/usr/share/fwbuilder-5.3.7/platform/iptables.xml is in fwbuilder-common 5.3.7-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 | <?xml version="1.0"?>
<FWBuilderResources>
<Target name="iptables">
<description>iptables</description>
<status>active</status>
<group>Open Source Firewalls</group>
<compiler>fwb_ipt</compiler>
<dialog>iptables</dialog>
<!-- maintian order of supported os names to make them appear in the dialog
in the right order
-->
<supported_os>linux24,openwrt,sveasoft,ipcop,endian,oneshield,secuwall,dd-wrt-nvram,dd-wrt-jffs</supported_os>
<family>iptables</family>
<options>
<default>
<load_modules>true</load_modules>
<verify_interfaces>true</verify_interfaces>
<firewall_is_part_of_any_and_networks>true</firewall_is_part_of_any_and_networks>
<accept_new_tcp_with_no_syn>true</accept_new_tcp_with_no_syn>
<accept_established>true</accept_established>
<configure_interfaces>true</configure_interfaces>
<manage_virtual_addr>true</manage_virtual_addr>
<log_level>info</log_level>
<log_prefix>RULE %N -- %A </log_prefix>
<ulog_nlgroup>1</ulog_nlgroup>
<limit_value>0</limit_value>
<check_shading>true</check_shading>
<verify_interfaces>true</verify_interfaces>
<local_nat>false</local_nat>
</default>
</options>
<capabilities>
<negation_in_interface_policy>True</negation_in_interface_policy>
<negation_in_policy>True</negation_in_policy>
<negation_in_nat>True</negation_in_nat>
<logging_in_policy>True</logging_in_policy>
<options_in_policy>True</options_in_policy>
<supports_nat>True</supports_nat>
<actions_in_nat>True</actions_in_nat>
<inbound_interface_in_nat>True</inbound_interface_in_nat>
<outbound_interface_in_nat>True</outbound_interface_in_nat>
<supports_time>True</supports_time>
<supports_accounting>True</supports_accounting>
<security_levels>False</security_levels>
<network_zones>False</network_zones>
<unprotected_interfaces>False</unprotected_interfaces>
<supports_prolog_epilog>True</supports_prolog_epilog>
<supports_cluster>True</supports_cluster>
<install_only_on_primary>False</install_only_on_primary>
<actions>
<Accept>
<supported>True</supported>
<description>Accept</description>
<dialog_page>None</dialog_page>
</Accept>
<Deny>
<supported>True</supported>
<description>Deny</description>
<dialog_page>None</dialog_page>
</Deny>
<Reject>
<supported>True</supported>
<description>Reject</description>
<dialog_page>Reject</dialog_page>
</Reject>
<Accounting>
<supported>True</supported>
<description>Accounting</description>
<dialog_page>AccountingStr</dialog_page>
</Accounting>
<Tag>
<supported>False</supported>
<description>Tag</description>
<dialog_page>TagIptables</dialog_page>
</Tag>
<Pipe>
<supported>True</supported>
<description>Queue</description>
<dialog_page>None</dialog_page>
</Pipe>
<Classify>
<supported>False</supported>
<description>Classify</description>
<dialog_page>ClassifyIptables</dialog_page>
</Classify>
<Custom>
<supported>True</supported>
<description>Custom</description>
<dialog_page>CustomStr</dialog_page>
</Custom>
<Branch>
<supported>True</supported>
<description>Branch</description>
<dialog_page>BranchChain</dialog_page>
</Branch>
<Route>
<supported>False</supported>
<description>Routing</description>
<dialog_page>RouteIPT</dialog_page>
</Route>
<Continue>
<supported>True</supported>
<description>Continue</description>
<dialog_page>None</dialog_page>
</Continue>
<Translate>
<supported>True</supported>
<description>Translate</description>
<dialog_page>None</dialog_page>
</Translate>
<NATBranch>
<supported>True</supported>
<description>Branch</description>
<dialog_page>NATBranch</dialog_page>
</NATBranch>
</actions>
</capabilities>
</Target>
</FWBuilderResources>
|