-2.5.2/resources/generic/ifconfig/ |
H A D | dragonfly-1 | 1 em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 3 inet6 fe80::a00:27ff:fe2e:7097%em0 prefixlen 64 scopeid 0x1
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/junos_command/tests/netconf_json/ |
H A D | notequal.yaml | 11 - "result[1]['interface-information'][0]['physical-interface'][0]['name'][0]['data'] neq em0" 28 - "result[1]['interface-information'][0]['physical-interface'][0]['name'][0]['data'] neq em0"
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/junipernetworks/junos/tests/integration/targets/junos_command/tests/netconf_json/ |
H A D | notequal.yaml | 14 neq em0 32 neq em0
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/junipernetworks/junos/tests/integration/targets/junos_command/tests/netconf_xml/ |
H A D | notequal.yaml | 13 - result[1].rpc-reply.interface-information.physical-interface.name neq em0 30 - result[1].rpc-reply.interface-information.physical-interface.name neq em0
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/junos_command/tests/netconf_xml/ |
H A D | notequal.yaml | 11 - "result[1].rpc-reply.interface-information.physical-interface.name neq em0" 28 - "result[1].rpc-reply.interface-information.physical-interface.name neq em0"
|
/dports/security/arpCounterattack/arpCounterattack-1.2.0/ |
H A D | arpCounterattack.conf.sample | 6 interfaces="em0 fxp0" 19 # Monitor em0 for attacks against 192.168.0.1 and 192.168.0.14 and respond
|
/dports/math/R-cran-lava/lava/vignettes/ |
H A D | nonlinear.Rmd | 272 em0 <- mixture(m1, k=2, data=d) 279 em0 <- NULL 285 if (is.null(em0) || logLik(em0)<tail(ll,1)) 286 em0 <- em 293 saveRDS(em0, "nonlinear_em0.rds") 295 em0 <- readRDS("nonlinear_em0.rds") 300 summary(em0) 307 AIC(e0,em0) 313 em2 <- twostage(em0,m2,data=d)
|
/dports/net/haproxy19/haproxy-1.9.16/examples/ |
H A D | transparent_proxy.cfg | 29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0 40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0 46 # - set a rule to catches reply traffic on em0 coming from the webserver
|
/dports/net/haproxy20/haproxy-2.0.26/examples/ |
H A D | transparent_proxy.cfg | 29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0 40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0 46 # - set a rule to catches reply traffic on em0 coming from the webserver
|
/dports/net/haproxy/haproxy-2.4.10/examples/ |
H A D | transparent_proxy.cfg | 29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0 40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0 46 # - set a rule to catches reply traffic on em0 coming from the webserver
|
/dports/net/haproxy22/haproxy-2.2.19/examples/ |
H A D | transparent_proxy.cfg | 29 # fwd localhost tcp from 192.168.0.40 80 to any in recv em0 40 # ipfw add 10 fwd localhost tcp from 192.168.0.40 80 to any in recv em0 46 # - set a rule to catches reply traffic on em0 coming from the webserver
|